ABSTRACT
Fingerprint recognition is a widely adopted biometric authentication method that leverages the unique characteristics of fingerprints to identify individuals. Its applications range from access control and authentication to forensic science, making the development of a robust, precise, and secure model for fingerprint recognition and analysis of paramount importance. Recently, deep learning and machine learning models have shown promise in this field, however, the use of these models raises significant privacy concerns as there is a potential for private fingerprint data to be compromised. This research aims to address these concerns by incorporating differential privacy techniques to protect the privacy of fingerprints. It provides evidence that the use of differential privacy technique leads to acceptable trade-off between preserving the privacy of fingerprints and accuracy of fingerprint recognition systems while maintaining robustness against model inversion attacks. With a noise multiplier of 0.01, the verification model attains a good accuracy of 89.32% at privacy budget ε = 1.2 , and less than 80% at lower privacy budget for the identification model.
- Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 308--318.Google ScholarDigital Library
- Reza Abrishambaf, Hasan Demirel, and Izzet Kale. 2008. A Fully CNN Based Fingerprint Recognition System. 146 -- 149. https://doi.org/10.1109/CNNA.2008. 4588667Google Scholar
- Laith Alzubaidi, Jinglan Zhang, Amjad J Humaidi, Ayad Al-Dujaili, Ye Duan, Omran Al-Shamma, J Santamaría, Mohammed A Fadhel, Muthana Al-Amidie, and Laith Farhan. 2021. Review of deep learning: Concepts, CNN architectures, challenges, applications, future directions. Journal of big Data 8, 1 (2021), 1--74.Google ScholarCross Ref
- Y Amruth, BM Gopinatha, MP Gowtham, M Kiran, and Y Harshalatha. 2020. Fingerprint and Signature Authentication System using CNN. In 2020 IEEE International Conference for Innovation in Technology (INOCON). IEEE, 1--4.Google Scholar
- Esla Timothy Anzaku, Hosik Sohn, and Yong Man Ro. 2011. Privacy Preserving Facial and Fingerprint Multi-biometric Authentication. In Digital Watermarking, Hyoung-Joong Kim, Yun Qing Shi, and Mauro Barni (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 239--250.Google Scholar
- Giuseppe Ateniese, Luigi V Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, and Giovanni Felici. 2015. Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. International Journal of Security and Networks 10, 3 (2015), 137--150.Google ScholarDigital Library
- Subba Reddy Borra, G Jagadeeswar Reddy, and E Sreenivasa Reddy. 2018. Classification of fingerprint images with the aid of morphological operation and AGNN classifier. Applied computing and informatics 14, 2 (2018), 166--176.Google Scholar
- Kai Cao and Anil K Jain. 2018. Automated latent fingerprint recognition. IEEE transactions on pattern analysis and machine intelligence 41, 4 (2018), 788--800.Google Scholar
- Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, and Seyit Camtepe. 2020. Privacy preserving face recognition utilizing differential privacy. Computers & Security 97 (2020), 101951.Google ScholarCross Ref
- Zhaohe Chen, Ming Tang, and Jinghai Li. 2022. Inversion Attacks against CNN Models Based on Timing Attack. Security and Communication Networks 2022 (2022).Google Scholar
- Anurag Chowdhury, Simon Kirchgasser, Andreas Uhl, and Arun Ross. 2020. Can a CNN Automatically Learn the Significance of Minutiae Points for Fingerprint Matching?. In 2020 IEEE Winter Conference on Applications of Computer Vision (WACV). 340--348. https://doi.org/10.1109/WACV45572.2020.9093301Google ScholarCross Ref
- William L Croft, Jörg-Rüdiger Sack, andWei Shi. 2021. Obfuscation of images via differential privacy: from facial images to general images. Peer-to-Peer Networking and Applications 14, 3 (2021), 1705--1733.Google ScholarCross Ref
- Andreea-Monica Dinc Lzrescu, Simona Moldovanu, and Luminita Moraru. 2022. A Fingerprint Matching Algorithm Using the Combination of Edge Features and Convolution Neural Networks. Inventions 7, 2 (2022). https://doi.org/10. 3390/inventions7020039Google Scholar
- Cynthia Dwork. 2008. Differential privacy: A survey of results. In International conference on theory and applications of models of computation. Springer, 1--19.Google ScholarDigital Library
- Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. 2006. Our data, ourselves: Privacy via distributed noise generation. In Annual international conference on the theory and applications of cryptographic techniques. Springer, 486--503.Google ScholarDigital Library
- Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science 9, 3--4 (2014), 211--407.Google Scholar
- David Evans. 2021. When Models Learn Too Much. In Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy (Virtual Event, USA) (CODASPY '21). Association for Computing Machinery, New York, NY, USA, 1. https://doi.org/10.1145/3422337.3450327Google ScholarDigital Library
- Matt Fredrikson, Somesh Jha, and Thomas Ristenpart. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. 1322--1333.Google ScholarDigital Library
- Jiuxiang Gu, Zhenhua Wang, Jason Kuen, Lianyang Ma, Amir Shahroudy, Bing Shuai, Ting Liu, Xingxing Wang, Gang Wang, Jianfei Cai, et al. 2018. Recent advances in convolutional neural networks. Pattern Recognition 77 (2018), 354-- 377.Google ScholarDigital Library
- Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. 2019. Deep Neural Networks Classification over Encrypted Data. In Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy (Richardson, Texas, USA) (CODASPY '19). Association for Computing Machinery, New York, NY, USA, 97--108. https://doi.org/10.1145/3292006.3300044Google ScholarDigital Library
- Justin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C. Pierce, and Aaron Roth. 2014. Differential Privacy: An Economic Method for Choosing Epsilon. 2014 IEEE 27th Computer Security Foundations Symposium (2014), 398--410.Google Scholar
- R. Megiba Jasmine and J. Jasper . 2022. A Privacy Preserving Based Multi- Biometric System for Secure Identification in Cloud Environment. Neural Processing Letters (2022).Google Scholar
- Sander Joos, Tim Van hamme, Davy Preuveneers, and Wouter Joosen. 2022. Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication. In Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics (Baltimore, MD, USA) (IWSPA '22). Association for Computing Machinery, New York, NY, USA, 2--12. https://doi.org/10.1145/ 3510548.3519369Google ScholarDigital Library
- Mahdi Khosravy, Kazuaki Nakamura, Yuki Hirose, Naoko Nitta, and Noboru Babaguchi. 2021. Model inversion attack: analysis under gray-box scenario on deep learning based face recognition system. KSII Transactions on Internet and Information Systems (TIIS) 15, 3 (2021), 1100--1118.Google Scholar
- Kalpesh Krishna, Gaurav Singh Tomar, Ankur P Parikh, Nicolas Papernot, and Mohit Iyyer. 2019. Thieves on sesame street! model extraction of bert-based apis. arXiv preprint arXiv:1910.12366 (2019).Google Scholar
- ZhangAU Lei, Yu Lili, Wang Bin, and Bian Xingchao. 2019. A Novel Privacy Protection Scheme for Iris Identification. Wireless Personal Communications (2019).Google Scholar
- Jiacheng Li, Ninghui Li, and Bruno Ribeiro. 2021. Membership Inference Attacks and Defenses in Classification Models. In Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy (Virtual Event, USA) (CODASPY '21). Association for Computing Machinery, New York, NY, USA, 5--16. https://doi.org/10.1145/3422337.3447836Google ScholarDigital Library
- Feng-Zhao Lian, Jun-Duan Huang, Ji-Xin Liu, Guang Chen, Jun-Hong Zhao, and Wen-Xiong Kang. 2023. FedFV: A Personalized Federated Learning Framework for Finger Vein Authentication. Machine Intelligence Research (2023).Google Scholar
- Chenhao Lin and Ajay Kumar. 2018. Contactless and partial 3D fingerprint recognition using multi-view deep representation. Pattern Recognition 83 (2018), 314--327.Google ScholarDigital Library
- Ashwin Machanavajjhala, Aleksandra Korolova, and Atish Das Sarma. 2011. Personalized Social Recommendations: Accurate or Private. Proc. VLDB Endow. 4, 7 (apr 2011), 440--450. https://doi.org/10.14778/1988776.1988780Google ScholarDigital Library
- B Uma Maheswari, MP Rajakumar, and J Ramya. 2022. Dynamic differential annealing-based anti-spoofing model for fingerprint detection using CNN. Neural Computing and Applications (2022), 1--17.Google Scholar
- D. Maio, D. Maltoni, R. Cappelli, J.L. Wayman, and A.K. Jain. 2002. FVC2000: fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligence 24, 3 (2002), 402--412. https://doi.org/10.1109/34.990140Google ScholarDigital Library
- H. B. McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Agüera y Arcas. 2016. Communication-Efficient Learning of Deep Networks from Decentralized Data. In International Conference on Artificial Intelligence and Statistics.Google Scholar
- Mohamed Nassar, Abdelkarim Erradi, Farida Sabri, and Qutaibah M. Malluhi. 2013. Secure Outsourcing of Matrix Operations as a Service. In 2013 IEEE Sixth International Conference on Cloud Computing. 918--925. https://doi.org/10.1109/ CLOUD.2013.124Google ScholarDigital Library
- Rodrigo Frassetto Nogueira, Roberto de Alencar Lotufo, and Rubens Campos Machado. 2016. Fingerprint liveness detection using convolutional neural networks. IEEE transactions on information forensics and security 11, 6 (2016), 1206-- 1213.Google Scholar
- Eric Nowak and Frédéric Jurie. 2007. Learning visual similarity measures for comparing never seen objects. In 2007 IEEE conference on computer vision and pattern recognition. IEEE, 1--8.Google ScholarCross Ref
- Nur-A-Alam, M. Ahsan, M.A. Based, J. Haider, and M. Kowalski. 2021. An intelligent system for automatic fingerprint identification using feature fusion by Gabor filter and deep learning. Computers and Electrical Engineering 95 (2021), 107387. https://doi.org/10.1016/j.compeleceng.2021.107387Google ScholarDigital Library
- Xinlei Pan, Weiyao Wang, Xiaoshuai Zhang, Bo Li, Jinfeng Yi, and Dawn Song. 2019. How You Act Tells a Lot: Privacy-Leaking Attack on Deep Reinforcement Learning.. In AAMAS. 368--376.Google Scholar
- Cheolhee Park, Dowon Hong, and Changho Seo. 2019. An attack-based evaluation method for differentially private learning against model inversion attack. IEEE Access 7 (2019), 124988--124999.Google ScholarCross Ref
- Waseem Rawat and Zenghui Wang. 2017. Deep convolutional neural networks for image classification: A comprehensive review. Neural computation 29, 9 (2017), 2352--2449.Google Scholar
- Maria Rigaki and Sebastian Garcia. 2020. A survey of privacy attacks in machine learning. arXiv preprint arXiv:2007.07646 (2020).Google Scholar
- Zhang Rui and Zheng Yan. 2018. A survey on biometric authentication: Toward secure and privacy-preserving identification. IEEE access 7 (2018), 5994--6009.Google Scholar
- SavioAU Sciancalepore, Huiyong Wang, Mingjun Luo, and Yong Ding. 2021. Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing. Security and Communication Networks (2021).Google Scholar
- Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. 1310--1321.Google Scholar
- Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership inference attacks against machine learning models. In 2017 IEEE symposium on security and privacy (SP). IEEE, 3--18.Google ScholarCross Ref
- Vivienne Sze, Yu-Hsin Chen, Tien-Ju Yang, and Joel S Emer. 2017. Efficient processing of deep neural networks: A tutorial and survey. Proc. IEEE 105, 12 (2017), 2295--2329.Google ScholarCross Ref
- Florian Tramèr, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction {APIs}. In 25th USENIX security symposium (USENIX Security 16). 601--618.Google Scholar
- Binghui Wang and Neil Zhenqiang Gong. 2018. Stealing hyperparameters in machine learning. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 36--52.Google ScholarCross Ref
- Liwei Wang, Yan Zhang, and Jufu Feng. 2005. On the Euclidean distance of images. IEEE Transactions on Pattern Analysis and Machine Intelligence 27, 8 (2005), 1334--1339. https://doi.org/10.1109/TPAMI.2005.165Google ScholarDigital Library
- Tao Wang, Zhigao Zheng, Ali Kashif Bashir, Alireza Jolfaei, and Yanyan Xu. 2021. FinPrivacy: A Privacy-Preserving Mechanism for Fingerprint Identification. ACM Trans. Internet Technol. 21, 3, Article 56 (jun 2021), 15 pages. https://doi.org/10. 1145/3387130Google ScholarDigital Library
- Tao Wang, Zhigao Zheng, Ali Kashif Bashir, Alireza Jolfaei, and Yanyan Xu. 2021. FinPrivacy: A privacy-preserving mechanism for fingerprint identification. ACM Transactions on Internet Technology (TOIT) 21, 3 (2021), 1--15.Google ScholarDigital Library
- Zhou Wang, A.C. Bovik, H.R. Sheikh, and E.P. Simoncelli. 2004. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 13, 4 (2004), 600--612. https://doi.org/10.1109/TIP.2003.819861Google ScholarDigital Library
- ZhouWang, Alan C Bovik, and Hamid R Sheikh. 2017. Structural similarity based image quality assessment. In Digital Video image quality and perceptual coding. CRC Press, 225--242.Google Scholar
- Zhou Wang, Alan C Bovik, Hamid R Sheikh, and Eero P Simoncelli. 2004. Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing 13, 4 (2004), 600--612.Google ScholarDigital Library
- Hangui Wei, Lina Ge, Zhenkun Lu, Guifen Zhang, and Donghong Qin. 2021. Differential Privacy Image Publishing based on NMF and SVD. In 2021 13th International Conference on Bioinformatics and Biomedical Technology. 48--54.Google ScholarDigital Library
- Chunsheng Wu, Honghao Wu, Song Lei, Xiaojun Li, and Hui Tong. 2021. Deep Learning in Automatic Fingerprint Identification. In 2021 IEEE 6th International Conference on Smart Cloud (SmartCloud). IEEE, 111--116.Google Scholar
- Xi Wu, Matthew Fredrikson, Somesh Jha, and Jeffrey F. Naughton. 2016. A Methodology for Formalizing Model-Inversion Attacks. In 2016 IEEE 29th Computer Security Foundations Symposium (CSF). 355--370. https://doi.org/10.1109/ CSF.2016.32Google ScholarCross Ref
- Xuefei Yin, Song Wang, Muhammad Shahzad, and Jiankun Hu. 2022. An IoTOriented Privacy-Preserving Fingerprint Authentication System. IEEE Internet of Things Journal 9, 14 (2022), 11760--11771. https://doi.org/10.1109/JIOT.2021. 3131956Google ScholarCross Ref
- Danni Yuan, Xiaoyan Zhu, Mingkui Wei, and Jianfeng Ma. 2019. Collaborative Deep Learning for Medical Image Analysis with Differential Privacy. In 2019 IEEE Global Communications Conference (GLOBECOM). 1--6. https://doi.org/10.1109/ GLOBECOM38437.2019.9014259Google Scholar
- Alexander Ziller, Dmitrii Usynin, Rickmer Braren, Marcus Makowski, Daniel Rueckert, and Georgios Kaissis. 2021. Medical imaging deep learning with differential privacy. Scientific Reports 11, 1 (2021), 1--8.Google ScholarCross Ref
Index Terms
- Privacy-preserving Deep-learning Models for Fingerprint Data using Differential Privacy
Recommendations
Privacy Preserving Face Recognition Utilizing Differential Privacy
AbstractFacial recognition technologies are implemented in many areas, including but not limited to, citizen surveillance, crime control, activity monitoring, and facial expression evaluation. However, processing biometric information is a ...
Protecting sensitive place visits in privacy-preserving trajectory publishing
Highlights- We propose a method for privacy-preserving trajectory publishing.
- It aims at ...
AbstractThe rise of mobile computing has generated huge amount of trajectory data. Since these data are valuable for many people, publishing them while providing adequate individual privacy protection has been a challenging task. In this paper,...
A review of privacy preserving models for multi-party data release framework
WIR '16: Proceedings of the ACM Symposium on Women in Research 2016Nowadays, with the improvement of internet technology and advancement in distributed computing data is increasing rapidly. There is a need of information sharing between organizations. Ideally, we wish to share data from multiple private databases and ...
Comments