Transforming minutiae for protecting fingerprint data

Tohari Ahmad, Herleeyandi Markoni, Waskitho Wibisono, M. I. Royyana

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Fingerprint is one of popular biometric identifiers for authenticating users. Its permanence characteristic has made it reliable to use. Therefore, fingerprint data should be protected and not be disclosed to unauthorized parties. Neverthelless, its instability scanning result has made conventional cryptographic algorithms do not work. In this paper, we propose an algorithm for protecting fingerprint data by transforming it before being stored in a database. Once it has been transformed, it is hard to reconstruct its original data. In the authentication process, the fingerprint is also transformed in the same way as its registration. So, the original data have never been revealed. The experimental result, which is done by using a public database, shows that the error rate caused by the transformation is relatively low.

Original languageEnglish
Title of host publication2nd International Symposium on Technology Management and Emerging Technologies, ISTMET 2015 - Proceeding
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages213-217
Number of pages5
ISBN (Electronic)9781479917235
DOIs
Publication statusPublished - 16 Dec 2015
Event2nd International Symposium on Technology Management and Emerging Technologies, ISTMET 2015 - Langkawi, Malaysia
Duration: 25 Aug 201527 Aug 2015

Publication series

Name2nd International Symposium on Technology Management and Emerging Technologies, ISTMET 2015 - Proceeding

Conference

Conference2nd International Symposium on Technology Management and Emerging Technologies, ISTMET 2015
Country/TerritoryMalaysia
CityLangkawi
Period25/08/1527/08/15

Keywords

  • data protection
  • data security
  • fingerprint
  • transformation

Fingerprint

Dive into the research topics of 'Transforming minutiae for protecting fingerprint data'. Together they form a unique fingerprint.

Cite this