ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Scanning and Tracking Fingerprint Images for Detecting Privacy Violators
Cited - time in scopus Share share facebook twitter linkedin kakaostory
Authors
Hak Jae Kim, Sung Ju Lee, Seong Woon Kim
Issue Date
2010-12
Citation
International Conference on Internet (ICONI) 2010 / Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2010, pp.109-113
Publisher
KSII
Language
English
Type
Conference Paper
Abstract
As user authentication by using biometric information such as fingerprint has been widely accepted, there has been a growing interest in protecting the biometric information itself against external attackers. Especially, as the fingerprint information is used for various e-business applications such e-Banking, e-Marking, it becomes important to protect its privacy in network environment. Many approaches have been proposed to protect the privacy of fingerprint information by providing the confidentiality and integrity of it during the end-to-end transmission. However, these approaches can be applied only to the end-to-end applications which follow the privacy-preserving recommendation. In this paper, we propose and implement a scanning and tracking system of fingerprint images at the intermediate node(i.e., network router, gateway) in order to detect possible privacy violators. In order to detect whether the transmitted image is an unprotected(i.e., privacy-violating) fingerprint image or not, we first implement a scanning method at the intermediate node by using a classification algorithm. Then, we insert some tracking information into the unprotected fingerprint image by using a watermarking algorithm, and the privacy conflict can be managed by using the tracking information inserted. Based on experimental result, we confirm that our system can detect possible privacy violators at intermediate nodes accurately.
KSP Keywords
Biometric information, Business applications, Classification algorithm, End to End(E2E), Experimental Result, Intermediate nodes, Network Environment, Network Router, Privacy-preserving recommendation, Scanning method, Tracking System