Generate new identity from fingerprints for privacy protection

Abstract

We propose here a novel system for privacy protection of fingerprint by merging two fingerprints & generate new identity. In the enrollment phase, two fingerprints are taken from two different fingers of one person. From one fingerprint we extract the minutiae positions, from the other fingerprint we extract the orientations, and from both fingerprints we extract the reference points. From this extracted information and our coding strategies, we generate combined minutiae template and that generated combined minutiae template stored in a database. During authentication phase, the system requires two query fingerprints from the same two fingers of one person which are used during enrollment phase. A two-stage fingerprint matching system is used for matching the two query finger-prints from the same two fingers of one person against a combined minutiae template which is stored in database. By storing the combined minutiae template in the database, the complete minutiae positions of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is very difficult for the attacker to differentiate a combined minutiae template from the original minutiae templates. With the help of an existing fingerprint reconstruction approach, we are able to reconstruct the combined minutiae template into a new virtual identity of merged fingerprints. Thus, a new virtual identity is generated from merging the two different fingerprints of one person, which can be matched using minutiae based fingerprint matching algorithms. The experimental results shows that our system can achieve a very low error rate.

Authors and Affiliations

Ujma A. Mulla

Keywords

Related Articles

Data Mining Challenges With Big Data

Data analysis is a clear bottleneck in many applications, both due to lack of scalability of the underlying algorithms and due to the complexity of the data that needs to be analyzed. The value of data explodes when it...

CRA Role in Identity-Based Encryption for Its Applications

Identicalness based Cryptography is an id based cryptography which depends on the user identity, (IBE) is a world Key cryptoorganisation and eliminates the need of public paint infrastructure (PKI) and certicate adminis...

Smart Transport Database Management System

In the current scenario, automation plays major role in various sectors because of provide reliable products, performing hazardous tasks, and monitoring continuously without relaxation. These properties of automation ha...

Multi-View Video System for Wireless Channel

With the advent in display technology, the 3DTV will provide a new viewing experience without the need of wearing special glasses to watch the 3D scenes. One of the key elements in 3DTV is the multi-view video coding, o...

Localization error estimation approaches of wireless sensor network

The practical difficulties of setting up a wireless sensor network (WSN) and analysing its performance have made simulation essential study of WSNs. The network simulator is one of the most widely used tools by research...

Download PDF file
  • EP ID EP23057
  • DOI -
  • Views 307
  • Downloads 5

How To Cite

Ujma A. Mulla (2017). Generate new identity from fingerprints for privacy protection. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(1), -. https://www.europub.co.uk/articles/-A-23057