Abstract
Fingerprint provides an extremely convenient way of identification for a wide range of real-life applications owing to its universality, uniqueness, collectability, and invariance. However, digitized fingerprints may reveal the privacy of individuals. Differential privacy is a promising privacy-preserving solution that is enforced by injecting random noise into preserved objects, such that an adversary with arbitrary background knowledge cannot infer private input from the noisy results. This study proposes FinPrivacy, a privacy-preserving mechanism for fingerprint identification. This mechanism utilizes the low-rank matrix approximation to reduce the dimensionality of fingerprint and the exponential mechanism to carefully determine the value of the optimal rank. Thereafter, FinPrivacy injects Laplace noise to the singular values of the approximated singular matrix, thereby trading off between privacy and utility. Analytic proofs and results of the comparative experiments demonstrate that FinPrivacy can simultaneously enforce ɛ-differential privacy and maintain an efficient fingerprint recognition.
- Kai Cao and Anil K. Jain. 2018. Automated latent fingerprint recognition. IEEE Trans. Pattern Anal. Mach. Intell 41, 4 (2018), 788–800, 2018. Google ScholarDigital Library
- Sandhya, Mulagala, Munaga V. N. K Prasad, and Raghavendra Rao Chillarige. 2016. Generating cancellable fingerprint templates based on Delaunay triangle feature set construction. IET Biometr. 5, 2 (2016), 131–139, (2016).Google ScholarCross Ref
- Orane Cole and Khalil El-Khatib. 2017.A Privacy Enhanced Facial Recognition Access Control System Using Biometric Encryption. In Proceedings of 13th International Conference on Distributed Computing in Sensor Systems (DCOSS’17).Google ScholarCross Ref
- Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/Off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). 781–792. Google ScholarDigital Library
- Badiul Alam, Zhe Jin, Wun-She Yap, and Bok-Min Goi. 2018. An alignment-free cancelable fingerprint template for bio-cryptosystems. J. Netw. Comput. Appl. 115 (2018), 20–32.Google ScholarDigital Library
- Zhe Jin, Bok-Min Goi, Andrew Teoh, and Yong Haur Tay. 2013. A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template. Secur. Commun. Netw. 7, 11 (2013), 1691–1701. Google ScholarDigital Library
- Andrew Beng Jin Teoh and Chong Tze Yuang. 2019. Cancelable fingerprint template design with randomized non-negative least squares. Pattern Recogn. 91 (2019), 245–260.Google ScholarCross Ref
- Harkeerat Kaur and Pritee Khanna. 2015. Gaussian random projection based non-invertible cancelable biometric templates. Proc. Comput. Sci. 54 (2015), 661–670.Google ScholarCross Ref
- Shan Jia, Zhengquan Xu, Chuanbo Hu, and Hao Wang. 2018. Fingerprint template protection by adopting random projection based on re-encryption. J. Commun. 39, 2 (2018), 122–134 .Google Scholar
- Chao-Yung Hsu, Chun-Shien Lu, Soo-Chang Pei. 2012. Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Sign. Process. 21, 11 (2012), 4593–4607. Google ScholarDigital Library
- Noah Johnson, Joseph P. Near, and Dawn Song. 2018. Towards practical differential privacy for SQL queries. Proc. VLDB Endow. 11, 5 (2018), 526–539. Google ScholarDigital Library
- Zheng Zhigao, Wang Tao, Wen Jinming, Mumtaz Shahid, Bashir Ali Kashif, and Chauhdary Sajjad Hussain. 2020. Differentially private high-dimensional data publication in internet of things. IEEE IoT J. 7, 4 (2020), 2640–2650.Google Scholar
- Jianbing Ni, Kuan Zhang, Khalid Alharbi, Xiaodong Lin, Ning Zhang and Xuemin Shen. 2017. Differentially private smart metering with fault tolerance and range-based filtering. IEEE Trans. Smart Grid 8, 5 (2017), 2483–258.Google ScholarCross Ref
- Tao Wang, Zhigao Zheng, and Mohamed Elhoseny. 2019. Equivalent mechanism: Releasing location data with errors through differential privacy.Fut. Gener. Comput. Syst. 98 (2019), 600–608.Google ScholarCross Ref
- Reza Parsamehr, Alireza Esfahani, Georgios Mantas, Ayman Radwan, Shahid Mumtaz, Jonathan Rodriguez, and José-Fernàn Martinez-Ortega. 2019. A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells. IEEE Trans. Comput. Soc. Syst. 6, 6 (2019), 1467–1477.Google ScholarCross Ref
- Zuhe Zhang, Benjamin I. P. Rubinstein, and Christos Dimitrakakis. 2016. On the differential privacy of Bayesian inference. In Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI-16). 2365–2371. Google ScholarDigital Library
- Fang Liu. 2018. Generalized Gaussian mechanism for differential privacy. IEEE Trans. Knowl. Data Eng. 31, 4 (2018), 747–756. Google ScholarDigital Library
- Eric Lantz, Madison, Kendrick Boyd, and David Page. 2015. Subsampled Exponential Mechanism: Differential Privacy in Large Output Spaces. In Proceedings of 8th ACM Workshop on Artificial Intelligence and Security (AISec’15), 25–33. Google ScholarDigital Library
- Anru Zhang, and Dong Xia. 2018. Tensor SVD: Statistical and computational limits. IEEE Trans. Inf. Theory 64, 11 (2018), 7311–7338.Google ScholarDigital Library
- Xiaokui Xiao, Guozhang Wang, and Johannes Gehrke. 2011. Differential privacy via wavelet transforms. IEEE Trans. Knowl. Data Eng. 23, 8 (2011), 1200–1214. Google ScholarDigital Library
- Dario Maio, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain. 2002. FVC2000: Fingerprint Verification Competition. IEEE Trans. Pattern Analy. Mach. Intell. 24, 3 (2002), 402–412. Google ScholarDigital Library
- Dario Maio, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain. 2002. FVC2002: Second Fingerprint Verification Competition. In Proceedings of IEEE Object Recognition Supported by User Interaction for Service Robots. 811–814. Google ScholarDigital Library
- Dario Maio, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain. 2004. FVC2004: Third Fingerprint Verification Competition. In Proceedings of International Conference on Biometric Authentication. Springer, Berlin, 1–7. Google ScholarDigital Library
- Michael Hay, Vibhor Rastogi, Gerome Miklau, and Dan Suciu. 2010. Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB Endow. 3, 1-2 (2010), 1021–1032. Google ScholarDigital Library
Index Terms
- FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification
Recommendations
Protecting sensitive place visits in privacy-preserving trajectory publishing
Highlights- We propose a method for privacy-preserving trajectory publishing.
- It aims at ...
AbstractThe rise of mobile computing has generated huge amount of trajectory data. Since these data are valuable for many people, publishing them while providing adequate individual privacy protection has been a challenging task. In this paper,...
Enhancing the Trajectory Privacy with Laplace Mechanism
TRUSTCOM '15: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01Mobile-aware service systems are dramatically increasing the amount of personal data released to service providers as well as to third parties. Data may reveal individuals' physical conditions, habits, and sensitive information. It raises serious ...
Personality-based Knowledge Extraction for Privacy-preserving Data Analysis
K-CAP '17: Proceedings of the 9th Knowledge Capture ConferenceIn this paper, we present a differential privacy preserving approach, which extracts personality-based knowledge to serve privacy guarantee data analysis on personal sensitive data. Based on the approach, we further implement an end-to-end privacy ...
Comments