Generate new identity from fingerprints for privacy protection
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 1
Abstract
We propose here a novel system for privacy protection of fingerprint by merging two fingerprints & generate new identity. In the enrollment phase, two fingerprints are taken from two different fingers of one person. From one fingerprint we extract the minutiae positions, from the other fingerprint we extract the orientations, and from both fingerprints we extract the reference points. From this extracted information and our coding strategies, we generate combined minutiae template and that generated combined minutiae template stored in a database. During authentication phase, the system requires two query fingerprints from the same two fingers of one person which are used during enrollment phase. A two-stage fingerprint matching system is used for matching the two query finger-prints from the same two fingers of one person against a combined minutiae template which is stored in database. By storing the combined minutiae template in the database, the complete minutiae positions of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is very difficult for the attacker to differentiate a combined minutiae template from the original minutiae templates. With the help of an existing fingerprint reconstruction approach, we are able to reconstruct the combined minutiae template into a new virtual identity of merged fingerprints. Thus, a new virtual identity is generated from merging the two different fingerprints of one person, which can be matched using minutiae based fingerprint matching algorithms. The experimental results shows that our system can achieve a very low error rate.
Authors and Affiliations
Ujma A. Mulla
A Comparative Study of Different Client Server Applications in Java with Their Implementation
The client/server system consists of two logical components - a server, which offers a service and a client, which requests a service from the server. Both components, therefore, form architecture with distributed respo...
Review of MAC Protocol for WSN
In this paper with the widespread rapid development of computers and the wireless communication, the mobile computing becomes the field of computer communications in high profile link. In wireless networks, the data is...
Secure and Authorized De-duplication Model in Hybrid Cloud Implementation by Using Multi- Layered Cryptosystem
de-duplication is a standout amongst imperative information layering systems for eliminating copy duplicates for repeat decimal data, and need been generally utilized within cloud capacity to decrease the measure of sto...
Strength gain Analysis of high volume fly ash concrete using stone dust and recycled aggregates
The addition of fly ash to concrete enhances the mechanical properties of fly ash. The addition of fly ash not only lowers the cost of concrete production but also gives it a sustainable approach. The study undertakes t...
MANET Routing Protocols: A Comparison
Mobile Ad-hoc Networks (MANETs) have built up another measurement in field of remote systems. It permits any number of hubs to speak with each other without brought together support. This paper provides a detailed class...