Biometric Fingerprint Combination to Improve AnonymityProtection
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Fingerprint techniques are widely used in authentication systems, therefore its privacy protectionbecomes an important issue. Securing a stored fingerprint template is very important because once fingerprintsare compromised, it cannot be easily revoked. So, we review here a new system for preserving fingerprintconfidentiality. In this system, the fingerprint privacy is maintained by combining two different fingerprints intoa new identity. In the enrollment phase, two fingerprints are taken from two different fingers. We obtain theminutiae positions of one fingerprint, the orientation of another fingerprint, and the reference points from bothfingerprints. Based on the obtained information, a combined minutiae template is generated and stored in adatabase. In the authentication phase, we use the fingerprints of the same fingers that are already used inenrollment phase. For matching the two query fingerprints against a combined minutiae template, a two-stagefingerprint matching process is used. By storing the combined minutiae template in the database, the completeminutiae characteristic of a single fingerprint will not be compromised when the database is stolen by theattackers. The attacker cannot distinguish a combined minutiae template from the original minutiae templatesas there is a similarity in topology. The combined minutiae template is converted into a real-look alikecombined fingerprint by using existing fingerprint reconstruction approach. This results into a new virtualidentity for the two different fingerprints. This new virtual identity can be matched using minutiae-basedfingerprint matching algorithms. The main objective of this paper is to review the fingerprint privacy protectionschemes
Authors and Affiliations
Urmila M. Sawant , Kalyan K. Pattekar , Prof. S. D. Sapkal , Dr. R. R. Deshmukh
Transforming XML into Object-Relational Schema
Abstract: Recently, there is a vast increase in the use of XML for describing and exchanging data. To manipulate efficiently these data, it would be wise to use database systems which represent an appropriate tool to sto...
Effect of Using Reclaimed Asphalt Pavement on Asphalt MixPerformance
Abstract: Throughout history, the earth`s resources have been exploited without considering their eventuallimitations. At present, one of the key challenges is to concentrate on saving natural resources for futureg...
A Word Stemming Algorithm for Hausa Language
Abstract: Hausa, a highly inflected language, needs a worthy stemming approach for efficient informationretrieval (IR). However, there is a limited or unavailable study to stemming in the language. Stemming refers tothe...
An Indepth Understanding of e-Procurement: A Case Study Approach
Visual GDML, an open-source software for building and visualizing Geant4 geometry based on the GDML markup language
Background and Objective: An open-source software called VisualGDML which is dedicated for geometrical and material specifications using the GDML markup language has been developed for Monte Carlo Geant4 code. Methods: T...