A Fingerprint Privacy Protection Schemes: A Review

571 Words2 Pages

Most of the existing techniques make use of the key or token for the fingerprint privacy protection, which creates the inconvenience. They may also be open to attacks when both the key and the protected fingerprint are stolen.
The work in [4] propose a biohashing approach in which the inner products between the user’s fingerprint features and a pseudorandom number is computed.
The work in [5] propose to generate cancelable fingerprint templates by applying noninvertible transforms on the minutiae. The noninvertible transform is guided by a key, which will usually lead to a reduction in matching accuracy. The work in [4] and [5] are shown to be vulnerable to intrusion and linkage attacks when both the key and the transformed template are stolen.
The work in [6] imperceptibly hide the user identity on the thinned fingerprint using a key. The user identity may also be compromised when both the key and the protected thinned fingerprint are stolen.
There are some schemes [7]–[9] and [1] that are able to protect the privacy of the fingerprint without using a key. The works in ...

Open Document