EconPapers    
Economics at your fingertips  
 

Using PRNG Generated Templates to Protect Fingerprint Database

Qinghai Gao and Kamal Shahrabi

Journal of Information Privacy and Security, 2012, vol. 8, issue 2, 18-32

Abstract: Fingerprint databases are widely used in background/criminal investigation and physical access control. However, the security mechanisms protecting these databases are often inadequate. Once a hacker or an insider obtains a copy of a database the fingerprints in the database can be utilized easily to conduct identity theft or impersonation. Therefore, it is extremely important to protect the database against possible misuses. In this paper we propose using synthetic fingerprint minutiae templates generated with pseudorandom number generator to protect genuine fingerprint templates. Our experimental results show that fingerprint minutiae templates can still match successfully even after being inserted with large number of foreign minutiae and that the pseudorandomly generated synthetic minutiae templates can be utilized to protect real templates.

Date: 2012
References: Add references at CitEc
Citations:

Downloads: (external link)
http://hdl.handle.net/10.1080/15536548.2012.10845653 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:taf:uipsxx:v:8:y:2012:i:2:p:18-32

Ordering information: This journal article can be ordered from
http://www.tandfonline.com/pricing/journal/uips20

DOI: 10.1080/15536548.2012.10845653

Access Statistics for this article

Journal of Information Privacy and Security is currently edited by Chuleeporn Changchit

More articles in Journal of Information Privacy and Security from Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().

 
Page updated 2025-03-20
Handle: RePEc:taf:uipsxx:v:8:y:2012:i:2:p:18-32