skip to main content
10.1145/3579987.3586568acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

Privacy-preserving Deep-learning Models for Fingerprint Data using Differential Privacy

Published:24 April 2023Publication History

ABSTRACT

Fingerprint recognition is a widely adopted biometric authentication method that leverages the unique characteristics of fingerprints to identify individuals. Its applications range from access control and authentication to forensic science, making the development of a robust, precise, and secure model for fingerprint recognition and analysis of paramount importance. Recently, deep learning and machine learning models have shown promise in this field, however, the use of these models raises significant privacy concerns as there is a potential for private fingerprint data to be compromised. This research aims to address these concerns by incorporating differential privacy techniques to protect the privacy of fingerprints. It provides evidence that the use of differential privacy technique leads to acceptable trade-off between preserving the privacy of fingerprints and accuracy of fingerprint recognition systems while maintaining robustness against model inversion attacks. With a noise multiplier of 0.01, the verification model attains a good accuracy of 89.32% at privacy budget ε = 1.2 , and less than 80% at lower privacy budget for the identification model.

References

  1. Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 308--318.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Reza Abrishambaf, Hasan Demirel, and Izzet Kale. 2008. A Fully CNN Based Fingerprint Recognition System. 146 -- 149. https://doi.org/10.1109/CNNA.2008. 4588667Google ScholarGoogle Scholar
  3. Laith Alzubaidi, Jinglan Zhang, Amjad J Humaidi, Ayad Al-Dujaili, Ye Duan, Omran Al-Shamma, J Santamaría, Mohammed A Fadhel, Muthana Al-Amidie, and Laith Farhan. 2021. Review of deep learning: Concepts, CNN architectures, challenges, applications, future directions. Journal of big Data 8, 1 (2021), 1--74.Google ScholarGoogle ScholarCross RefCross Ref
  4. Y Amruth, BM Gopinatha, MP Gowtham, M Kiran, and Y Harshalatha. 2020. Fingerprint and Signature Authentication System using CNN. In 2020 IEEE International Conference for Innovation in Technology (INOCON). IEEE, 1--4.Google ScholarGoogle Scholar
  5. Esla Timothy Anzaku, Hosik Sohn, and Yong Man Ro. 2011. Privacy Preserving Facial and Fingerprint Multi-biometric Authentication. In Digital Watermarking, Hyoung-Joong Kim, Yun Qing Shi, and Mauro Barni (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 239--250.Google ScholarGoogle Scholar
  6. Giuseppe Ateniese, Luigi V Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, and Giovanni Felici. 2015. Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. International Journal of Security and Networks 10, 3 (2015), 137--150.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Subba Reddy Borra, G Jagadeeswar Reddy, and E Sreenivasa Reddy. 2018. Classification of fingerprint images with the aid of morphological operation and AGNN classifier. Applied computing and informatics 14, 2 (2018), 166--176.Google ScholarGoogle Scholar
  8. Kai Cao and Anil K Jain. 2018. Automated latent fingerprint recognition. IEEE transactions on pattern analysis and machine intelligence 41, 4 (2018), 788--800.Google ScholarGoogle Scholar
  9. Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, and Seyit Camtepe. 2020. Privacy preserving face recognition utilizing differential privacy. Computers & Security 97 (2020), 101951.Google ScholarGoogle ScholarCross RefCross Ref
  10. Zhaohe Chen, Ming Tang, and Jinghai Li. 2022. Inversion Attacks against CNN Models Based on Timing Attack. Security and Communication Networks 2022 (2022).Google ScholarGoogle Scholar
  11. Anurag Chowdhury, Simon Kirchgasser, Andreas Uhl, and Arun Ross. 2020. Can a CNN Automatically Learn the Significance of Minutiae Points for Fingerprint Matching?. In 2020 IEEE Winter Conference on Applications of Computer Vision (WACV). 340--348. https://doi.org/10.1109/WACV45572.2020.9093301Google ScholarGoogle ScholarCross RefCross Ref
  12. William L Croft, Jörg-Rüdiger Sack, andWei Shi. 2021. Obfuscation of images via differential privacy: from facial images to general images. Peer-to-Peer Networking and Applications 14, 3 (2021), 1705--1733.Google ScholarGoogle ScholarCross RefCross Ref
  13. Andreea-Monica Dinc Lzrescu, Simona Moldovanu, and Luminita Moraru. 2022. A Fingerprint Matching Algorithm Using the Combination of Edge Features and Convolution Neural Networks. Inventions 7, 2 (2022). https://doi.org/10. 3390/inventions7020039Google ScholarGoogle Scholar
  14. Cynthia Dwork. 2008. Differential privacy: A survey of results. In International conference on theory and applications of models of computation. Springer, 1--19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. 2006. Our data, ourselves: Privacy via distributed noise generation. In Annual international conference on the theory and applications of cryptographic techniques. Springer, 486--503.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science 9, 3--4 (2014), 211--407.Google ScholarGoogle Scholar
  17. David Evans. 2021. When Models Learn Too Much. In Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy (Virtual Event, USA) (CODASPY '21). Association for Computing Machinery, New York, NY, USA, 1. https://doi.org/10.1145/3422337.3450327Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Matt Fredrikson, Somesh Jha, and Thomas Ristenpart. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. 1322--1333.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Jiuxiang Gu, Zhenhua Wang, Jason Kuen, Lianyang Ma, Amir Shahroudy, Bing Shuai, Ting Liu, Xingxing Wang, Gang Wang, Jianfei Cai, et al. 2018. Recent advances in convolutional neural networks. Pattern Recognition 77 (2018), 354-- 377.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. 2019. Deep Neural Networks Classification over Encrypted Data. In Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy (Richardson, Texas, USA) (CODASPY '19). Association for Computing Machinery, New York, NY, USA, 97--108. https://doi.org/10.1145/3292006.3300044Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Justin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C. Pierce, and Aaron Roth. 2014. Differential Privacy: An Economic Method for Choosing Epsilon. 2014 IEEE 27th Computer Security Foundations Symposium (2014), 398--410.Google ScholarGoogle Scholar
  22. R. Megiba Jasmine and J. Jasper . 2022. A Privacy Preserving Based Multi- Biometric System for Secure Identification in Cloud Environment. Neural Processing Letters (2022).Google ScholarGoogle Scholar
  23. Sander Joos, Tim Van hamme, Davy Preuveneers, and Wouter Joosen. 2022. Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication. In Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics (Baltimore, MD, USA) (IWSPA '22). Association for Computing Machinery, New York, NY, USA, 2--12. https://doi.org/10.1145/ 3510548.3519369Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Mahdi Khosravy, Kazuaki Nakamura, Yuki Hirose, Naoko Nitta, and Noboru Babaguchi. 2021. Model inversion attack: analysis under gray-box scenario on deep learning based face recognition system. KSII Transactions on Internet and Information Systems (TIIS) 15, 3 (2021), 1100--1118.Google ScholarGoogle Scholar
  25. Kalpesh Krishna, Gaurav Singh Tomar, Ankur P Parikh, Nicolas Papernot, and Mohit Iyyer. 2019. Thieves on sesame street! model extraction of bert-based apis. arXiv preprint arXiv:1910.12366 (2019).Google ScholarGoogle Scholar
  26. ZhangAU Lei, Yu Lili, Wang Bin, and Bian Xingchao. 2019. A Novel Privacy Protection Scheme for Iris Identification. Wireless Personal Communications (2019).Google ScholarGoogle Scholar
  27. Jiacheng Li, Ninghui Li, and Bruno Ribeiro. 2021. Membership Inference Attacks and Defenses in Classification Models. In Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy (Virtual Event, USA) (CODASPY '21). Association for Computing Machinery, New York, NY, USA, 5--16. https://doi.org/10.1145/3422337.3447836Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Feng-Zhao Lian, Jun-Duan Huang, Ji-Xin Liu, Guang Chen, Jun-Hong Zhao, and Wen-Xiong Kang. 2023. FedFV: A Personalized Federated Learning Framework for Finger Vein Authentication. Machine Intelligence Research (2023).Google ScholarGoogle Scholar
  29. Chenhao Lin and Ajay Kumar. 2018. Contactless and partial 3D fingerprint recognition using multi-view deep representation. Pattern Recognition 83 (2018), 314--327.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Ashwin Machanavajjhala, Aleksandra Korolova, and Atish Das Sarma. 2011. Personalized Social Recommendations: Accurate or Private. Proc. VLDB Endow. 4, 7 (apr 2011), 440--450. https://doi.org/10.14778/1988776.1988780Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. B Uma Maheswari, MP Rajakumar, and J Ramya. 2022. Dynamic differential annealing-based anti-spoofing model for fingerprint detection using CNN. Neural Computing and Applications (2022), 1--17.Google ScholarGoogle Scholar
  32. D. Maio, D. Maltoni, R. Cappelli, J.L. Wayman, and A.K. Jain. 2002. FVC2000: fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligence 24, 3 (2002), 402--412. https://doi.org/10.1109/34.990140Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. H. B. McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Agüera y Arcas. 2016. Communication-Efficient Learning of Deep Networks from Decentralized Data. In International Conference on Artificial Intelligence and Statistics.Google ScholarGoogle Scholar
  34. Mohamed Nassar, Abdelkarim Erradi, Farida Sabri, and Qutaibah M. Malluhi. 2013. Secure Outsourcing of Matrix Operations as a Service. In 2013 IEEE Sixth International Conference on Cloud Computing. 918--925. https://doi.org/10.1109/ CLOUD.2013.124Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Rodrigo Frassetto Nogueira, Roberto de Alencar Lotufo, and Rubens Campos Machado. 2016. Fingerprint liveness detection using convolutional neural networks. IEEE transactions on information forensics and security 11, 6 (2016), 1206-- 1213.Google ScholarGoogle Scholar
  36. Eric Nowak and Frédéric Jurie. 2007. Learning visual similarity measures for comparing never seen objects. In 2007 IEEE conference on computer vision and pattern recognition. IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  37. Nur-A-Alam, M. Ahsan, M.A. Based, J. Haider, and M. Kowalski. 2021. An intelligent system for automatic fingerprint identification using feature fusion by Gabor filter and deep learning. Computers and Electrical Engineering 95 (2021), 107387. https://doi.org/10.1016/j.compeleceng.2021.107387Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Xinlei Pan, Weiyao Wang, Xiaoshuai Zhang, Bo Li, Jinfeng Yi, and Dawn Song. 2019. How You Act Tells a Lot: Privacy-Leaking Attack on Deep Reinforcement Learning.. In AAMAS. 368--376.Google ScholarGoogle Scholar
  39. Cheolhee Park, Dowon Hong, and Changho Seo. 2019. An attack-based evaluation method for differentially private learning against model inversion attack. IEEE Access 7 (2019), 124988--124999.Google ScholarGoogle ScholarCross RefCross Ref
  40. Waseem Rawat and Zenghui Wang. 2017. Deep convolutional neural networks for image classification: A comprehensive review. Neural computation 29, 9 (2017), 2352--2449.Google ScholarGoogle Scholar
  41. Maria Rigaki and Sebastian Garcia. 2020. A survey of privacy attacks in machine learning. arXiv preprint arXiv:2007.07646 (2020).Google ScholarGoogle Scholar
  42. Zhang Rui and Zheng Yan. 2018. A survey on biometric authentication: Toward secure and privacy-preserving identification. IEEE access 7 (2018), 5994--6009.Google ScholarGoogle Scholar
  43. SavioAU Sciancalepore, Huiyong Wang, Mingjun Luo, and Yong Ding. 2021. Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing. Security and Communication Networks (2021).Google ScholarGoogle Scholar
  44. Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. 1310--1321.Google ScholarGoogle Scholar
  45. Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership inference attacks against machine learning models. In 2017 IEEE symposium on security and privacy (SP). IEEE, 3--18.Google ScholarGoogle ScholarCross RefCross Ref
  46. Vivienne Sze, Yu-Hsin Chen, Tien-Ju Yang, and Joel S Emer. 2017. Efficient processing of deep neural networks: A tutorial and survey. Proc. IEEE 105, 12 (2017), 2295--2329.Google ScholarGoogle ScholarCross RefCross Ref
  47. Florian Tramèr, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction {APIs}. In 25th USENIX security symposium (USENIX Security 16). 601--618.Google ScholarGoogle Scholar
  48. Binghui Wang and Neil Zhenqiang Gong. 2018. Stealing hyperparameters in machine learning. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 36--52.Google ScholarGoogle ScholarCross RefCross Ref
  49. Liwei Wang, Yan Zhang, and Jufu Feng. 2005. On the Euclidean distance of images. IEEE Transactions on Pattern Analysis and Machine Intelligence 27, 8 (2005), 1334--1339. https://doi.org/10.1109/TPAMI.2005.165Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Tao Wang, Zhigao Zheng, Ali Kashif Bashir, Alireza Jolfaei, and Yanyan Xu. 2021. FinPrivacy: A Privacy-Preserving Mechanism for Fingerprint Identification. ACM Trans. Internet Technol. 21, 3, Article 56 (jun 2021), 15 pages. https://doi.org/10. 1145/3387130Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Tao Wang, Zhigao Zheng, Ali Kashif Bashir, Alireza Jolfaei, and Yanyan Xu. 2021. FinPrivacy: A privacy-preserving mechanism for fingerprint identification. ACM Transactions on Internet Technology (TOIT) 21, 3 (2021), 1--15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Zhou Wang, A.C. Bovik, H.R. Sheikh, and E.P. Simoncelli. 2004. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 13, 4 (2004), 600--612. https://doi.org/10.1109/TIP.2003.819861Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. ZhouWang, Alan C Bovik, and Hamid R Sheikh. 2017. Structural similarity based image quality assessment. In Digital Video image quality and perceptual coding. CRC Press, 225--242.Google ScholarGoogle Scholar
  54. Zhou Wang, Alan C Bovik, Hamid R Sheikh, and Eero P Simoncelli. 2004. Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing 13, 4 (2004), 600--612.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Hangui Wei, Lina Ge, Zhenkun Lu, Guifen Zhang, and Donghong Qin. 2021. Differential Privacy Image Publishing based on NMF and SVD. In 2021 13th International Conference on Bioinformatics and Biomedical Technology. 48--54.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Chunsheng Wu, Honghao Wu, Song Lei, Xiaojun Li, and Hui Tong. 2021. Deep Learning in Automatic Fingerprint Identification. In 2021 IEEE 6th International Conference on Smart Cloud (SmartCloud). IEEE, 111--116.Google ScholarGoogle Scholar
  57. Xi Wu, Matthew Fredrikson, Somesh Jha, and Jeffrey F. Naughton. 2016. A Methodology for Formalizing Model-Inversion Attacks. In 2016 IEEE 29th Computer Security Foundations Symposium (CSF). 355--370. https://doi.org/10.1109/ CSF.2016.32Google ScholarGoogle ScholarCross RefCross Ref
  58. Xuefei Yin, Song Wang, Muhammad Shahzad, and Jiankun Hu. 2022. An IoTOriented Privacy-Preserving Fingerprint Authentication System. IEEE Internet of Things Journal 9, 14 (2022), 11760--11771. https://doi.org/10.1109/JIOT.2021. 3131956Google ScholarGoogle ScholarCross RefCross Ref
  59. Danni Yuan, Xiaoyan Zhu, Mingkui Wei, and Jianfeng Ma. 2019. Collaborative Deep Learning for Medical Image Analysis with Differential Privacy. In 2019 IEEE Global Communications Conference (GLOBECOM). 1--6. https://doi.org/10.1109/ GLOBECOM38437.2019.9014259Google ScholarGoogle Scholar
  60. Alexander Ziller, Dmitrii Usynin, Rickmer Braren, Marcus Makowski, Daniel Rueckert, and Georgios Kaissis. 2021. Medical imaging deep learning with differential privacy. Scientific Reports 11, 1 (2021), 1--8.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Privacy-preserving Deep-learning Models for Fingerprint Data using Differential Privacy

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            IWSPA '23: Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics
            April 2023
            107 pages
            ISBN:9798400700996
            DOI:10.1145/3579987

            Copyright © 2023 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 24 April 2023

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate18of58submissions,31%

            Upcoming Conference

            CODASPY '24
          • Article Metrics

            • Downloads (Last 12 months)123
            • Downloads (Last 6 weeks)13

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader