A Robust and Efficient Finger Print Combination form Privacy Protection


Abdullah S. Alotaibi,




Fingerprint,Combination,Protection,Minutiae,Privacy ,


Now a day’s fingerprint techniques are widely used in authentication systems, therefore its privacy protection becomes an important issue. Securing a stored fingerprint template is very important because once fingerprints are compromised, it cannot be easily revoked. So, we review here a new system for preserving fingerprint confidentiality. In this system, the fingerprint privacy is maintained by combining two special fingerprints keen on a original identity. In the enlistment phase, two fingerprints need aid taken from two different fingers. We acquire the minutiae positions about one fingerprint, the introduction from claiming another fingerprint, and the reference focuses starting with both fingerprints. In view of those gotten information, a joined minutiae format may be created Also saved previously, a database. In the Confirmation phase, we utilize the fingerprints of the same fingers that need aid at that point utilized within enlistment stage. For same 2 finger prints against a mutual minutiae template, a two-stage fingerprint matching process is used. By storing the combined minutiae template in the database, the complete minutiae characteristic of a single fingerprint will not be compromised when the database is stolen by the attackers. The joined minutiae format will be changed over under a real-look indistinguishable joined together finger impression by utilizing existing finger impression reproduction approach. These effects under another virtual character to those two different fingerprints.


I.A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, “An analysis of biohashing and its variants,” Pattern Recognit., vol. 39, no. 7, pp. 1359–1368,2006.
II.A. Nagar, K. Nandakumar, and A. K. Jain, “Biometric template transforma- tion: A security analysis,” in Proc. SPIE, Electron. Imaging, Media Forensics and Security, San Jose, Jan. 2010.
III.A. Othman and A. Ross, “Mixing fingerprints for generating virtual identi- ties,” in Proc. IEEE Int. Workshop on Inform. Forensics and Security (WIFS),Foz do Iguacu, Brazil, Nov. 29–Dec. 2, 2011.
IV.A. Ross and A. Othman, “Mixing fingerprints for template security and priva-cy,” in Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug.29–Sep. 2, 2011.
V.B. Yanikoglu and A. Kholmatov, “Combining multiple biometrics to protect privacy,” in Proc. ICPR- BCTP Workshop, Cambridge, U.K., Aug. 2004.
VI.B. J. A. Teoh, C. L. D. Ngo, and A. Goh, “Biohashing: Two factor authentica-tion featuring fingerprint data and tokenised random number,” Pattern Recog-nit., vol. 37, no. 11, pp. 2245–2255, 2004.
VII.E. Camlikaya, A. Kholmatov, and B. Yanikoglu, “Multi-biometric templates using fingerprint and voice,” Proc. SPIE, vol. 69440I, pp. 69440I-1–69440I-9,2008.
VIII.K. G. Larkin and P. A. Fletcher, “A coherent framework for fingerprint analy-sis: Are fingerprints holograms?,” Opt. Express, vol. 15, pp. 8667–8677, 2007.
IX.K. Nandakumar, A. K. Jain, and S. Pankanti, “Fingerprint-based fuzzy vault:Implementation and performance,” IEEE Trans. Inf. Forensics Security, vol. 2,no. 4, pp. 744–57, Dec. 2007.
X.N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating can-celable fingerprint templates,” IEEE Trans. Pattern Anal. Mach. Intell., vol.29, no. 4, pp. 561–72, Apr. 2007
XI.S. Li and A. C. Kot, “A novel system for fingerprint privacy protection,” in Proc. 7th Int. Conf. Inform. Assurance and Security (IAS), Dec. 5–8, 2011, pp.262–266.
XII.S. Li and A. C. Kot, “Privacy protection of fingerprint database,” IEEE Signal Process. Lett., vol. 18, no. 2, pp. 115–118, Feb. 2011. [9] A. Ross and A.Othman, “Visual cryptography for biometric privacy,” IEEE Trans. Inf. Fo-rensics Security, vol. 6, no. 1, pp. 70–81,Mar. 2011.
XIII.S. Li and A. C. Kot, “Attack using reconstructed fingerprint,” in Proc. IEEE Int. Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Bra-zil, Nov. 29–Dec. 2, 2011.
XIV.W. J. Scheirer and T. E. Boult, “Cracking fuzzy vaults and biometric encryp-tion,” in Proc. Biometrics Symp., Sep. 2007, pp. 34–39.
Abdullah S. Alotaibi View Download