Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2857546.2857553acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

A Hybrid Scheme for Face Template Protection

Published: 04 January 2016 Publication History

Abstract

This paper proposes a hybrid scheme which combines modified shielding function with a one-way transformation technique known as matrix transformation. The modified shielding function is an improved version of the generic shielding function which eliminates the need for quantization and reliable bit selection. Concatenated error correction is applied to correct errors at the block level (burst errors) and bit level (bit errors within each block) unlike previous implementations of the shielding function which address only bit errors. The proposed matrix transformation technique is used to carry out a one-way, irreversible transformation of binary face templates before securing them with the shielding function. Experimental results show that the hybrid scheme has good recognition performance. Results from security analysis show that the scheme is resistant to guessing, replay, key exhaustion and template inversion attacks. It is also robust against privacy attacks such as decodability and cross-matching.

References

[1]
Agaian, S.S. 1985. Hadamard Matrix and their Applications. Springer Verlag, Berlin.
[2]
Benvenuto, C.J. 2012. Galois field in cryptography. Department of Mathematics, University of Washington (May 31, 2012), https://www.math.eashinghton.edu/~morrow/336_12/papers/juan.pdf
[3]
Berisha, A., Baxhaku, B. and Alidema, A. 2012. A class of non invertible matrices in GF (2) for practical one way hash algorithm. International Journal of Computer Applications, 54, 18 (September 2012), 15--20.
[4]
Boyen, X. 2004. Reusable cryptographic fuzzy extractors. In Proceedings of 11th ACM Conference on Computer and Communications Security (Washington, DC, USA, October 25-29, 2004) CCS '04. ACM, New York, NY, 82--91. DOI = 10.1145/1030083.1030096.
[5]
Bringer, J., Chabanne, H. and Kindarji, B. 2008. The best of both worlds: Applying secure sketches to cancelable biometrics. Science of Computer Programming 74 (December 2008), 43--51. DOI = 0.1016/j.scico.2008.09.016.
[6]
Chafia, F., Salim, C. and Farid, B. 2010. A biometric cryptosystem for authentication. In Proceedings of the International Conference on machine and Web Intelligence (Algiers, Algeria, October 03-05, 2010). ICMWI '10. IEEE, New York, NY, 434--438. DOI= 10.1109/ICMWI.2010.5648101
[7]
Cooke, B. 2004. Reed-Muller Error Correcting Codes, MIT Undergraduate Journal of Mathematics, 21--26.
[8]
Dahake, P. and Nimbhorkar, S. 2015. Hybrid cryptosystem for maintaining image integrity using biometric fingerprint. In Proceedings of the 2015 International Conference on Pervasive Computing (Pune, India, January 08-10, 2015), ICPC'15,IEEE, New York, NY. DOI= 10.1109/PERVASIVE.2015.7087177
[9]
Dodis, Y., Reyzin, L. and Smith, A. 2004. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. LNCS 3027 (Oct. 2004), 523--540.
[10]
Fishman, G.S. and Moore III, L.R. 1986. An exhaustive analysis of multiplicative congruential random number generators with modulus. SIAM J. Sci. and Stat. Comput., 7, 1 (Sep. 1986), 24--45.
[11]
Fishman, G.S. 1990. Multiplicative congruential random number generators with modulus 2β: An Exhaustive Analysis for β = 32 and Partial Analysis for β = 48. Mathematics of Computation, 54, 189 (Jun. 1990), 331--334.
[12]
Feng, Y.C. and Yuen, P.C. 2012. Vulnerabilities in binary face template. 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshop (Rhode Island, USA, June 16-21, 2012) CVPRW '12. IEEE New York, 105--110. DOI= 10.1109/CVPRW.2012.6239223.
[13]
Fuzhen, Z. 2011. Matrix Theory. s1. Springer, New York.
[14]
Hamouchene, I. and Aouat, S. 2014. A cognitive approach for texture analysis using neighbour-based binary patterns. In Proceeding of 13th International Conference on Cognitive Informatics and Cognitive Computing, (London, 18-20 Aug. 2014). IEEE, New York, 94--99. DOI= 10.1109/ICCI-CC.2014.6921447.
[15]
Jain, A.K., Ross, A.A., and Nandakumar, K. 2011. Introduction to Biometrics. Science+Business Media, New York.
[16]
Juels, A. and Sudan, M. 2006. A Fuzzy Vault Scheme. Design Codes and Cryptography, 38, 2 (June, 2006), 237--257. DOI= 10.1007/s10623-005-6343-z.
[17]
Juels A. and Wattenberg, M. 1999. A fuzzy commitment scheme. In Proceedings of 6th ACM Conference on Computer Communications and Security, (Singapore, Nov. 28-36, 1999). ACM, New York, 28--36. DOI= 10.1145/319709.319714.
[18]
Kanade, S. Petrovska-Dalacretaz, D. and Dorizzi, B. 2011. Multibiometrics based crypto-biometric session key generation and sharing protocol. MM&Sec '11 (Buffalo, New York Sep. 29-30, 2011). ACM, New York, 109--114. DOI= 10.1145/2037252.2037272.
[19]
Li, S.Z., Chu, R.F., Liao, S.C. and Zhang, L. 2007. Illumination invariant face recognition using near-infrared images. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29, 4 (February 2007), 627--639.
[20]
Linnartz, J.P. and Tuyls, P. 2003. New shielding functions to enhance privacy and prevent misuse of biometric templates. 4th Int. Conf. on Audio- and Video-Based Person Authentication, (Guildford, UK, June 9-11, 2003), 393--402. DOI= 10.1007/3-540-44887-X_47.
[21]
MacWilliams, F.J. and Sloane, N.J.A. 1991. The Theory of Error-correcting Codes. North Holland Publishers, Amsterdam, The Netherlands.
[22]
Meenakshi, V.S. and Padmavathi, G. 2009. Security analysis of password hardened multimodal biometric fuzzy vault. World Academy of Science Engineering and Technology 3, 8 (August 2009), 312--320.
[23]
Meenakshi, V.S. and Padmavathi, G. 2010. Security analysis of password hardened multimodal biometric fuzzy vault combined with feature points from fingerprint, iris and retina for high security application. Procedia Computer Science 2 (December 2010), 195--206. DOI= 10.1016/j.procs.2010.11.025
[24]
Nagar, A., Nandakumar, K. and Jain, A.K. 2010. A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recogn. Lett., 31, 8 (June 2010), 733--741. DOI = 10.1016/j.patrec.2009.07.003.
[25]
Nasir, M.S. and Kuppuswamy, P. 2013. Implementation of biometric security using simple hybrid combination of RSA and simple symmetric key algorithm. International Journal of Innovative Research in Computer and Communication Engineering, 1, 8 (Oct. 2013), 1741--1748.
[26]
Ratha, N.K., Connell, J.H. and Bolle, R.M. 2001. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40, 3 (Dec. 2001), 614--634. DOI = 10.1147/sj.403.0614.
[27]
Smith, A.D. 2004. Maintaining Secrecy when Information Leakage is Unavoidable. PhD Dissertation. Massachusetts Institute of Technology (Aug. 2004), Boston, Massachusetts, MA.
[28]
Uludag, U. and Jain, A.K. 2006. Securing fingerprint template: Fuzzy vault with helper data. In Proceedings of Conference on Computer Vision and Pattern Recognition Workshop (New York, June 17--22, 2006), CVPRW '06, IEEE, New York, 163--170. DOI= 10.1109/CVPRW.2006.185

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IMCOM '16: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication
January 2016
658 pages
ISBN:9781450341424
DOI:10.1145/2857546
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 January 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. biometric
  2. non-invertible transformation
  3. privacy
  4. security
  5. shielding function

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

IMCOM '16
Sponsor:

Acceptance Rates

Overall Acceptance Rate 213 of 621 submissions, 34%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 48
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media