{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T11:16:26Z","timestamp":1764414986569,"version":"3.46.0"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2026,2,28]]},"abstract":"<jats:p>In secure sensor-based applications, generating unique and secure credentials is crucial for ensuring trust and privacy. Traditionally, pseudo-random number generators have been used for this purpose. However, biometric data, especially fingerprint features, has emerged as a robust alternative. This article proposes a dynamic approach for generating a privacy-preserving unique identity from fingerprint sensor data. The method isolates a region of interest (ROI) from the fingerprint image and extracts two feature sets: minutiae-based data and texture-based information. These features are combined and optimized to produce a hybrid feature vector containing discriminative and relevant attributes. A unique identity (termed a key) is then dynamically generated from this vector, characterized by reliability, revocability, unlinkability, and irreversibility. Extensive evaluations using fingerprint images from sensors of varying quality and resolution have demonstrated the method\u2019s robustness. The generated identities have been statistically validated using NIST and Diehard test suites, confirming strong adherence to randomness requirements. Also, comprehensive security analyses have shown resilience against different adversarial attacks. Notably, the approach avoids storing biometric data or generated identities, enhancing privacy protection. These features make the proposed method ideal for secure sensor-based applications such as authentication, data storage security, and digital signature schemes.<\/jats:p>","DOI":"10.1145\/3769862","type":"journal-article","created":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T11:08:37Z","timestamp":1759230517000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Privacy-preserving Identity Generation from Fingerprint Sensor Data for Secure Applications"],"prefix":"10.1145","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-4695-9574","authenticated-orcid":false,"given":"Priyabrata","family":"Dash","sequence":"first","affiliation":[{"name":"Advanced Technology Development Centre, Indian Institute of Technology Kharagpur","place":["Kharagpur, India"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3224-8575","authenticated-orcid":false,"given":"Fagul","family":"Pandey","sequence":"additional","affiliation":[{"name":"Synopsys Inc","place":["Bangalore, India"]},{"name":"Indian Institute of Technology Kharagpur","place":["Bangalore, India"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5645-9716","authenticated-orcid":false,"given":"Monalisa","family":"Sarma","sequence":"additional","affiliation":[{"name":"School of Quality and Reliability, Indian Institute of Technology Kharagpur","place":["Kharagpur, India"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6104-3771","authenticated-orcid":false,"given":"Debasis","family":"Samanta","sequence":"additional","affiliation":[{"name":"Computer Science & Engineering, Indian Institute of Technology Kharagpur","place":["Kharagpur, India"]}]}],"member":"320","published-online":{"date-parts":[[2025,11,29]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.11.018"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11325-w"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2983250"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103506"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273523"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.3390\/e19020070"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.27.5.053031"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890743"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.10.009"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.02.024"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13817-9"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2505630"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2402593"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.107"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.12.048"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25948-0_1"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2002.1048144"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.01.042"},{"issue":"01","key":"e_1_3_1_20_2","first-page":"2014","article-title":"DIEHARD test suite","volume":"8","author":"Marsaglia Georges","year":"1998","unstructured":"Georges Marsaglia. 1998. DIEHARD test suite. Online: http:\/\/www.stat.fsu.edu\/pub\/diehard 8, 01 (1998), 2014.","journal-title":"Online:"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2766523"},{"key":"e_1_3_1_22_2","first-page":"223","volume-title":"Proceedings of the Media Forensics and Security II","author":"Nagar Abhishek","year":"2010","unstructured":"Abhishek Nagar, Shantanu Rane, and Anthony Vetro. 2010. Alignment and bit extraction for secure fingerprint biometrics. In Proceedings of the Media Forensics and Security II. SPIE, 223\u2013236."},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2012.0060"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.01.028"},{"key":"e_1_3_1_25_2","first-page":"1","article-title":"Biometric-based cryptography for digital content protection without any key storage","author":"Panchal Gaurang","year":"2019","unstructured":"Gaurang Panchal, Debasis Samanta, and Subhas Barman. 2019. Biometric-based cryptography for digital content protection without any key storage. Multimedia Tools and Applications 78, 19 (2019), 1\u201322.","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"e_1_3_1_26_2","first-page":"e0154160","article-title":"ASRA: Automatic singular value decomposition-based robust fingerprint image alignment","volume":"20","author":"Pandey Fagul","year":"2020","unstructured":"Fagul Pandey, Priyabrata Dash, Debasis Samanta, and Monalisa Sarma. 2020. ASRA: Automatic singular value decomposition-based robust fingerprint image alignment. Multimedia Tools and Applications 20, 5 (2020), e0154160.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2185227"},{"key":"e_1_3_1_28_2","first-page":"27","article-title":"Database ii","volume":"6","author":"PolyU HRF","year":"2016","unstructured":"HRF PolyU. 2016. Database ii. Accessed Online On 6 (2016), 27.","journal-title":"Accessed Online On"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13241-4_18"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894366"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10136-9"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103458"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2389768"},{"key":"e_1_3_1_34_2","article-title":"A tutorial on distance metric learning: Mathematical foundations, algorithms, experimental analysis, prospects and challenges","author":"Su\u00e1rez Juan Luis","year":"2020","unstructured":"Juan Luis Su\u00e1rez, Salvador Garc\u00eda, and Francisco Herrera. 2020. A tutorial on distance metric learning: Mathematical foundations, algorithms, experimental analysis, prospects and challenges. Neurocomputing 425 (2020), 300\u2013322.","journal-title":"Neurocomputing"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00663-3"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304861"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2046965"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107733"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1778-2"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22782"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.12.048"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.10.001"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T11:13:04Z","timestamp":1764414784000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769862"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,29]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2,28]]}},"alternative-id":["10.1145\/3769862"],"URL":"https:\/\/doi.org\/10.1145\/3769862","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2025,11,29]]},"assertion":[{"value":"2024-12-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}