{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T22:35:52Z","timestamp":1764714952313,"version":"3.41.0"},"reference-count":24,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T00:00:00Z","timestamp":1623801600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["42001392, 41571426, and 61701453"],"award-info":[{"award-number":["42001392, 41571426, and 61701453"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Fundamental Research Funds for the Central Universities (the China University of Geosciences","award":["CUG190607"],"award-info":[{"award-number":["CUG190607"]}]},{"name":"Wuhan Applied Basic Research Program","award":["2017010201010114"],"award-info":[{"award-number":["2017010201010114"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2021,8,31]]},"abstract":"<jats:p>Fingerprint provides an extremely convenient way of identification for a wide range of real-life applications owing to its universality, uniqueness, collectability, and invariance. However, digitized fingerprints may reveal the privacy of individuals. Differential privacy is a promising privacy-preserving solution that is enforced by injecting random noise into preserved objects, such that an adversary with arbitrary background knowledge cannot infer private input from the noisy results. This study proposes FinPrivacy, a privacy-preserving mechanism for fingerprint identification. This mechanism utilizes the low-rank matrix approximation to reduce the dimensionality of fingerprint and the exponential mechanism to carefully determine the value of the optimal rank. Thereafter, FinPrivacy injects Laplace noise to the singular values of the approximated singular matrix, thereby trading off between privacy and utility. Analytic proofs and results of the comparative experiments demonstrate that FinPrivacy can simultaneously enforce \u025b-differential privacy and maintain an efficient fingerprint recognition.<\/jats:p>","DOI":"10.1145\/3387130","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T12:39:34Z","timestamp":1594125574000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification"],"prefix":"10.1145","volume":"21","author":[{"given":"Tao","family":"Wang","sequence":"first","affiliation":[{"name":"Hubei Research Center for Educational Informationization, Faculty of Artificial Intelligence in Education, Central China Normal University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2010-0901","authenticated-orcid":false,"given":"Zhigao","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2601-9327","authenticated-orcid":false,"given":"Ali Kashif","family":"Bashir","sequence":"additional","affiliation":[{"name":"Department of Computing and Mathematics, Manchester Metropolitan University, UK and School of Electrical Engineering and Computer Science, National University of Science and Technology, Islamabad (NUST), Pakistan"}]},{"given":"Alireza","family":"Jolfaei","sequence":"additional","affiliation":[{"name":"Department of Computing, Macquarie University, Sydney, Australia"}]},{"given":"Yanyan","family":"Xu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing, Wuhan University, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2021,6,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2818162"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0034"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2017.19"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.04.013"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.865"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.01.039"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.06.077"},{"key":"e_1_2_1_9_1","first-page":"122","article-title":"Fingerprint template protection by adopting random projection based on re-encryption","volume":"39","author":"Jia Shan","year":"2018","unstructured":"Shan Jia , Zhengquan Xu , Chuanbo Hu , and Hao Wang . 2018 . Fingerprint template protection by adopting random projection based on re-encryption . J. Commun. 39 , 2 (2018), 122 \u2013 134 . Shan Jia, Zhengquan Xu, Chuanbo Hu, and Hao Wang. 2018. Fingerprint template protection by adopting random projection based on re-encryption. J. Commun. 39, 2 (2018), 122\u2013134 .","journal-title":"J. Commun."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2204272"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177733"},{"key":"e_1_2_1_12_1","first-page":"2640","article-title":"Differentially private high-dimensional data publication in internet of things","volume":"7","author":"Zhigao Zheng","year":"2020","unstructured":"Zheng Zhigao , Wang Tao , Wen Jinming , Mumtaz Shahid , Bashir Ali Kashif , and Chauhdary Sajjad Hussain . 2020 . Differentially private high-dimensional data publication in internet of things . IEEE IoT J. 7 , 4 (2020), 2640 \u2013 2650 . Zheng Zhigao, Wang Tao, Wen Jinming, Mumtaz Shahid, Bashir Ali Kashif, and Chauhdary Sajjad Hussain. 2020. Differentially private high-dimensional data publication in internet of things. IEEE IoT J. 7, 4 (2020), 2640\u20132650.","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2673843"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.047"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2949153"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3016100.3016229"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2845388"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808776"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2841377"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.247"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.990140"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/839291.842963"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/839291.842963"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920970"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387130","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:26Z","timestamp":1750199606000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,16]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,8,31]]}},"alternative-id":["10.1145\/3387130"],"URL":"https:\/\/doi.org\/10.1145\/3387130","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2021,6,16]]},"assertion":[{"value":"2019-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}