Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification

Published: 16 June 2021 Publication History

Abstract

Fingerprint provides an extremely convenient way of identification for a wide range of real-life applications owing to its universality, uniqueness, collectability, and invariance. However, digitized fingerprints may reveal the privacy of individuals. Differential privacy is a promising privacy-preserving solution that is enforced by injecting random noise into preserved objects, such that an adversary with arbitrary background knowledge cannot infer private input from the noisy results. This study proposes FinPrivacy, a privacy-preserving mechanism for fingerprint identification. This mechanism utilizes the low-rank matrix approximation to reduce the dimensionality of fingerprint and the exponential mechanism to carefully determine the value of the optimal rank. Thereafter, FinPrivacy injects Laplace noise to the singular values of the approximated singular matrix, thereby trading off between privacy and utility. Analytic proofs and results of the comparative experiments demonstrate that FinPrivacy can simultaneously enforce ɛ-differential privacy and maintain an efficient fingerprint recognition.

References

[1]
Kai Cao and Anil K. Jain. 2018. Automated latent fingerprint recognition. IEEE Trans. Pattern Anal. Mach. Intell 41, 4 (2018), 788–800, 2018.
[2]
Sandhya, Mulagala, Munaga V. N. K Prasad, and Raghavendra Rao Chillarige. 2016. Generating cancellable fingerprint templates based on Delaunay triangle feature set construction. IET Biometr. 5, 2 (2016), 131–139, (2016).
[3]
Orane Cole and Khalil El-Khatib. 2017.A Privacy Enhanced Facial Recognition Access Control System Using Biometric Encryption. In Proceedings of 13th International Conference on Distributed Computing in Sensor Systems (DCOSS’17).
[4]
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/Off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). 781–792.
[5]
Badiul Alam, Zhe Jin, Wun-She Yap, and Bok-Min Goi. 2018. An alignment-free cancelable fingerprint template for bio-cryptosystems. J. Netw. Comput. Appl. 115 (2018), 20–32.
[6]
Zhe Jin, Bok-Min Goi, Andrew Teoh, and Yong Haur Tay. 2013. A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template. Secur. Commun. Netw. 7, 11 (2013), 1691–1701.
[7]
Andrew Beng Jin Teoh and Chong Tze Yuang. 2019. Cancelable fingerprint template design with randomized non-negative least squares. Pattern Recogn. 91 (2019), 245–260.
[8]
Harkeerat Kaur and Pritee Khanna. 2015. Gaussian random projection based non-invertible cancelable biometric templates. Proc. Comput. Sci. 54 (2015), 661–670.
[9]
Shan Jia, Zhengquan Xu, Chuanbo Hu, and Hao Wang. 2018. Fingerprint template protection by adopting random projection based on re-encryption. J. Commun. 39, 2 (2018), 122–134 .
[10]
Chao-Yung Hsu, Chun-Shien Lu, Soo-Chang Pei. 2012. Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Sign. Process. 21, 11 (2012), 4593–4607.
[11]
Noah Johnson, Joseph P. Near, and Dawn Song. 2018. Towards practical differential privacy for SQL queries. Proc. VLDB Endow. 11, 5 (2018), 526–539.
[12]
Zheng Zhigao, Wang Tao, Wen Jinming, Mumtaz Shahid, Bashir Ali Kashif, and Chauhdary Sajjad Hussain. 2020. Differentially private high-dimensional data publication in internet of things. IEEE IoT J. 7, 4 (2020), 2640–2650.
[13]
Jianbing Ni, Kuan Zhang, Khalid Alharbi, Xiaodong Lin, Ning Zhang and Xuemin Shen. 2017. Differentially private smart metering with fault tolerance and range-based filtering. IEEE Trans. Smart Grid 8, 5 (2017), 2483–258.
[14]
Tao Wang, Zhigao Zheng, and Mohamed Elhoseny. 2019. Equivalent mechanism: Releasing location data with errors through differential privacy.Fut. Gener. Comput. Syst. 98 (2019), 600–608.
[15]
Reza Parsamehr, Alireza Esfahani, Georgios Mantas, Ayman Radwan, Shahid Mumtaz, Jonathan Rodriguez, and José-Fernàn Martinez-Ortega. 2019. A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells. IEEE Trans. Comput. Soc. Syst. 6, 6 (2019), 1467–1477.
[16]
Zuhe Zhang, Benjamin I. P. Rubinstein, and Christos Dimitrakakis. 2016. On the differential privacy of Bayesian inference. In Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI-16). 2365–2371.
[17]
Fang Liu. 2018. Generalized Gaussian mechanism for differential privacy. IEEE Trans. Knowl. Data Eng. 31, 4 (2018), 747–756.
[18]
Eric Lantz, Madison, Kendrick Boyd, and David Page. 2015. Subsampled Exponential Mechanism: Differential Privacy in Large Output Spaces. In Proceedings of 8th ACM Workshop on Artificial Intelligence and Security (AISec’15), 25–33.
[19]
Anru Zhang, and Dong Xia. 2018. Tensor SVD: Statistical and computational limits. IEEE Trans. Inf. Theory 64, 11 (2018), 7311–7338.
[20]
Xiaokui Xiao, Guozhang Wang, and Johannes Gehrke. 2011. Differential privacy via wavelet transforms. IEEE Trans. Knowl. Data Eng. 23, 8 (2011), 1200–1214.
[21]
Dario Maio, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain. 2002. FVC2000: Fingerprint Verification Competition. IEEE Trans. Pattern Analy. Mach. Intell. 24, 3 (2002), 402–412.
[22]
Dario Maio, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain. 2002. FVC2002: Second Fingerprint Verification Competition. In Proceedings of IEEE Object Recognition Supported by User Interaction for Service Robots. 811–814.
[23]
Dario Maio, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain. 2004. FVC2004: Third Fingerprint Verification Competition. In Proceedings of International Conference on Biometric Authentication. Springer, Berlin, 1–7.
[24]
Michael Hay, Vibhor Rastogi, Gerome Miklau, and Dan Suciu. 2010. Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB Endow. 3, 1-2 (2010), 1021–1032.

Cited By

View all
  • (2024)AFaceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36435108:1(1-33)Online publication date: 6-Mar-2024
  • (2024)Research on Fingerprint Image Differential Privacy Protection Publishing Method Based on Wavelet Transform and Singular Value Decomposition TechnologyIEEE Access10.1109/ACCESS.2024.336799612(28417-28436)Online publication date: 2024
  • (2024)Research on Local Fingerprint Image Differential Privacy Protection Method Based on Clustering Algorithm and Regression Algorithm Segmentation ImageIEEE Access10.1109/ACCESS.2024.336349412(27127-27146)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Internet Technology
    ACM Transactions on Internet Technology  Volume 21, Issue 3
    August 2021
    522 pages
    ISSN:1533-5399
    EISSN:1557-6051
    DOI:10.1145/3468071
    • Editor:
    • Ling Liu
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 June 2021
    Online AM: 07 May 2020
    Accepted: 01 March 2020
    Revised: 01 January 2020
    Received: 01 November 2019
    Published in TOIT Volume 21, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. fingerprint
    2. differential privacy
    3. low-rank matrix approximation
    4. sensitivity

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • National Natural Science Foundation of China
    • Fundamental Research Funds for the Central Universities (the China University of Geosciences (Wuhan), and Wuhan University)
    • Wuhan Applied Basic Research Program

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)54
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 30 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)AFaceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36435108:1(1-33)Online publication date: 6-Mar-2024
    • (2024)Research on Fingerprint Image Differential Privacy Protection Publishing Method Based on Wavelet Transform and Singular Value Decomposition TechnologyIEEE Access10.1109/ACCESS.2024.336799612(28417-28436)Online publication date: 2024
    • (2024)Research on Local Fingerprint Image Differential Privacy Protection Method Based on Clustering Algorithm and Regression Algorithm Segmentation ImageIEEE Access10.1109/ACCESS.2024.336349412(27127-27146)Online publication date: 2024
    • (2023)Scalable Federated Learning for Fingerprint Recognition Algorithm2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00045(181-188)Online publication date: 1-Nov-2023
    • (2023)Vehicle Trajectory Prediction in Connected Environments via Heterogeneous Context-Aware Graph Convolutional NetworksIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2022.317394424:8(8452-8464)Online publication date: 1-Aug-2023
    • (2023)DPPT : A differential privacy preservation technique for cyber–physical systemComputers and Electrical Engineering10.1016/j.compeleceng.2023.108661109(108661)Online publication date: Jul-2023
    • (2022)A Fingerprint Matching Algorithm Using the Combination of Edge Features and Convolution Neural NetworksInventions10.3390/inventions70200397:2(39)Online publication date: 27-May-2022
    • (2022)A Survey on Differential Privacy for Unstructured Data ContentACM Computing Surveys10.1145/349023754:10s(1-28)Online publication date: 13-Sep-2022
    • (2022)Privacy-preserving aware data aggregation for IoT-based healthcare with green computing technologiesComputers and Electrical Engineering10.1016/j.compeleceng.2022.108025101:COnline publication date: 1-Jul-2022
    • (2021)Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to ServerIEEE Transactions on Reliability10.1109/TR.2020.302179470:3(1014-1025)Online publication date: Sep-2021
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media