Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2482513.2482532acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Non-invertible and revocable iris templates using key-dependent wavelet transforms

Published: 17 June 2013 Publication History

Abstract

A technique to generate non-invertible and revocable iris templates is proposed employing key-dependent wavelet transforms. In particular, parametrised wavelet-filters and wavelet packets are used in feature extraction in replacement of a pyramidal D4 wavelet transform. Since the template generation process is non-invertible by design, the overall scheme is non-invertible as well. Recognition accuracy is found to be high as long as personal tokens remain secret, templates can be revoked by simply exchanging the wavelet transform applied in the feature extraction process.

References

[1]
R. Cappelli, A. Lumini, D. Maio, and D. Maltoni. Fingerprint image reconstruction from standard templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(9):1489--1503, 2007.
[2]
A. Cohen and N. Dyn. Nonstationary subdivisions schemes and multiresolution analysis. SIAM Journal of Mathematical Analysis, 27(6):1745--1769, Nov. 1996.
[3]
W. Dietl, P. Meerwald, and A. Uhl. Protection of wavelet-based watermarking systems using filter parametrization. Signal Processing (Special Issue on Security of Data Hiding Technologies), 83(10):2095--2116, Oct. 2003
[4]
D. Engel, T. Stütz, and A. Uhl. Assessing JPEG2000 encryption with key-dependent wavelet packets. EURASIP Journal on Information Security, 2012(2), 2012.
[5]
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft. Privacy-preserving face recognition. In I. Goldberg and M. Atallah, editors, Proceedings of Privacy Enhancing Technologies (PETS'09), volume 5672 of LNCS, pages 235--253. Springer Verlag, 2009.
[6]
J. Feng and A. Jain. Fingerprint reconstruction: From minutiae to phase. IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(2):209,223, 2011.
[7]
J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez, and J. Ortega-Garcia. From the iriscode to the iris: A new vulnerability of iris recognition systems, 2012. Briefings-Talk at blackhat USA 2012, http://media.blackhat.com/bh-us-12/Briefings/Galbally/BH_US_12_Galbally_Iris_Reconstruction_WP.pdf.
[8]
O. Gerek and A. Cetin. Polyphase adaptive filter banks for fingerprint image compression. Electronics Letters, 34:1931?--1932, Oct. 1998.
[9]
M. Gomez-Barrero, J. Galbally, P. Tome, and J. Fierrez. On the vulnerability of iris-based systems to a software attack based on a genetic algorithm. In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, volume 7441 of Lecture Notes on Computer Science, pages 114--121, Berlin, Heidelberg, 2012. Springer-Verlag.
[10]
M. Häfner, R. Kwitt, A. Uhl, A. Gangl, F. Wrba, and A. Vécsei. Computer-assisted pit-pattern classification in different wavelet domains for supporting dignity assessment of colonic polyps. Pattern Recognition, 42(6):1180--1191, Sept. 2008.
[11]
J. Hämmerle-Uhl, E. Pschernig, and A. Uhl. Cancelable iris-templates using key-dependent wavelet transforms. In Proceedings of the 6th IAPR/IEEE International Conference on Biometrics (ICB'13), Madrid, Spain, June 2013. To appear.
[12]
A. K. Jain, K. Nandakumar, and A. Nagar. Biometric template security. EURASIP Journal Adv. Signal Process, 2008:1--17, 2008.
[13]
G. Laimer and A. Uhl. Key dependent JPEG2000-based robust hashing for secure image authentication. EURASIP Journal on Information Security, Article ID 895174: 19 pages, 2008.
[14]
L. Ma, T. Tan, Y. Wang, and D. Zhang. Efficient iris recognition by characterizing key local variations. IEEE Transactions on Image Processing, 13(6):739--750, June 2004.
[15]
B. Mühlbacher, T. Stütz, and A. Uhl. JPEG2000 Part 2 wavelet packet subband structures in fingerprint recognition. In P. Frossard, H. Li, F. Wu, B. Girod, S. Li, and G. Wei, editors, Visual Communications and Image Processing 2010 (VCIP'10), number 7744 in Proceedings of SPIE, pages 77442C'1--77442C'10, Huang Shan, China, July 2010. SPIE.
[16]
N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614--634, Apr. 2001.
[17]
C. Rathgeb and A. Uhl. Attacking iris recognition: An effcient hill-climbing technique. In Proceedings of the 20th International Conference on Pattern Recognition (ICPR'10), pages 1217--1220, Istanbul, Turkey, 2010.
[18]
C. Rathgeb and A. Uhl. A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security, 2011(3), 2011.
[19]
C. Roberts. Biometric attack vectors and defenses. Computers & Security, 26:14--25, 2007.
[20]
A. Ross, J. Shah, and A. K. Jain. From template to image: Reconstructing fingerprints from minutiae points. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):544--560, 2007.
[21]
J. Schneid and S. Pittner. On the parametrization of the coefficients of dilation equations for compactly supported wavelets. Computing, 51:165--173, May 1993.
[22]
B. Sy. Secure computation for privacy preserving biometric data retrieval and authentication. In D. Ortiz-Arroyo et al., editors, Intelligence and Security Informatics, volume 5376 of LNCS, pages 143--154. Springer Verlag, 2008.
[23]
S. Venugopalan and M. Savvides. How to generate spoofed irises from an iris code template. IEEE Transactions of Information Forensics and Security, 6:385--394, 2011.
[24]
M. Wickerhauser. Adapted wavelet analysis from theory to software. A.K. Peters, Wellesley, Mass., 1994.
[25]
Y. Zhu, T. Tan, and Y. Wang. Biometric personal identification based on iris patterns. In Proceedings of the 15th International Conference on Pattern Recognition (ICPR'00), volume 2, pages 2801--2804. IEEE Computer Society, 2000.
[26]
H. Zou and A. H. Tewfik. Parametrization of compactly supported orthonormal wavelets. IEEE Transactions on Signal Processing, 41(3):1423--1431, Mar. 1993.

Index Terms

  1. Non-invertible and revocable iris templates using key-dependent wavelet transforms

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IH&MMSec '13: Proceedings of the first ACM workshop on Information hiding and multimedia security
    June 2013
    242 pages
    ISBN:9781450320818
    DOI:10.1145/2482513
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 June 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. biometric salting
    2. cancelable biometrics
    3. filter parameterisation
    4. iris recognition
    5. wavelet packets
    6. wavelet transform

    Qualifiers

    • Research-article

    Conference

    IH&MMSec '13
    Sponsor:

    Acceptance Rates

    IH&MMSec '13 Paper Acceptance Rate 27 of 74 submissions, 36%;
    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 124
      Total Downloads
    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 24 Dec 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media