Privacy protection based on binary fingerprint compression
- 139 Downloads
This paper proposes a novel system to protect the fingerprint database based on compressed binary fingerprint images. In this system, the user can store private data with high capacity. First, the grayscale fingerprint image is transformed into a binary bitstream. Then, the binary bitstream is compressed using run-length encoding and Huffman encoding technique to create a sparse space to accommodate private data. Finally, the new image constructed by the obtained binary bitstream is encrypted with an encryption key. For fingerprint matching, it is only need to decrypt and decompress the encrypted image in the database to obtain the binary fingerprint image. When the matching is passed, the private data can be extracted to a user with data-embedding key. If the matching is failed, the private data cannot extracted for the purpose of privacy security. Even if a leakage of the encryption key occurs, this system can still protect the privacy data of the user due to the existence of the data-embedding key. Meanwhile, the encoding and decoding phases are real time, which guarantee the practicability of the proposed system.
KeywordsData hiding Fingerprint Image encryption High capacity
This work was supported in part by the National Natural Science Foundation of China under Grant 61602294, in part by the Shanghai Sailing Program under Grant 16YF1404100.
- 1.Jain, A.K., Kumar, A.: Biometric recognition: an overview. In: Second generation biometrics: the ethical, legal and social context, pp. 49–79. Springer, New York (2012)Google Scholar
- 5.Li, S., Zhang, X., Qian, Z., Feng, G., Ren, Y.: Key based artificial fingerprint generation for privacy protection. IEEE Trans. Dependable Secure Comput. https://doi.org/10.1109/TDSC.2018.2812192
- 7.Thanki, R., Borisagar, K.: Biometric watermarking technique based on CS theory and fast discrete curvelet transform for face and fingerprint protection. In: Advances in Signal Processing and Intelligent Recognition Systems, pp. 133–144. Springer, New York (2016)Google Scholar
- 8.Sandhya, M., Prasad, M.V.N.K.: \(k\)-Nearest neighborhood structure (\(k\)-NNS) based alignment-free method for fingerprint template protection. In: 2015 International Conference on Biometrics (ICB), pp. 386–393. IEEE, New York (2015)Google Scholar
- 11.Ferrara, M., Maltoni, D., Cappelli, R.: A two-factor protection scheme for MCC fingerprint templates. In: Proceedings of the Lecture Notes in Informatics (LNI). Series of the Gesellschaft fur Informatik (GI), vol. 01, pp. 171–178 (2014)Google Scholar
- 12.Choudhury, B., Then, P., Raman, V., Issac, B., Haldar, M.K.: Cancelable iris biometrics based on data hiding schemes. In: 2016 IEEE Student Conference on Research and Development (SCOReD), pp. 1–6. IEEE, New York (2016)Google Scholar
- 14.Qin, C., Zhou, Q., Cao, F., Dong, J., Zhang, X.: Flexible lossy compression for selective encrypted image with image inpainting. IEEE Trans. Circuits Syst. Video Technol. https://doi.org/10.1109/TCSVT.2018.2878026