Generate new identity from fingerprints for privacy protection

Abstract

We propose here a novel system for privacy protection of fingerprint by merging two fingerprints & generate new identity. In the enrollment phase, two fingerprints are taken from two different fingers of one person. From one fingerprint we extract the minutiae positions, from the other fingerprint we extract the orientations, and from both fingerprints we extract the reference points. From this extracted information and our coding strategies, we generate combined minutiae template and that generated combined minutiae template stored in a database. During authentication phase, the system requires two query fingerprints from the same two fingers of one person which are used during enrollment phase. A two-stage fingerprint matching system is used for matching the two query finger-prints from the same two fingers of one person against a combined minutiae template which is stored in database. By storing the combined minutiae template in the database, the complete minutiae positions of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is very difficult for the attacker to differentiate a combined minutiae template from the original minutiae templates. With the help of an existing fingerprint reconstruction approach, we are able to reconstruct the combined minutiae template into a new virtual identity of merged fingerprints. Thus, a new virtual identity is generated from merging the two different fingerprints of one person, which can be matched using minutiae based fingerprint matching algorithms. The experimental results shows that our system can achieve a very low error rate.

Authors and Affiliations

Ujma A. Mulla

Keywords

Related Articles

A Comparative Study of Different Client Server Applications in Java with Their Implementation

The client/server system consists of two logical components - a server, which offers a service and a client, which requests a service from the server. Both components, therefore, form architecture with distributed respo...

Review of MAC Protocol for WSN

In this paper with the widespread rapid development of computers and the wireless communication, the mobile computing becomes the field of computer communications in high profile link. In wireless networks, the data is...

Secure and Authorized De-duplication Model in Hybrid Cloud Implementation by Using Multi- Layered Cryptosystem

de-duplication is a standout amongst imperative information layering systems for eliminating copy duplicates for repeat decimal data, and need been generally utilized within cloud capacity to decrease the measure of sto...

Strength gain Analysis of high volume fly ash concrete using stone dust and recycled aggregates

The addition of fly ash to concrete enhances the mechanical properties of fly ash. The addition of fly ash not only lowers the cost of concrete production but also gives it a sustainable approach. The study undertakes t...

MANET Routing Protocols: A Comparison

Mobile Ad-hoc Networks (MANETs) have built up another measurement in field of remote systems. It permits any number of hubs to speak with each other without brought together support. This paper provides a detailed class...

Download PDF file
  • EP ID EP23057
  • DOI -
  • Views 298
  • Downloads 5

How To Cite

Ujma A. Mulla (2017). Generate new identity from fingerprints for privacy protection. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(1), -. https://europub.co.uk/articles/-A-23057