on mixing fingerprints - michigan state university

8
260 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013 On Mixing Fingerprints Asem Othman and Arun Ross Abstract—This work explores the possibility of mixing two different n- gerprints, pertaining to two different ngers, at the image level in order to generate a new ngerprint. To mix two ngerprints, each ngerprint pat- tern is decomposed into two different components, viz., the continuous and spiral components. After prealigning the components of each ngerprint, the continuous component of one ngerprint is combined with the spiral component of the other ngerprint. Experiments on the West Virginia Uni- versity (WVU) and FVC2002 datasets show that mixing ngerprints has several benets: (a) it can be used to generate virtual identities from two different ngers; (b) it can be used to obscure the information present in an individual’s ngerprint image prior to storing it in a central database; and (c) it can be used to generate a cancelable ngerprint template, i.e., the template can be reset if the mixed ngerprint is compromised. Index Terms—Fingerprints, image level fusion, mixing biometrics, phase decomposition, privacy protection, virtual Identities. I. INTRODUCTION Image level fusion refers to the consolidation of (a) multiple samples of the same biometric trait obtained from different sensors or (b) mul- tiple instances of the same biometric trait obtained using a single sensor, in order to generate a new image [1]. In the context of nger- prints, image-level fusion has been typically used to combine multiple impressions of the same nger [2]. In this paper, unlike previous work, two ngerprint impressions acquired from two different ngers are fused into a new ngerprint image resulting in a new identity 1 . The mixed image incorporates characteristics from both the original ngerprint images, and can be used directly in the feature extraction and matching stages of an existing ngerprint recognition system. As shown in Fig. 1, the mixing process begins by decomposing each ngerprint image into two different components, viz., the continuous and spiral components. The continuous component denes the local ridge orientation, and the spiral component characterizes the minutiae locations. Next, the two components of each ngerprint are aligned to a common coordinate system. Finally, the continuous component of one ngerprint is combined with the spiral component of the other ngerprint. The major motivations behind the development of the proposed approach are discussed below. The proposed approach explores the possibility of fusing images from distinct ngers at the image level and determining how this will affect authentication performance. As in [3], the proposed ap- proach could be used to mix the prints of the thumb and the index Manuscript received January 18, 2012; revised June 25, 2012; accepted September 07, 2012. Date of publication October 09, 2012; date of current version January 03, 2013. This work was supported by U.S. NSF CAREER Award Grant IIS 0642554. Preliminary versions of this work were presented at the EUSIPCO 2011 conference, Barcelona, Spain, August 2011 and the WIFS 2011 workshop, Foz do Iguacu, Brazil, November/December 2011. The associate editor coordinating the review of this manuscript and approving it for publication was Alex ChiChung Kot. The authors are with West Virginia University, Department of Computer Sci- ence and Electrical Engineering, Morgantown, WV 26505 USA (e-mail: asem. [email protected]; [email protected]). Color versions of one or more of the gures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identier 10.1109/TIFS.2012.2223676 1 Here, the term “identity” is used to suggest that the mixed ngerprint is unique and possibly different from other ngerprints. Fig. 1. Proposed approach for mixing ngerprints. ngers of a single individual, or index ngers of two different in- dividuals in order to generate a new ngerprint. Therefore, the concept of mixing ngerprints could be utilized in a multinger authentication system. This has benets in terms of storage and security. Fingerprint mixing can be used to generate a large set of virtual identities. These virtual identities can be used to conceal the orig- inal identities of subjects or be used for large-scale evaluation of algorithms [2], [4]. De-identifying a ngerprint image is necessary to mitigate con- cerns related to data sharing and data misuse [5]–[7]. Although conventional cryptographic systems provide numerous ways to secure important data/images, there are two main concerns for encrypting templates of ngerprints. First, the security of these algorithms relies on the assumption that the cryptographic keys are known only to the legitimate user. Maintaining the secrecy of keys is one of the main challenges in practical cryptosystems. Second, during every identication/verication attempt, the stored template has to be decrypted (exceptions include nger- print cryptosystems where matching can be done in the encrypted domain—but this affects matching performance). Thus, the original ngerprint template will be exposed to eavesdroppers. The stolen templates could be used to reconstruct the original ngerprint image [8]–[11]; in other words, compromising a ngerprint template can result in permanent loss of a subject’s biometric. Fingerprint mixing can be used to de-identify an input ngerprint image by fusing it with another ngerprint (e.g., a synthetic ngerprint) at image level, in order to produce a new mixed image that obscures the identity of the original ngerprint. In [12] and [13] a similar approach has been proposed to preserve the privacy of ngerprints by fusing two distinct ngers but only at the feature level. Our proposed approach creates a new entity that looks like a plausible ngerprint image and, thus, (a) it can be processed by conventional ngerprint algorithms and (b) an intruder cannot easily determine if a given print is mixed or not. Hence, the concept of ngerprint mixing can be utilized in the following example to enhance the privacy of a ngerprint recognition system. Consider a remote ngerprint system that maintains a small set of preselected auxiliary ngerprints, , corresponding to multiple ngers (each nger in is assumed to have multiple impressions). Suppose that subject offers the left index ngerprint, , during enrollment at a local machine. At that time, the local machine decomposes the ngerprint 1556-6013/$31.00 © 2012 IEEE

Upload: others

Post on 25-Nov-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

260 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013

On Mixing Fingerprints

Asem Othman and Arun Ross

Abstract—This work explores the possibility of mixing two different fin-gerprints, pertaining to two different fingers, at the image level in order togenerate a new fingerprint. To mix two fingerprints, each fingerprint pat-tern is decomposed into two different components, viz., the continuous andspiral components. After prealigning the components of each fingerprint,the continuous component of one fingerprint is combined with the spiralcomponent of the other fingerprint. Experiments on theWest Virginia Uni-versity (WVU) and FVC2002 datasets show that mixing fingerprints hasseveral benefits: (a) it can be used to generate virtual identities from twodifferent fingers; (b) it can be used to obscure the information present inan individual’s fingerprint image prior to storing it in a central database;and (c) it can be used to generate a cancelable fingerprint template, i.e., thetemplate can be reset if the mixed fingerprint is compromised.

Index Terms—Fingerprints, image level fusion, mixing biometrics, phasedecomposition, privacy protection, virtual Identities.

I. INTRODUCTION

Image level fusion refers to the consolidation of (a) multiple samplesof the same biometric trait obtained from different sensors or (b) mul-tiple instances of the same biometric trait obtained using a singlesensor, in order to generate a new image [1]. In the context of finger-prints, image-level fusion has been typically used to combine multipleimpressions of the same finger [2]. In this paper, unlike previouswork, two fingerprint impressions acquired from two different fingersare fused into a new fingerprint image resulting in a new identity1.The mixed image incorporates characteristics from both the originalfingerprint images, and can be used directly in the feature extractionand matching stages of an existing fingerprint recognition system.As shown in Fig. 1, the mixing process begins by decomposing eachfingerprint image into two different components, viz., the continuousand spiral components. The continuous component defines the localridge orientation, and the spiral component characterizes the minutiaelocations. Next, the two components of each fingerprint are alignedto a common coordinate system. Finally, the continuous componentof one fingerprint is combined with the spiral component of the otherfingerprint. The major motivations behind the development of theproposed approach are discussed below.• The proposed approach explores the possibility of fusing imagesfrom distinct fingers at the image level and determining how thiswill affect authentication performance. As in [3], the proposed ap-proach could be used to mix the prints of the thumb and the index

Manuscript received January 18, 2012; revised June 25, 2012; acceptedSeptember 07, 2012. Date of publication October 09, 2012; date of currentversion January 03, 2013. This work was supported by U.S. NSF CAREERAward Grant IIS 0642554. Preliminary versions of this work were presentedat the EUSIPCO 2011 conference, Barcelona, Spain, August 2011 and theWIFS 2011 workshop, Foz do Iguacu, Brazil, November/December 2011. Theassociate editor coordinating the review of this manuscript and approving it forpublication was Alex ChiChung Kot.The authors are with West Virginia University, Department of Computer Sci-

ence and Electrical Engineering, Morgantown, WV 26505 USA (e-mail: [email protected]; [email protected]).Color versions of one or more of the figures in this paper are available online

at http://ieeexplore.ieee.org.Digital Object Identifier 10.1109/TIFS.2012.2223676

1Here, the term “identity” is used to suggest that the mixed fingerprint isunique and possibly different from other fingerprints.

Fig. 1. Proposed approach for mixing fingerprints.

fingers of a single individual, or index fingers of two different in-dividuals in order to generate a new fingerprint. Therefore, theconcept of mixing fingerprints could be utilized in a multifingerauthentication system. This has benefits in terms of storage andsecurity.

• Fingerprint mixing can be used to generate a large set of virtualidentities. These virtual identities can be used to conceal the orig-inal identities of subjects or be used for large-scale evaluation ofalgorithms [2], [4].

• De-identifying a fingerprint image is necessary to mitigate con-cerns related to data sharing and data misuse [5]–[7]. Althoughconventional cryptographic systems provide numerous ways tosecure important data/images, there are two main concerns forencrypting templates of fingerprints. First, the security of thesealgorithms relies on the assumption that the cryptographic keysare known only to the legitimate user. Maintaining the secrecyof keys is one of the main challenges in practical cryptosystems.Second, during every identification/verification attempt, thestored template has to be decrypted (exceptions include finger-print cryptosystems where matching can be done in the encrypteddomain—but this affects matching performance). Thus, theoriginal fingerprint template will be exposed to eavesdroppers.The stolen templates could be used to reconstruct the originalfingerprint image [8]–[11]; in other words, compromising afingerprint template can result in permanent loss of a subject’sbiometric. Fingerprint mixing can be used to de-identify an inputfingerprint image by fusing it with another fingerprint (e.g., asynthetic fingerprint) at image level, in order to produce a newmixed image that obscures the identity of the original fingerprint.In [12] and [13] a similar approach has been proposed to preservethe privacy of fingerprints by fusing two distinct fingers but onlyat the feature level. Our proposed approach creates a new entitythat looks like a plausible fingerprint image and, thus, (a) it canbe processed by conventional fingerprint algorithms and (b) anintruder cannot easily determine if a given print is mixed ornot. Hence, the concept of fingerprint mixing can be utilized inthe following example to enhance the privacy of a fingerprintrecognition system. Consider a remote fingerprint system thatmaintains a small set of preselected auxiliary fingerprints, ,corresponding to multiple fingers (each finger in is assumed tohave multiple impressions). Suppose that subject offers theleft index fingerprint, , during enrollment at a local machine.At that time, the local machine decomposes the fingerprint

1556-6013/$31.00 © 2012 IEEE

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013 261

Fig. 2. Schematic protocol to protect the privacy of a fingerprint image by utilizing the proposed approach.

into two components, i.e., the spiral component and the contin-uous component. To ensure the privacy of the fingerprint imagein the local system, the remote system transmits the fingerprintsin the auxiliary set and the local machine searches through thereceived fingerprints to locate a “compatible” fingerprint basedon the continuous component of (see step (1) in Fig. 2),say (here the subscript denotes a specific finger inthe auxiliary set), which is then decomposed and its continuouscomponent mixed with the spiral component of at the localmachine (see step (2) in Fig. 2). The template of the new mixedprint is enrolled in the remote system database and isdiscarded from the local machine (see step (3) in Fig. 2). Duringauthentication, when the subject presents a sample of the leftindex finger, , it is decomposed and its continuous compo-nent is used to search through the fingerprints in the auxiliary setfrom the remote fingerprint system to determine the most “com-patible” fingerprint, say . In the local machine, the spiralcomponent of is mixed with the continuous componentof to generate a mixed fingerprint , which is thencompared against the database entry . The security protocol(illustrated in Fig. 2) ensures that during the enrollment or theauthentication process, the identities of the users will not berevealed by the fingerprint system. Further, although the privacyof the input fingerprints is the main concern, the privacy of thestored auxiliary set, e.g., , could be preserved by storing justthe continuous components of the preselected fingerprints.

This work confirms that (a) the mixed fingerprint representing a newidentity can potentially be used for authentication; (b) the proposedmethod can be utilized to generate different-sized databases of virtualidentities from a fixed fingerprint dataset; (c) the mixing process canbe used to obscure the information present in an individual’s finger-print image prior to storing it in a central database; and (d) the mixedfingerprint can be used to generate a cancelable template, i.e., the tem-plate can be reset if the mixed fingerprint is compromised. Since theproposed approach can be used for de-identifying fingerprints, in thispaper, a detailed analysis of the security aspects, i.e., the changeability

and noninvertability properties of the approach has been included. Thissecurity analysis is based on metrics commonly used in the cancelablebiometrics literature [14], [15].The rest of the paper is organized as follows. Section II presents

the proposed approach for mixing fingerprints. Section III reports theexperimental results and Section IV concludes the paper.

II. MIXING FINGERPRINTS: THE PROPOSED APPROACH

The ridge flow of a fingerprint can be represented as a 2-DAmplitudeand Frequency Modulated (AM-FM) signal [16]:

(1)

where is the intensity of the original image at , isthe intensity offset, is the amplitude, is the phase and

is the noise. Based on the Helmholtz Decomposition Theorem[17], the phase can be uniquely decomposed into the continuous phaseand the spiral phase, . As shown inFig. 3, the cosine of the continuous phase, i.e., the continuous compo-nent , defines the local ridge orientation, and the cosineof the spiral phase, i.e., the spiral component , character-izes the minutiae locations.

A. Fingerprint Decomposition

Since ridges and minutiae can be completely determined by thephase [16], we are only interested in . The other three pa-rameters in (1) contribute to the realistic textural appearance of thefingerprint. Before fingerprint decomposition, the phase mustbe reliably estimated; this is termed as demodulation.1) Vortex Demodulation: The objective of vortex demodulation

[18] is to extract the amplitude and phase of the fin-gerprint pattern. First, the DC term has to be removed sincethe failure to remove this offset correctly may introduce significant er-rors in the demodulated amplitude and phase [18]. To facilitate this, anormalized fingerprint image, , containing the enhanced ridge

262 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013

Fig. 3. Decomposing a fingerprint. (a) Fingerprint image. (b) Continuous com-ponent, . (c) Spiral component, . The blue and pinkdots represent ridge endings and ridge bifurcations, respectively.

pattern of the fingerprint (generated by the VeriFinger SDK2) is used.From (1), . Thevortex demodulation operator takes the normalized imageand applies a spiral phase Fourier multiplier :

(2)

where, is the Fourier transform, is the inverse Fourier transformand is a 2-D signum function [18] defined as a pure spiralphase function in the spatial frequency space :

(3)

Note that in (2) there is a new parameter, , representing theperpendicular direction of the ridges. In (4), this directional map is usedto isolate the desired magnitude and phase from (2), i.e.,

(4)

Then, (4) can be combined with the normalized image, , to ob-tain the magnitude and the raw phase map as follows:

(5)

Therefore, determining is essential for obtaining the amplitudeand phase functions, and , respectively. The directionmap can be derived from the orientation image of the finger-print by a process called unwrapping. A sophisticated unwrapping tech-nique using the topological properties of the ridge flow fields is neces-sary to account for direction singularities such as cores and deltas [10],[16].2) DirectionMap : Direction isuniquelydefined in the range

0 to360 (modulo ). Incontrast,fingerprint ridgeorientation is indis-tinguishable from that of a 180 rotated ridge (modulo ). Therefore, thefingerprint’s orientationmap, denoted by , should be unwrappedto a directionmap, [16]. Phase unwrapping is a technique usedto address a phase jump in the orientation map. The unwrappingprocess adds or subtracts an offset of to successive pixels whenevera phase jump is detected [17]. This process starts at any pixel within theorientation image and uses the local orientation information to traversethe image pixel-by-pixel, and assigns a direction (i.e., the traversed di-rection) to each pixel with the condition that there are no discontinuitiesof between neighboring pixels. However, the presence of flow sin-gularities means that there will be pixels in the orientation image with adiscontinuity of in the traversed direction and, therefore, the aboveunwrapping techniquewill fail at suchpixels. Infingerprint images,flow

2http://www.neurotechnology.com

singularities arise from the presence of singular points such as core anddelta. Fig. 4(a) illustrates that estimating the direction of ridges in thevicinity of a core point by starting at any point within the highlightedrectangle and arbitrarily assigning one of two possible directions, canresult in an inconsistency in the estimated directions inside the dashedcircle. This inconsistency in the estimated directionmap can be avoidedby using a branch cut [17].Abranch cut is a line or a curve used to isolatethe flow singularity and which cannot be crossed by the paths of the un-wrapping process. Consequently, branch cut prevents the creation ofdiscontinuities and restores the path independence of the unwrappingprocess. As shown in Fig. 4(b), tracing a line down from the core pointand using this line as a barrier resolves the inconsistency near the corepoint (i.e., inside the dashed circle) by selecting two different directionson either side of the branch cut within the same region (i.e., inside thehighlighted rectangle). In our work, a strategy based on the techniquesdescribed in [10], [16], [19] has been adapted to estimate the directionmap , which is summarized in the following three steps.1. Theorientation image of thenormalizedfingerprintis determined via the least mean-square method [20]. Then thePoincaré [2] index is used to locate the singular points, if any.

2. In case there are singular points, an algorithm is applied to ex-tract the branch cuts along suitable paths such as ridge contours,as shown in Fig. 4(b), to resolve the inevitable direction ambi-guities near these singularities. The branch cuts are extracted bytracing the contours of ridges (rather than the orientation field) inthe skeleton images. The algorithm starts from each singular pointin a skeleton image and proceeds until the trace reaches the borderof the segmented foreground region of the fingerprint or when itencounters another singular point. To generate the skeleton im-ages, first, a set of smoothed orientation maps are generated byapplying a Gaussian smoothing operation at different smoothingscales on .Next, aset of Gabor filters, tuned to the smoothed orientationmaps [20], isconvolved with the normalized image . Then, a local adap-tive thresholding and thinning algorithm [21] is applied to the di-rectionally filtered images producing 10 skeleton images. Thus,there are at least 10 branch cuts and the shortest one, associatedwith each singular point, is selected. Fig. 5 shows two examples ofskeleton images and the corresponding branch cuts of a core point.Fig. 6 shows examples of the branch cuts extracted from the sin-gular points of different fingerprints.

3. Thephaseunwrappingalgorithm[17], [22]starts fromanyarbitrarypixel in the orientation map and visits the other pixels,which are unwrapped in the same manner as in images withoutsingularity, with the exception here that the branch cuts cannotbe crossed. Then, each branch cut is visited individually and itspixels are traced andunwrapped. Finally, the directionmapis determined from the unwrapped by adding whichallows for the determination of the amplitude and phase

modulations of thefingerprint image from (5).Aflowchartfor demodulating a fingerprint image is depicted in Fig. 7.

3) Helmholtz Decomposition: The Helmholtz Decomposition The-orem [17] is used to decompose the determined phase of a fin-gerprint image into two phases. The first phase, is a continuous one,which can be unwrapped, and the second is a spiral phase, , whichcannot be unwrapped but can be defined as a phase that exhibits spiralbehavior at a set of discrete points in the image. The Bone’s residue de-tector [17], [23] is first used to determine the spiral phase fromthe demodulated phase . Next the continuous phase is com-puted as . Finally, although subtractingthe spiral phase from the phase should result in a continuous phase withno discontinuities, due to the inevitable quantization errors in the sub-tracting operation, it is essential to unwrap the continuous phase again

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013 263

Fig. 4. Portion of the estimated direction map (a) before assigning a branch cutand (b) after assigning a branch cut [19].

Fig. 5. Examples of skeleton images and branch cuts for a singular point where(a) and (c) are skeleton images generated with and , respectively, and(b) and (d) are the corresponding branch cuts. Branch cut in (d) is the selectedone.

by using the branch cuts from the previous step. Fig. 8 illustrates thesteps to determine the continuous component (Fig. 8(h))from the estimated spiral component (Fig. 8(f)) and thedemodulated phase (Fig. 8(a)).

B. Fingerprint Prealignment

To mix two different fingerprints after decomposing each finger-print into its continuous component and spiral compo-nent , the fingerprints themselves should be appropri-ately aligned. Previous research has shown that two fingerprints canbe best aligned using their minutiae correspondences. However, it isdifficult to ensure the existence of such correspondences between twofingerprints acquired from different fingers. In this paper, the compo-nents of individual fingerprints are prealigned to a common coordinatesystem prior to the mixing step by utilizing a reference point and analignment line. The reference point is used to center the components.The alignment line is used to find a rotation angle about the referencepoint. This angle rotates the alignment line to make it vertical.1) Locating a Reference Point: The reference point used in this

work is the northern most core point of extracted singularities. Forplain arch fingerprints or partial fingerprint images, Novikov et al.’stechnique [8], [24], based on the Hough transform, is used to detect thereference point.2) Finding the Alignment Line: The first step in finding the align-

ment line is to extract high curvature points from the skeleton of thefingerprint image’s continuous component. Next, horizontal distancesbetween the reference point and all high curvature points are calculated.

Fig. 6. Examples of fingerprints with singular points (the blue dots and redtriangle represent cores and delta, respectively). (a), (c), and (e) The normalizedfingerprints. (b), (d), and (f) The extracted branch cuts obtained by tracing theridges instead of the orientation field.

Then, based on these distances, an adaptive threshold is applied to se-lect and cluster points near the reference point. Finally, a line is fittedthrough the selected points to generate the alignment line. Fig. 9 showsthe steps to find the reference point and the alignment line by utilizingthe continuous phase component of an arch fingerprint. Since the con-tinuous component of a fingerprint is a global and consistent feature ofthe fingerprint pattern and is not affected by breaks and discontinuitieswhich are commonly encountered in ridge extraction, the determinedreference point and alignment line are consistent and do not reveal anyinformation about the minutia attributes which are local characteristicsin the fingerprint.

C. Mixing Fingerprints

Let and be two different fingerprint images from differentfingers, and let and be the prealigned continuousand spiral phases, , 2. As shown in Fig. 1, there are two differentmixed fingerprint images that can be generated, and :

(6)

The continuous phase of is combined with the spiral phase ofwhich generates a new fused fingerprint image .

D. Compatibility Measure

Variations in the orientations and frequencies of ridges between fin-gerprint images can result in visually unrealistic mixed fingerprint im-ages [3], [25], as shown in Fig. 10. This issue can be mitigated if thetwo fingerprints to be mixed are carefully chosen using a compatibilitymeasure. In this paper, the compatibility between fingerprints is com-puted using nonminutiae features, viz., orientation fields and frequencymaps of fingerprint ridges. The orientation and frequency images werecomputed from the prealigned continuous component of a fingerprint

264 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013

Fig. 7. Flowchart for demodulating a fingerprint image.

Fig. 8. Determining fingerprint constituents from (a) the demodulated phase. (b) Spiral phase . (c) Continuous phase . (d) Un-

wrapped continuous phase. (e), (f), (g), and (h) are the cosine of (a), (b), (c),and (d), respectively.

using the technique described in [20]. Then, Yager and Amin’s [26] ap-proach is used to compute the compatibility measure. To compute thecompatibility between two fingerprint images, their orientation fieldsand frequency maps are first estimated (see below). Then, the compat-ibility measure between them is computed as the weighted sum ofthe normalized orientations and frequency differences, and ,respectively:

(7)

where and are weights that are determined empirically. Fig. 11shows examples of mixed fingerprints after utilizing the compatibilitymeasure to select the fingerprints pairs, ( , ). Perfect compatibility

is likely to occur when the two prints to be mixed are from the

Fig. 9. Finding the reference point and alignment line for an arch fingerprint.

same finger—a scenario that is not applicable in the proposed applica-tion. On the other hand, two fingerprints having significantly differentridge structures are unlikely to be compatible and will gen-erate an unrealistic looking fingerprint. Between these two extremes(see Fig. 12), lies a range of possible compatible values that is accept-able. However, determining this range automatically may be difficult.1) Orientation Field Difference (OD): The difference in orientation

fields between and is computed as

(8)

where is a set of coordinates within the overlapped area of the alignedcontinuous components of two different fingerprints, and andrepresent the orientation fields of the two fingerprints. If orientationsare restricted to the range , the operator is written as

ififif .

(9)

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013 265

Fig. 10. Examples of mixed fingerprints that look unrealistic.

Fig. 11. Examples of mixed fingerprints that appear to be visually realistic.

Fig. 12. Example of a fingerprint image and its compatibility measure withother images.

2) Frequency Map Difference (FD): Local ridge frequencies arethe inverse of the average distance between ridges in the local area in adirection perpendicular to the local orientation. Hong et al.’s approach[20] is used to find the local ridge frequencies of the continuous com-ponent of a fingerprint image. The difference function is computed as:

(10)

where is a set of coordinates within the overlapped area, andand represent the frequency maps of the two fingerprints and, respectively.

III. EXPERIMENTS AND DISCUSSION

The performance of the proposed fingerprints mixing approach wastested using two different datasets. The first dataset was taken fromthe West Virginia University (WVU) multimodal biometric database[27]. A subset of 1000 images corresponding to 500 fingers (two im-pressions per finger) was used. The second dataset was taken fromthe FVC2002-DB2_A fingerprint database containing 100 fingers with2 impressions per finger (a total of 200 fingerprints). The VeriFingerSDK was used to generate the normalized fingerprint images and thematching scores. Also, an open source Matlab implementation [28]based on Hong et al.’s approach [20] was used to compute the orien-tation and frequency images of the fingerprints. In order to establishthe baseline performance, for each finger in each dataset, one impres-sion was used as probe image and the other impression was added tothe gallery. This resulted in a rank-1 accuracy of for the WVUdataset and for the FVC2002 dataset. The EERs for these twodatasets were 0.5% and 0.2%, respectively. In Sections III-A and III-B,different experiments are discussed. These experiments investigate ifthe new approach for image level fusion can be utilized to (a) generatea new identity by mixing two distinct fingerprints and (b) de-identify afingerprint by mixing it with another fingerprint.

A. Generating Virtual Identities

The purpose of this experiment was to report the matching perfor-mance of mixing images of two different fingers pertaining to two dif-ferent individuals to generate virtual identities.1) Mixing Fingerprints From the Same Database: For each finger

in the WVU dataset, one impression was used as the probe image andthe other was added to the gallery resulting in a probe set and agallery set each containing 500 fingerprints. As shown in Figs. 10and 11, the compatibility measure assists in generating visually ap-pealing mixed fingerprints with less false minutia in the overlappingarea [3], [25]. Therefore, the compatibility measures between differentpairs of fingerprints in were computed using (7) with and

. The finger pairs to be mixed were selected based on thismeasure. Pairs were selected and mixed in decreasing order of theircompatibility measures resulting in a new probe set consistingof 250 fingerprints. The corresponding pairs of fingerprints in werealso mixed resulting in a new gallery set consisting of 250 im-pressions. Since, mixing is an asymmetric process (6), another probeset and gallery set were also generated. Matching imagesin against those in and against resulted in arank-1 accuracy of and an EER of . The reasonably goodrecognition rates indicate the possibility of mixing fingerprints basedon their compatibility measure. Currently, ways to further improve therank-1 accuracy of mixed fingerprints is being examined.2) Mixing Fingerprints From Two Different Databases: For

each fingerprint in FVC 2002-DB2_A noted by , its compatibilitymeasure with every fingerprint in the WVU dataset (1000 images of500 subjects) was computed using (7) with and .Based on the computed compatibility measures, the spiral componentof was combined with the continuous component of the mostcompatible fingerprint image in the WVU dataset, resulting in themixed fingerprint . Because there are 2 impressions per finger inFVC2002-DB2_A, the mixing process resulted in 2 impressions permixed finger. One of these mixed impressions was used as a probeimage and the other was added to the gallery set. The rank-1 accuracyobtained was and the EER was . This indicates thepossibility of matching mixed fingerprints.

266 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013

TABLE IPROBABILITY OF GENERATING OR MORE

MINUTIAE WHICH ARE THE SAME AS

IN THE ORIGINAL FINGERPRINT( AND )

B. Generating Cancelable Identities

The purpose of the following experiments was to investigate if theproposed approach can be used to obscure the information present in acomponent fingerprint image by generating a cancelable template priorto storing it in a central database. Therefore, the mixed fingerprintsgenerated in Section III-A2 were used. With regards to mixing finger-prints for de-identification, the following key issues are raised [14],[15], [29]–[32]:1. Changeability: Are the original fingerprint and the mixed finger-print correlated? It is essential to assure that the proposed ap-proach prevents identity linking, by preventing the possibility ofsuccessfully matching the original print with the mixed print.

2. Noninvertibility: Can an adversary create a physical spoof of theoriginal fingerprint from a compromised mixed fingerprint? Itmust be computationally infeasible to obtain the original finger-print features, i.e., the locations and orientations of fingerprintminutia from the mixed fingerprint.

3. Cancelability: Doesmixing result in cancelable templates? In casea stored fingerprint is compromised, a new mixed fingerprint canbe generated by mixing the original with a new fingerprint. Thenewmixed fingerprint and the compromised mixed imagemust besufficiently different, even though they are derived from the samefinger. Another way of looking at this is as follows: if two differentfingerprints, and , are mixed with the same fingerprint ,are the resulting mixed fingerprints, and , similar? Fromthe perspective of security, they should not be similar.

Therefore, the following experiments were designed to evaluate thesecurity strength and the usability of our proposed approach for gener-ating cancelable fingerprints.1) Studying the Changeability Property: In this experiment, the

possibility of exposing the identity of the FVC2002-DB2_A finger-print image by using the mixed fingerprint images was investigated.The mixed fingerprints (2 impressions per finger) were matchedagainst the original images in the FVC2002-DB2_A database. The re-sultant rank-1 accuracy was less than 30% (and the EERwas more than30%) suggesting that the original identity cannot be easily deducedfrom the mixed image. Moreover, to confirm that the changeabilityproperty of the mixing fingerprint approach is independent of the na-ture of the used matcher, the mixed fingerprints were matched againstthe original fingerprint based on only the locations of minutiae afteromitting the orientation features. The EER in this case increased from30% to 40% and the rank-1 accuracy decreased from 30% to 12%. Thissuggests that the mixed and the original fingerprints are sufficiently dis-similar even if only minutiae information is used.2) Studying the Noninvertibility Property: In this experiment, the

vulnerability of the proposed de-identification approach to brute-forceattacks is discussed with respect to noninvertibility [30] if an attackerwere to access the mixed fingerprint . In other words, if the mixed

fingerprint were to be compromised, the probability of success-fully reconstructing the original fingerprint is estimated. Based on(6), if an attacker were to access a mixed fingerprint (with theknowledge that it is a mixed fingerprint) and , and then decomposes

by using the technique described in Section II-A, the minutia lo-cations of the original fingerprint , characterized by the spiral com-ponent, are compromised. Although several researchers have shownthat the original fingerprint image can be reconstructed from a finger-print’s minutiae consisting of their locations and orientations [8]–[11],there is no published work that discusses the possibility to reconstructthe original fingerprint image only from the minutiae locations. There-fore, the attacker must guess the orientation of each minutia to be ableto reconstruct the original fingerprint. Hence, if is the tolerance de-termining the acceptable deviation from the original orientation, theprobability of assuming the correct orientation for a given minutiae is

(11)

Consequently, the probability of successfully generating or moreminutiae which are the same as in the original fingerprint is

(12)

where is the total number of minutiae in a fingerprint, and isthe minimum number of minutiae required for authentication. Table Ishows the probabilities of successfully compromising the orientationsof minutiae points in the original fingerprints for different values of .In our experiments, the average number of minutiae per fingerprint, ,is 45. The low probabilities in the table indicate that it is difficult to re-generate the original fingerprint from the mixed fingerprint.3) Studying the Cancelability Property: The purpose of this ex-

periment was to investigate if the proposed approach can be used tocancel a compromised mixed fingerprint and generate a new mixedfingerprint by mixing the original fingerprint with a new fingerprint.To evaluate this, the two impressions of one single fingerprint in theFVC2002-DB2_A database were selected. Next, this fingerprint wasmixed with each of the 500 fingers in the WVU dataset. This resultedin 500 mixed fingerprints with 2 impressions per finger. One of theseimpressions per mixed finger was used as probe image and the otherwas added to the gallery set. Then, each image in the probe set wascompared against all images in the gallery set in order to determinea match. A match is deemed to be correct (i.e., the probe is correctlyidentified) if the probe image and the matched gallery image are fromthe same mixed finger. In the resulting experiments, the rank-1 identi-fication accuracy obtained was 85% and the EER was 7%. The reason-ably high identification rate suggests that the 500 mixed fingerprintsare different from each other. This means, the fingerprint from theFVC2002-DB2_A database can be successfully “canceled” and con-verted into a new “identity” based on the choice of the fingerprint se-lected from the WVU database for mixing.

IV. CONCLUSIONS

In this work, it was demonstrated that the concept of “mixing fin-gerprints” can be utilized to (a) generate a new identity by mixing twodistinct fingerprints and (b) de-identify a fingerprint by mixing it withanother fingerprint. To mix two fingerprints, each fingerprint is decom-posed into two components, viz., the continuous and spiral compo-nents. After aligning the components of each fingerprint, the contin-uous component of one fingerprint is combined with the spiral com-ponent of the other fingerprint image. Experiments on two fingerprint

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013 267

databases show that (a) the mixed fingerprint representing a new iden-tity can potentially be used for authentication, (b) the mixed fingerprintis dissimilar from the original fingerprints, (c) the same fingerprint canbe used in various applications and cross-matching between applica-tions can be prevented by mixing the original fingerprint with a dif-ferent fingerprint, (d) mixing different fingerprints with the same fin-gerprint results in different identities, and (e) the proposed method canbe utilized to generate a database of virtual identities from a fixed fin-gerprint dataset. Further work is required to enhance the performancedue to mixed fingerprints by exploring alternate algorithms for pre-aligning, selecting and mixing the different pairs.

REFERENCES

[1] A. Ross, K. Nandakumar, and A. Jain, Handbook of Multibiometrics.New York: Springer-Verlag, 2006, New York Inc..

[2] D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, Handbook of Finger-print Recognition. New York: Springer-Verlag, 2009, New York Inc..

[3] A. Othman and A. Ross, “Mixing fingerprints for generating virtualidentities,” in Proc. IEEE Int. Workshop Information Forensics andSecurity (WIFS), Foz do Iguacu, Brazil, Nov./Dec. 2011.

[4] R. Cappelli, “Sfinge: Synthetic fingerprint generator,” in Proc. Int.Workshop Modeling and Simulation in Biometric Technology, 2004,pp. 147–154.

[5] A. Jain, A. Ross, and U. Uludag, “Biometric template security:Challenges and solutions,” in Proc. Eur. Signal Processing Conf.(EUSIPCO), 2005, pp. 469–472.

[6] G. I. Davida, Y. Frankel, and B. J. Matt, “On enabling secure appli-cations through off-line biometric identification,” in Proc. IEEE Symp.Security and Privacy, 1998, pp. 148–157.

[7] N. Ratha, J. Connell, and R. Bolle, “Enhancing security and privacy inbiometrics-based authentication systems,” IBM Syst. J., vol. 40, no. 3,pp. 614–634, 2001.

[8] A. Ross, J. Shah, and A. Jain, “From template to image: Reconstructingfingerprints from minutiae points,” IEEE Trans. Pattern Anal. Mach.Intell., vol. 29, no. 4, pp. 544–560, Apr. 2007.

[9] R. Cappelli, A. Lumini, D. Maio, and D. Maltoni, “Fingerprint imagereconstruction from standard templates,” IEEE Trans. Pattern Anal.Mach. Intell., vol. 29, no. 9, pp. 1489–1503, Sep. 2007.

[10] J. Feng and A. K. Jain, “Fingerprint reconstruction: From minutiae tophase,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 2, pp.209–223, Feb. 2011.

[11] S. Li and A. Kot, “Attack using reconstructed fingerprint,” in Proc.IEEE Int. Workshop Information Forensics and Security (WIFS), 2011,pp. 1–6.

[12] B. Yanikoglu and A. Kholmatov, “Combining multiple biometricsto protect privacy,” in Proc. ICPR-BCTP Workshop, Aug. 2004, pp.43–46.

[13] S. Li and A. C. Kot, “A novel system for fingerprint privacy protec-tion,” in Proc. 7th Int. Conf. Information Assurance and Security (IAS),Dec. 2011, pp. 262–266.

[14] A. Jain, K. Nandakumar, and A. Nagar, “Biometric template security,”EURASIP J. Adv. Signal Process., vol. 2008, pp. 1–17, 2008.

[15] C. Rathgeb and A. Uhl, “A survey on biometric cryptosystems andcancelable biometrics,” EURASIP J. Inf. Security, vol. 2011, no. 1,pp. 1–25, 2011 [Online]. Available: http://www.opticsexpress.org/ab-stract.cfm?URI=oe-15-14-8667

[16] K. G. Larkin and P. A. Fletcher, “A coherent framework for fingerprintanalysis: Are fingerprints holograms?,” Opt. Express vol. 15, no. 14,pp. 8667–8677, 2007.

[17] D. Ghiglia andM. Pritt, Two-Dimensional Phase Unwrapping: Theory,Algorithms, and Software. Hoboken, NJ: Wiley, 1998.

[18] K. G. Larkin, D. J. Bone, and M. A. Oldfield, “Natural demodulationof two-dimensional fringe patterns. I. General background of the spiralphase quadrature transform,” J. Opt. Soc. Amer. A, vol. 18, no. 8, pp.1862–1870, 2001.

[19] B. Hastings, “An integrated representation of fingerprint patterns,” inProc. 16th School of Computer Science & Software Engineering Re-search Conf., Yanchep, Western Australia, Jun. 2008.

[20] L. Hong, Y. Wan, and A. Jain, “Fingerprint image enhancement: Algo-rithm and performance evaluation,” IEEE Trans. Pattern Anal. Mach.Intell., vol. 20, no. 8, pp. 777–789, Aug. 1998.

[21] R. Thai, “Fingerprint Image Enhancement and Minutiae Extraction,”Ph.D. thesis, School of Computer Science and Software Engineering,The University of Western Australia, Perth, Western Australia, Aus-tralia, 2003.

[22] R. Goldstein, H. Zebker, and C. Werner, “Satellite radar interferom-etry—Two-dimensional phase unwrapping,” Radio Sci., vol. 23, no. 4,pp. 713–720, 1988.

[23] D. Bone, “Fourier fringe analysis: The two-dimensional phase unwrap-ping problem,” Appl. Opt., vol. 30, no. 25, pp. 3627–3632, 1991.

[24] S. O. Novikov and V. S. Kot, “Singular feature detection and classifi-cation of fingerprints using hough transform,” in Proc. SPIE Int. Work-shop on Digital Image Processing and Computer Graphics, 1998, vol.3346, no. 1, pp. 259–269.

[25] A. Ross and A. Othman, “Mixing fingerprints for template securityand privacy,” in Proc. 19th Eur. Signal Processing Conf. (EUSIPCO),Barcelona, Spain, Aug. 2011.

[26] N. Yager and A. Amin, “Fingerprint alignment using a two stage opti-mization,” Pattern Recognit. Lett., vol. 27, no. 5, pp. 317–324, 2006.

[27] S. Crihalmeanu, A. Ross, S. Schuckers, and L. Hornak, A Protocolfor Multibiometric Data Acquisition, Storage and Dissemination LaneDepartment of Computer Science and Electrical Engineering, WVU,Tech. Rep., 2007.

[28] P. D. Kovesi, MATLAB and Octave Functions for Computer Visionand Image Processing Centre for Exploration Targeting, School ofEarth and Environment, The University of Western Australia [Online].Available: http://www.csse.uwa.edu.au/~pk/research/matlabfns/

[29] N. Ratha, S. Chikkerur, J. Connell, and R. Bolle, “Generating cance-lable fingerprint templates,” IEEE Trans. Pattern Anal. Mach. Intell.,vol. 29, no. 4, pp. 561–572, Apr. 2007.

[30] C. Lee, J. Choi, K. Toh, and S. Lee, “Alignment-free cancelable fin-gerprint templates based on local minutiae information,” IEEE Trans.Syst., Man, Cybern. B, Cybern., vol. 37, no. 4, pp. 980–992, Aug. 2007.

[31] S. Chikkerur, N. Ratha, J. Connell, and R. Bolle, “Generating regis-tration-free cancelable fingerprint templates,” in Proc. 2nd IEEE Int.Conf. Biometrics: Theory, Applications and Systems, 2008, pp. 1–6,IEEE.

[32] A. Nagar, K. Nandakumar, and A. K. Jain, “Biometric template trans-formation: A security analysis,” in Proc. SPIE, Electronic Imaging,Media Forensics and Security XII, San Jose, Jan. 2010.