IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg: 40-45

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Paired Fingerprints to Improve Anonymity Protection R.Ranjani, PG Student, Department of CSE, Vivekanandha College of Technology for Women, Tiruchengode, Tamil Nadu, India. [email protected] N.Nisha Sulthana, Assistant Professor, Department of CSE Vivekanandha College of Technology for Women, Tiruchengode, Tamil Nadu, India. [email protected]

Abstract An efficient system for protecting the fingerprint anonymity by mixing any two separate fingerprints into new virtual identity, while storing into a database each combined template is stored with priority order. In the registration phase, it extracts the minutiae from fingerprint A and ridge flow from fingerprint B and singular points from both fingerprints. With the features extracted from the fingerprints and proposed techniques, virtual template is created then stored into database with priority for three pairs of fingerprint and the first prioritized template is set as default password. During the authentication, the two query fingerprints is needed from the same fingerprints used in the identification phase. If the default password template is not matched and meet the threshold value then it will look for the second priority password. Here, the existing two-stage fingerprint matching process and reconstruction approach is used for matching the two query fingerprint against the stored combined minutiae template and reconstruct the combined minutiae template to avoid the possibility of distinguish between the original template and combined minutiae template by the hacker. In this approach, the efficiency for protecting any application wherever we use the fingerprint as password is improved and possibility of hacking will be reduced.

Key Words— fingerprint, privacy, priority, combination, protection

I.INTRODUCTION Nowadays, biometrics is widely used in authentication systems. In general, biometrics needs to be stored in a database for subsequent authentication. However, templates stored in the database are at the risk of being stolen or modified. Once the template is stolen, it is difficult to be replaced like passwords and the private personal information associated with the stolen template would also be exposed. Thus, biometric templates have to be stored in the database so that both the privacy of the template and the security of the system are not compromised R.Ranjani,IJRIT

40

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg: 40-45

under various attacks. Most of the existing fingerprint privacy protection techniques require the user to carry a token or memorize a key, which creates the inconvenience. They may also be vulnerable when both the token (or key) and the protected fingerprint are stolen. Jin et al. [3] propose a biohashing approach based on the inner products between the user’s fingerprint features and a tokenized pseudo-random number. The accuracy of this approach mainly depends on the token, which is assumed to be never stolen or shared. Ratha et al. [4] propose to generate cancelable fingerprint templates by applying noninvertible transforms on the minutiae. The non-invertible transform will usually lead to a reduction in matching accuracy. The work in [3] and [4] are shown to be vulnerable to intrusion and linkage attacks when both the token (or key) and the transformed template are stolen [9]. The works in [10]–[12] combine two different fingerprints into a single new identity either in the feature level [10] or in the image level [11], [12]. In [10], the concept of combining two different fingerprints into a new identity is first proposed, where the new identity is created by combining the minutiae positions extracted from the two fingerprints. The original minutiae positions of each fingerprint can be protected in the new identity. However, it is easy for the attacker to identify such a new identity because it contains many more minutiae positions than that of an original fingerprint. The experiment shows that the EER of matching the new identities is 2.1% when the original minutiae positions are marked manually from the original fingerprints. A similar scheme is proposed in [13], where the minutiae positions extracted from a fingerprint and the artificial points generated from the voice are combined to produce a new identity. In [11], [12], the authors first propose to combine two different fingerprints in the image level. First of all, each fingerprint is decomposed into the continuous component and the spiral component based on the fingerprint FM-AM model [14]. After some alignment, the continuous component of one fingerprint is combined with the spiral component of the other finger- print, so as to create a new virtual identity which is termed as a mixed fingerprint. Compared with the work in [10], [13], such an image level based fingerprint combination technique has two advantages: (i) it is difficult for the attacker to distinguish a mixed fingerprint from the original fingerprints, and (ii) existing fingerprint matching algorithms are applicable for matching two mixed fingerprints. However, this approach produces a visually unrealistic mixed fingerprint due to the variations in the orientation and frequency between the two different fingerprints. Their experimental results [12] show that the EER of matching two mixed fingerprints is about 15% when two different fingerprints are randomly chosen for creating a mixed fingerprint. If the two different fingerprints are carefully chosen according to a compatibility measure, the EER can be reduced to about 4%. In this paper, we propose a novel system for protecting fingerprint privacy by combining two different fingerprints into a new identity. During the enrollment, the system captures two fingerprints from two different fingers. We propose a combined minutiae template generation algorithm to create a combined minutiae template from the two fingerprints. In such a template, the minutiae positions are extracted from one fingerprint, while the minutiae directions depend on the orientation of the other fingerprint and some coding strategies. The template will be stored in a database for the authentication which requires two query fingerprints. A two-stage fingerprint matching process is further proposed for matching the two query fingerprints against a combined minutiae template. By using the combined minutiae template, the complete minutiae feature of a single fingerprint will not be compromised when the database is stolen. In addition, the combined minutiae template share a similar topology to the original minutiae templates, it can be converted into a real-look alike combined fingerprint by using an existing fingerprint reconstruction approach [15]. The combined fingerprint issues a new virtual identity for two different fingerprints, which can be matched using minutiae based fingerprint matching algorithms. II. PROPOSED SYSTEM FOR FINGERPRINT PRIVACY

R.Ranjani,IJRIT

41

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg: 40-45

Fig.1 Proposed Fingerprint Privacy System In the enrollment phase, the system captures two fingerprints from two different fingers, say fingerprints A and B from fingers A and B, respectively. We extract the minutiae positions from fingerprint and the orientation from fingerprint using some existing techniques [16], [17]. Then, by using our proposed coding strategies, a combined minutiae template is generated based on the minutiae positions, the orientation and the reference points detected from both fingerprints. The Combined Minutiae Template (Mc) is stored in database with the priority as shown in fig.2 where Mc1 is the first enrolled fingerprint combined template, Mc2 is the second enrolled fingerprint combined template, Mc3 is the third enrolled fingerprint combined template.

k Mc 1

1st priority

Mc2

2nd priority

Mc3

Database

3rd priority

Fig. 2 Priority in database In the authentication phase, two query fingerprints are required from the same two fingers, say fingerprints A’, B’ and from fingers A and B. As what we have done in the enrollment, we extract the minutiae positions from fingerprint A’ and the orientation from fingerprint B’. Reference points are detected from both query fingerprints. These extracted information will be matched against the corresponding template stored in the database by using a two-stage fingerprint matching with the priority. The authentication will be successful if the matching score is over a predefined threshold. A. Reference Points Detection The reference points detection process is motivated by Nilsson et al. [18], who first propose to use complex filters for singular point detection. Given a fingerprint, the main steps of the reference points detection are summarized as follows: 1.

Compute the orientation O from the fingerprint using the Orientation Estimation Algorithm proposed in [17]. Obtain the orientation Z in complex domain, where Z=cos(2O)+jsin(2O) (1)

R.Ranjani,IJRIT

42

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg: 40-45

2.

Calculate a certainty map of reference points[18] Cref =Z*Tref (2) Where “*” is the convolution operator and Tref is the reference points detection.

Fig 3. Combined minutiae template 3.

Locate a reference point satisfying the two criterions: (i) the amplitude should be a local maximum, and (ii) the local maximum should be over a fixed threshold. 4. If no reference point is found for the fingerprint, locate a reference point with the maximum certainty value in the whole fingerprint image. B. Combined Minutiae Template Generation Given a set of N minutiae positions Pe = {pi = (xi , yi), of fingerprint B, where Oe(xi,yi) is not well defined {1 ≤ i ≤ N } of fingerprint A, the orientation Oe of fingerprint B and the primary cores of fingerprints A and B. A combined minutiae template is generated by (1) minutiae position alignment and (2) minutiae direction assignment, as shown in Fig. 2. (1)

(2)

Minutiae position alignment: Suppose we detect two primary cores Ca and Cb for fingerprint A and B, respectively. Let assume Ca is located at (cxa , cya ) with the angle βa , and Cb is located at (cxb , cyb ) with the angle βb . The alignment is performed by translating and rotating each minutiae point Minutiae Direction alignment: Each aligned minutiae position Pi is assigned with a direction as follows Θi= Oe(xi,yi)+ρπ (3) where ρ is an integer which is randomly selected from {0,1}. The range of Oe(xi,yi) is from 0 to π. Therefore, the range of Θi will be from 0 to 2π, which is the same as that of the minutiae directions from an original fingerprint. However, sometimes, pi may be located outside of the fingerprint B, where Oe(xi,yi) is not well defined. In such case, we need to predict Oe(xi,yi) before the direction assignment. Some existing works for modeling the fingerprint orientation can be adopted for the orientation prediction. Once all the N aligned minutiae positions are assigned with directions a comine minutiae template Me={ mi=(pi,θi), 1
C. Two-Stage Fingerprint Matching Given the minutiae positions PA’ of fingerprint A’, the orientation OB’ of fingerprint B’ and the reference points of the two query fingerprints. In order to match the MC stored in the database, it includes the query minutiae determination and matching score calculation. 1.

Query Minutiae Determination: The query minutiae determination is very important step during the fingerprint matching. In order to simplify the description of algorithm, the local features extracted for a minutiae point in MC. The local features are extracted and the minutiae points and orientation are matched against the stored template is similar to the work proposed in the existing system [1]. 1.

Matching Score Calculation: For the combined minutiae templates that are generated using Coding Strategies 1, we do a modulo for all the minutiae directions in MQ and MC, so as to remove the randomness. After the modulo operation, we use an existing minutiae matching algorithm to calculate a matching score between MQ and MC for the authentication decision. For other combined minutiae templates, we directly calculate a matching score between MQ and MC using an existing minutiae matching algorithm.

III.COMBINED FINGERPRINT GENERATION R.Ranjani,IJRIT

43

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg: 40-45

In a combined minutiae template, the minutiae positions and directions are extracted from two different fingerprint separately. These minutiae positions and directions share a similar topology to those from an original fingerprint. Therefore, the combined minutiae template has a similar topology to an original minutiae template. Some existing works have shown that it is possible to reconstruct a full fingerprint image from a minutiae template. By adopting one of these fingerprint reconstruction approaches, we are able to convert our combined minutiae template into a combined fingerprint image. With the given two different fingerprint as input, we first generate a combined minutiae template using our combined minutiae template generation algorithm. Then, a combined fingerprint is reconstructed from the combined minutiae template using one of the reconstruction approaches. Among the existing fingerprint reconstruction approaches, this work achieves good performance. However, the work in does not incorporate a noising and rendering step to make the reconstructed fingerprint image real-look alike. To create a real-look alike fingerprint image from a set of minutiae points, further applying a noising and rendering step after adopting the work, where the following 7 stages are carried through as described 1. 2. 3. 4. 5. 6. 7.

Estimate an orientation field O from the set of minutiae points by adopting the orientation reconstruction algorithm. Generate a binary ridge pattern based on O and a predefined fingerprint ridge frequency using gabor filtering. Estimate the phase image ѱ of the binary ridge pattern using fingerprint FM-AM model. Reconstruct the continuous phase image ѱs by removing the spirals in the phase image ѱ. Combine the continuous phase image ѱc and the spiral ѱs during a reconstructed phase image ѱ. Refine the reconstructed phase image ѱ by removing the spurious minutiae points to produce a refined phase image. Applying the noising and rendering step on ѱ, so as to create a real-look alike fingerprint image.

IV.PERFORMANCE EVALUATION The experiment result is conducted on the impressions of fingerprint in the FVC2000 DB2 database, which contains 200 fingerprints from 100 fingers. The Verifinger 6.3 is used for the minutiae positions extraction and the minutiae matching.The orientation estimation algorithm is very useful and shows very low error rate when compare to other systems.

Fig 4 Performance Evaluation V. CONCLUSION In the enrollment, the system captures two fingerprints from two different fingers. A combined minutiae template containing only a partial minutiae feature of each of the two fingerprints will be generated and stored in a database. To make the combined minutiae template, look real as an original minutiae template, three different coding strategies are introduced during the combined minutiae template generation process. In the authentication process, two query fingerprints from the same two fingers which are enrolled with first priority set are required. R.Ranjani,IJRIT

44

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg: 40-45

A two-stage fingerprint matching process has proposed for matching the two query fingerprints against the enrolled template. Comparing with the state-of-the-art technique, it generates a better new virtual identity when the two different fingerprints are randomly chosen. The analysis shows that it is not easy for the attacker to recover the original minutiae templates from a combined minutiae template or a combined fingerprint. The priority method is very efficient to ensure the right user to authenticate. VI. REFERENCES [1] Sheng Li and Kot A. C., “Fingerprint Combination for Privacy Protection,” in IEEE Trans on Information Forensics and Security, Feb 2013. [2] S. Li and A. C. Kot, “A novel system for fingerprint privacy protection,” in Proc. 7th Int. Conf. Inform. Assurance and Security (IAS), Dec. 5–8, 2011, pp. 262–266. [3] B. J. A. Teoh, C. L. D. Ngo, and A. Goh, “Biohashing: Two factor authentication featuring fingerprint data and tokenized random number,”Pattern Recognit., vol. 37, no. 11, pp. 2245–2255, 2004. [4] A. Kong, K.-H. Cheung, D.Zhang, M. Kamel, and J. You, “An analysis of biohashing and its variants,” Pattern Recognit., vol. 39, no. 7, pp. 1359–1368, 2006. [5] N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelable fingerprint templates,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 561–72, Apr. 2007. [6] A. Nagar, K. Nandakumar, and A. K. Jain, “Biometric template transformation: A security analysis,” in Proc. SPIE, Electron. Imaging, Media Forensics and Security, San Jose, Jan. 2010. [7] K. Nandakumar, A. K. Jain, and S. Pankanti, “Fingerprint-based fuzzy vault: Implementation and performance,” IEEE Trans. Inf. Forensics Security, vol. 2, no. 4, pp. 744–57, Dec. 2007. [8] S. Li and A. C. Kot, “Privacy protection of fingerprint database,” IEEE Signal Process. Lett., vol. 18, no. 2, pp. 115–118, Feb. 2011. [9] A. Ross and A. Othman, “Visual cryptography for biometric privacy,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 70–81, Mar. 2011. [10] B. Yanikoglu and A. Kholmatov, “Combining multiple biometrics to protect privacy,” in Proc. ICPR- BCTP Workshop, Cambridge, U.K.,Aug. 2004. [11] A. Ross and A. Othman, “Mixing fingerprints for template security and privacy,” in Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29–Sep. 2, 2011. [12] A. Othman and A. Ross, “Mixing fingerprints for generating virtual identities,” in Proc. IEEE Int. Workshop on Inform. Forensics and Se- curity (WIFS), Foz do Iguacu, Brazil, Nov. 29–Dec. 2, 2011. [13] E. Camlikaya, A. Kholmatov, and B. Yanikoglu, “Multi-biometric templates using fingerprint and voice,” Proc. SPIE, vol. 69440I, pp. 69440I-1–69440I-9, 2008. [14] K. G. Larkin and P. A. Fletcher, “A coherent framework for finger- print analysis: Are fingerprints holograms?,” Opt. Express, vol. 15, pp. 8667–8677, 2007. [15] S. Li and A. C. Kot, “Attack using reconstructed fingerprint,” in Proc. IEEE Int. Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Brazil, Nov. 29–Dec. 2, 2011. [16] VeriFinger 6.3. [Online]. Available: http://www.neurotechnology.com [17] L. Hong, Y. F. Wan, and A. Jain, “Fingerprint image enhancement: Algorithm and performance evaluation,” IEEE Trans. Pattern Anal.Mach. Intell., vol. 20, no. 8, pp. 777–789, Aug. 1998. [18] K. Nilsson and J. Bigun, “Localization of corresponding points in fin- gerprints by complex filtering,” Pattern Recognit. Lett., vol. 24, no. 13, pp. 2135–2144, 2003. [19] S. Chikkerur and N. Ratha, “Impact of singular point detection on fingerprint matching performance,” in Proc. Fourth IEEE Workshop on Automat. Identification Advanced Technologies, Oct. 2005, pp. 207–212. [20] Y. Wang and J. Hu, “Global ridge orientation modeling for partial fin- gerprint identification,” IEEE Trans. Pattern Anal. Mach. Intell., vol.33, no. 1, pp. 72–87, Jan. 2011.

R.Ranjani,IJRIT

45

Paired Fingerprints to Improve Anonymity Protection - IJRIT

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, ... is proposed in [13], where the minutiae positions extracted from a fingerprint and ... in the orientation and frequency between the two different fingerprints.

358KB Sizes 2 Downloads 246 Views

Recommend Documents

Paired Fingerprints to Improve Anonymity Protection - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, ... Vivekanandha College of Technology for Women, Tiruchengode,.

Fingerprints Lab.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

Resolvable Paired-Comparison Designs
printed page Of such transmission. JSTOR is an independent not-for-profit organization dedicated to creating and preserving a digital archive of scholarly ...

Regular Simplex Fingerprints and Their Optimality ... - CiteSeerX
1 Coordinated Science Laboratory, Dept. of Electrical and Computer Engineering,. University .... We shall call this detector focused, because it decides whether a particular user ..... dimension through the center of ABCD so that EA = EB = EC =.

DNA FINGERPRINTS AS PREDICTORS OF ...
The objective of the present study was to assess, on the basis of retrospective analysis of crossbreeding data in chickens, the value of DFP in prediction of heterosis for economically important traits of egg and meat chickens. Materials and methods.

Regular Simplex Fingerprints and Their Optimality ... - CiteSeerX
The worst-case probability of false alarm PF is equal to 1. The threshold τ trades off ... 1. D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data.

The Sorting Paired Features Task - Hogrefe eContent
Abstract. The sorting paired features (SPF) task measures four associations in a single response block. Using four response options (e.g., good-. Republicans, bad-Republicans, good-Democrats, and bad-Democrats), each trial requires participants to ca

Mondrian Multidimensional K-Anonymity
Optimal multidimensional anonymization is NP-hard. (like previous optimal ...... re-partition the data into two “runs” (lhs and rhs) on disk. It is worth noting that this ...

Mondrian Multidimensional K-Anonymity
Proposition 2 Every strict multidimensional partitioning can be expressed as a relaxed multidimensional partition- ing. However, if there are at least two tuples in ...

Paired comparison-based subjective quality ... - Infoscience - EPFL
Abstract As 3D image and video content has gained significant popularity, sub- ... techniques and the development of objective 3D quality metrics [10, 11]. .... is 'better' or 'worse' than stimulus B) and a more subdivided form (stimulus A is ......

Paired comparison-based subjective quality ...
Multimed Tools Appl ... techniques and the development of objective 3D quality metrics [10, 11]. ..... application of the proposed framework. ... Two identical 46” LCD polarized stereoscopic monitors with a native resolution ..... mobile devices.

Paired-Uniform Scoring - University of Pittsburgh
where one of the two bags is selected with equal probability. Two-thirds of the ... To determine your payment the computer will randomly draw two numbers. ... the previous month's unemployment rate is lower than a year ago. .... tractable, and capabl

IGF-1 to improve neural outcome
Jun 27, 2003 - (73) Assignees: Genentech Inc., South San Francisco,. CA (U S); .... Factor I (IGF-1) and Express IGF-l Receptors and IGF-II/Mannose. 6-Phosphate ..... 1 shoWs composite draWings (A-D) illustrating the distribution of IGF-1 ...

Varying experimental instructions to improve ...
The experiment was programmed in z-Tree (Fischbacher, 2007). All sessions were conducted at EssexLab by the same experimenter. Subjects were recruited from ...... of cooperation and punishment in the successful groups in the two treatments. We apply

efforts to improve teacher quality - Education Week
Vermont. Mississippi. Texas. Hawaii. Oregon. Rhode Island. Washington. Minnesota. New Hampshire. Montana. Utah. Michigan. District of Columbia. Wyoming.

Download File - Partnership to Improve Patient Care
19 May 2009 - better defined in its application to research, PIPC looks forward to bringing the patient voice to the discussion .... Medicare and Medicaid Services (CMS), Dr. Don Berwick, in which he succinctly described patient- ...... improve welln

Incognito: Efficient Full-Domain K-Anonymity - CiteSeerX
Jan 21, 1976 - external data to uniquely identify individuals. ... ature to refer to data published in its raw, non-aggregated, ..... mining association rules [2, 16].

Nonatomic Games with Limited Anonymity
use of a congestioned good, such as internet, roads, electricity networks, when ... price in a market, the topic choice for the whole set of young researchers ..... make this simplification to unify our presentation of the three approaches to prove t

Anonymity, signaling, contributions and ritual
19 Nov 2008 - never use these languages again; people in many societies perform elaborate religious rituals which ... (2003) found that religious communes with strict codes of dress and conduct survived for longer than ..... Andreoni and Petrie (2004

efforts to improve teacher quality - Education Week
93. 92. 91. 89. 89. 87. 86. 86. 85. 85. 82. 82. 81. 81. 81. 81. 81. 79. 78. 77. 77. 76. 75. 75. 75. 75. 74. 74. 74. 74. 73. 73. 72. 72. 72. 70. 70. 70. 69. 69. 67. 67. 66. 66. 66. 65. 65. 63. 63. 62. 61. —. Overall grade for efforts to improve teac

IGF-1 to improve neural outcome
Jun 27, 2003 - US RE43,982 E. Feb. 5, 2013. (54) IGF-1 TO IMPROVE NEURAL OUTCOME. (75) Inventors: Peter Gluckman, Auckland (NZ);. Karoly Nikolich, Emerald Hills, CA. (Us). (73) Assignees: Genentech Inc., South San Francisco,. CA (U S); Auckland Unise