Download Fingerprint combination for privacy protection abstract objects







Do you want to read the rest of this article? For full functionality of ResearchGate it is necessary to enable JavaScript. Kot Abstract A fingerprint authentication system for the privacy protection of the fingerprint template stored in a database is introduced here. The considered fingerprint data is a binary thinned fingerprint image, which will be embedded with some private user information without causing obvious abnormality in the enrollment phase. In the authentication phase, these hidden user data can be extracted from the fingerprint combination for privacy protection abstract objects template for verifying the authenticity of the person who provides the query fingerprint. A novel data hiding scheme is proposed for the thinned fingerprint template. This scheme does not produce any boundary pixel in the thinned fingerprint during data embedding. Thus, the abnormality caused by data hiding is visually imperceptible in the marked-thinned fingerprint. Compared with using existing binary image data hiding techniques, the proposed method causes the least abnormality for a thinned fingerprint without compromising the performance of the fingerprint identification. Traditional encryption is not sufficient for privacy protection of fingerprint because before the fingerprint matching decryption is required, which exposes the fingerprint to the attacker. Therefore, in recent years, significant efforts have been put into developing specific protection techniques for fingerprint. In this paper various methods for recognizing fingerprint has been surveyed. We have introduced the idea of combining biometrics such that the combined biometric would not be a unique identifier of the person, yet it could still be successfully used for authentication purposes. Our method employs a dynamic system structure with the redesigned fundamental content adaptive processes CAP switch to iteratively trace new contour segments and to search for new DCPLs. By maintaining and updating a location status map, a protective mechanism is proposed to preserve the context of each CAP and their corresponding outcomes.



Privacy Protection of Fingerprint Database
IJCA - Privacy Protection using Random Combination of Fingerprints
IJCA - Privacy Protection using Random Combination of Fingerprints