Fingerprint Combination of Privacy Preservation is Improved by Delaunay Triangulation Method

Article Preview

Abstract:

Fingerprints are graphical ridge and valley patterns on the tips of human fingers. Owing to their uniqueness and permanence, the use of fingerprints is considered to be one of the most reliable methods of personal verification. Fingerprints are today among the most popularly used biometric modalities in automatic verification systems. At the same time, Protecting the privacy of Fingerprint is an important one, here a novel system propose protecting fingerprint by combining two different fingerprints. In the enrolment stage, fingerprints will be captured from two different fingers. Minutiae positions are extracted from one fingerprint (its the detailed pattern of the fingerprint). The orientation, (it indicates the flow of ridges and valleys) from other fingerprint, and the reference points are calculated from both the two fingerprints. Extracted combined minutiae templates are stored into database. Here A Delaunay Triangulation indexing scheme has been designed for protecting biometric template and non-invertible template are calculated for verifies the authorized person. By using the Delaunay triangulation method fingerprint privacy has to be improved.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

437-441

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A. Ross and A. Othman, Visual cryptography for biometric privacy, IEEE Trans. Inf. Forensic Security vol. 6, no. 1, pp.7-0–81, Mar. 2 011.

Google Scholar

[2] A. Othman and A. Ross, Mixing ingerprints for generating virtual identities, inProc. IEEE Int. Forensics and Security (WIFS), Foz do Iguacu, Brazil, Nov. 29–Dec. 2, (2011).

DOI: 10.1109/wifs.2011.6123152

Google Scholar

[3] B. J .A. Teoh, C. L. D. Ngo, and A. Goh, Biohashing: Two factor authentication featuring fingerprint data and tokenized random number, Pattern Recognit., vol. 37, no. 11, p.2245–2255, (2004).

DOI: 10.1016/j.patcog.2004.04.011

Google Scholar

[4] B. Yanikoglu and A. Kholmatov , Combining Multiple biometrics to protect privacy, in Proc. ICPR- BCTP workshop, Cambridge,U. K,., Aug. (2004).

Google Scholar

[5] J. Feng and A. K. Jain, Fingerprint reconstruction: From minutiae to phase, IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 2, p.209–223, Feb. (2011).

DOI: 10.1109/tpami.2010.77

Google Scholar

[6] K. Nilsson and J. Bigun, Localization of corresponding points in fingerprints by complex filtering, Pattern Recognit. Lett., vol. 24, no. 13, p.2135–2144, (2003).

DOI: 10.1016/s0167-8655(03)00083-7

Google Scholar

[7] L. Hong, Y. F Wan, and A. Jain, Fingerprint image enhancement: Algorithm and performance evaluation, IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, no. 8, p.777–789, Aug. (1998).

DOI: 10.1109/34.709565

Google Scholar

[8] VeriFinger 6. 3. Available: http: /www. neurotechnology. com.

Google Scholar

[9] W.B.A.A. Biometrie Eneryption System Based on Delaunay Indexing Method, 2013 International Conference on Circuits, Power and Computing Technologies.

Google Scholar

[10] X. Jiang andW. Yau, Fingerprint minutiae matching based on the local and global structures, in Proc. 15th Int. Conf. Pattern Recognition, 2000, vol. 2, p.1038–1041.

DOI: 10.1109/icpr.2000.906252

Google Scholar