skip to main content
research-article

FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification

Authors Info & Claims
Published:16 June 2021Publication History
Skip Abstract Section

Abstract

Fingerprint provides an extremely convenient way of identification for a wide range of real-life applications owing to its universality, uniqueness, collectability, and invariance. However, digitized fingerprints may reveal the privacy of individuals. Differential privacy is a promising privacy-preserving solution that is enforced by injecting random noise into preserved objects, such that an adversary with arbitrary background knowledge cannot infer private input from the noisy results. This study proposes FinPrivacy, a privacy-preserving mechanism for fingerprint identification. This mechanism utilizes the low-rank matrix approximation to reduce the dimensionality of fingerprint and the exponential mechanism to carefully determine the value of the optimal rank. Thereafter, FinPrivacy injects Laplace noise to the singular values of the approximated singular matrix, thereby trading off between privacy and utility. Analytic proofs and results of the comparative experiments demonstrate that FinPrivacy can simultaneously enforce ɛ-differential privacy and maintain an efficient fingerprint recognition.

References

  1. Kai Cao and Anil K. Jain. 2018. Automated latent fingerprint recognition. IEEE Trans. Pattern Anal. Mach. Intell 41, 4 (2018), 788–800, 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Sandhya, Mulagala, Munaga V. N. K Prasad, and Raghavendra Rao Chillarige. 2016. Generating cancellable fingerprint templates based on Delaunay triangle feature set construction. IET Biometr. 5, 2 (2016), 131–139, (2016).Google ScholarGoogle ScholarCross RefCross Ref
  3. Orane Cole and Khalil El-Khatib. 2017.A Privacy Enhanced Facial Recognition Access Control System Using Biometric Encryption. In Proceedings of 13th International Conference on Distributed Computing in Sensor Systems (DCOSS’17).Google ScholarGoogle ScholarCross RefCross Ref
  4. Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/Off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). 781–792. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Badiul Alam, Zhe Jin, Wun-She Yap, and Bok-Min Goi. 2018. An alignment-free cancelable fingerprint template for bio-cryptosystems. J. Netw. Comput. Appl. 115 (2018), 20–32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Zhe Jin, Bok-Min Goi, Andrew Teoh, and Yong Haur Tay. 2013. A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template. Secur. Commun. Netw. 7, 11 (2013), 1691–1701. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Andrew Beng Jin Teoh and Chong Tze Yuang. 2019. Cancelable fingerprint template design with randomized non-negative least squares. Pattern Recogn. 91 (2019), 245–260.Google ScholarGoogle ScholarCross RefCross Ref
  8. Harkeerat Kaur and Pritee Khanna. 2015. Gaussian random projection based non-invertible cancelable biometric templates. Proc. Comput. Sci. 54 (2015), 661–670.Google ScholarGoogle ScholarCross RefCross Ref
  9. Shan Jia, Zhengquan Xu, Chuanbo Hu, and Hao Wang. 2018. Fingerprint template protection by adopting random projection based on re-encryption. J. Commun. 39, 2 (2018), 122–134 .Google ScholarGoogle Scholar
  10. Chao-Yung Hsu, Chun-Shien Lu, Soo-Chang Pei. 2012. Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Sign. Process. 21, 11 (2012), 4593–4607. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Noah Johnson, Joseph P. Near, and Dawn Song. 2018. Towards practical differential privacy for SQL queries. Proc. VLDB Endow. 11, 5 (2018), 526–539. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Zheng Zhigao, Wang Tao, Wen Jinming, Mumtaz Shahid, Bashir Ali Kashif, and Chauhdary Sajjad Hussain. 2020. Differentially private high-dimensional data publication in internet of things. IEEE IoT J. 7, 4 (2020), 2640–2650.Google ScholarGoogle Scholar
  13. Jianbing Ni, Kuan Zhang, Khalid Alharbi, Xiaodong Lin, Ning Zhang and Xuemin Shen. 2017. Differentially private smart metering with fault tolerance and range-based filtering. IEEE Trans. Smart Grid 8, 5 (2017), 2483–258.Google ScholarGoogle ScholarCross RefCross Ref
  14. Tao Wang, Zhigao Zheng, and Mohamed Elhoseny. 2019. Equivalent mechanism: Releasing location data with errors through differential privacy.Fut. Gener. Comput. Syst. 98 (2019), 600–608.Google ScholarGoogle ScholarCross RefCross Ref
  15. Reza Parsamehr, Alireza Esfahani, Georgios Mantas, Ayman Radwan, Shahid Mumtaz, Jonathan Rodriguez, and José-Fernàn Martinez-Ortega. 2019. A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells. IEEE Trans. Comput. Soc. Syst. 6, 6 (2019), 1467–1477.Google ScholarGoogle ScholarCross RefCross Ref
  16. Zuhe Zhang, Benjamin I. P. Rubinstein, and Christos Dimitrakakis. 2016. On the differential privacy of Bayesian inference. In Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI-16). 2365–2371. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Fang Liu. 2018. Generalized Gaussian mechanism for differential privacy. IEEE Trans. Knowl. Data Eng. 31, 4 (2018), 747–756. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Eric Lantz, Madison, Kendrick Boyd, and David Page. 2015. Subsampled Exponential Mechanism: Differential Privacy in Large Output Spaces. In Proceedings of 8th ACM Workshop on Artificial Intelligence and Security (AISec’15), 25–33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Anru Zhang, and Dong Xia. 2018. Tensor SVD: Statistical and computational limits. IEEE Trans. Inf. Theory 64, 11 (2018), 7311–7338.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Xiaokui Xiao, Guozhang Wang, and Johannes Gehrke. 2011. Differential privacy via wavelet transforms. IEEE Trans. Knowl. Data Eng. 23, 8 (2011), 1200–1214. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Dario Maio, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain. 2002. FVC2000: Fingerprint Verification Competition. IEEE Trans. Pattern Analy. Mach. Intell. 24, 3 (2002), 402–412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Dario Maio, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain. 2002. FVC2002: Second Fingerprint Verification Competition. In Proceedings of IEEE Object Recognition Supported by User Interaction for Service Robots. 811–814. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Dario Maio, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain. 2004. FVC2004: Third Fingerprint Verification Competition. In Proceedings of International Conference on Biometric Authentication. Springer, Berlin, 1–7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Michael Hay, Vibhor Rastogi, Gerome Miklau, and Dan Suciu. 2010. Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB Endow. 3, 1-2 (2010), 1021–1032. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 21, Issue 3
      August 2021
      522 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3468071
      • Editor:
      • Ling Liu
      Issue’s Table of Contents

      Copyright © 2021 Association for Computing Machinery.

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 June 2021
      • Online AM: 7 May 2020
      • Accepted: 1 March 2020
      • Revised: 1 January 2020
      • Received: 1 November 2019
      Published in toit Volume 21, Issue 3

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format