Abstract
This paper presents the proof of concept of a facial recognition (FR) system combined with Biometric Encryption (BE) in a watch-list scenario. The system was successfully deployed for Ontario Lottery and Gaming Corporation (OLG) self-exclusion (SE) program. The system is hybrid in nature and comprises a commercial facial recognition module with anonymous templates sequentially combined with a BE module. BE is used to conceal the relationship between a self-excluded person’s FR template and their other personal information (PI). To reveal the corresponding PI record for a matched FR record, BE will attempt to release the pointer key. The FR templates and BE helper data use different biometric feature vectors to prevent interoperability between two modules. In case of a positive match, the final decision is made by a human operator. The BE scheme is based on improved Quantization Index Modulation (QIM) method. It is shown that, unlike other BE schemes, QIM offers a curve of operating points, thus allowing optimal tuning of the entire system. The simulations were performed on a subset of the CMU PIE face image database and then on the actual live test database involving OLG control group participants (simulating the self-excluded persons) and the general public. The maximum Correct Identification Rate was 91 % without BE and 90 % with BE, while FAR (before manual inspection) was of the order of 1 % (depending on the SE database size) without BE and by 30 % to 50 % lower with BE. This system, which we consider an example of Privacy by Design approach, was shown to enhance patron privacy (both for those on the watch list, and regular patrons), system security, and overall accuracy of the watch list system within the context of the OLG self-exclusion program.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The Ontario Lottery and Gaming Corporation is designated as an institution for the purposes of the Freedom of Information and Protection of Privacy Act, R.S.O. 1990, c. F.31.
References
Self Exclusion (2009) Ontario Lottery and Gaming Corporation. http://www.knowyourlimit.ca/self-exclusion.html
Cavoukian A, Stoianov A (2009) Biometric encryption: the new breed of untraceable biometrics. In: Boulgouris NV, Plataniotis KN, Micheli-Tzanakou E (eds) Biometrics: Fundamentals, Theory, and Systems. Wiley/IEEE Press, New York, pp 655–718. Chapter 26
Martin K, Lu H, Bui F, Plataniotis KN, Hatzinakos D (2009) A biometric encryption system for the self-exclusion scenario of face recognition. IEEE Systems Journal 3(4):440–450. Special issue on biometrics systems
Bui FM, Martin K, Lu H, Plataniotis KN, Hatzinakos D (2010) Fuzzy key binding strategies based on quantization index modulation (QIM) for biometric encryption (BE) applications. IEEE Transactions on Information Forensics and Security 5(1):118–132
For information on casino self-exclusion programs in Canada, see: British Columbia: http://www.bclc.com/cm/gamesense/voluntary-self-exclusion.htm; Alberta: http://www.aglc.gov.ab.ca/responsiblegambling/selfexclusionprogram.asp; Saskatchewan (Indian Gaming Authority): http://www.siga.sk.ca/Self~%20Exlusion~%20Broch.pdf; Manitoba: http://www.mlc.mb.ca/MLC/content.php?pageid=420&langdir=E; Ontario: http://www.olg.ca/about/responsible_gaming/practices.jsp; Quebec: http://lotoquebec.com/corporatif/nav/en/responsible-gaming/self-exclusion-program; Nova Scotia: http://www.nsgc.ca/rgVoluntary.php; PEI: http://www.alc.ca/PlayResponsibly.aspx?id=2041
Hancock P, Bruce V, Burton AM (2000) Recognition of unfamiliar faces. Trends in Cognitive Sciences 4(9):330–337
Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3):614–634
Cavoukian A (2010) The 7 foundational principles: implementation and mapping of fair information practices. IPC, May 2010. http://www.ipc.on.ca/images/Resources/pbd-implement-7found-principles.pdf
Privacy by Design Resolution (2010) 32nd international conference of data protection and privacy commissioners, Jerusalem, Israel, 27–29 October 2010
Tomko GJ, Soutar C, Schmidt GJ (1996) Fingerprint controlled public key cryptographic system. US Patent 5541994, 30 July 1996 (Filing date: 7 Sept 1994)
Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP Journal on Advances in Signal Processing 2008:1–17. Article ID 579416
Tuyls P, Škorić B, Kevenaar T (eds) (2007) Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-counterfeiting. Springer, London
Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security 2011:3–25. http://jis.eurasipjournals.com/content/2011/1/3
Delvaux N, Bringer J, Grave J, Kratsev K, Lindeberg P, Midgren J, Breebaart J, Akkermans T, Van der Veen M, Veldhuis R, Kindt E, Simoens K, Busch C, Bours P, Gafurov D, Yang B, Stern J, Rust C, Cucinelli B, Skepastianos D (2008) Pseudo identities based on fingerprint characteristics. In: IEEE 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15–17 August
Adjedj M, Bringer J, Chabanne H, Kindarji B (2009) Biometric identification over encrypted data made feasible. In: Lecture Notes in Computer Science, vol 5905. Springer, Berlin, pp 86–100
Ultra fast fingerprint matching for large scale databases (2010) Product Brochure FastAFIS® SDK, priv-ID BV. http://www.priv-id.com/wp-content/uploads/priv-ID-Product-Brochure-FastAFIS-SDK.pdf
Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4):561–572
Savvides M, Vijaya Kumar BVK, Khosla PK (2004) Cancelable biometric filters for face recognition. In: Proc 17th International Conference on Pattern Recognition (ICPR’04), vol 3 Cambridge, England, pp 922–925
Teoh ABJ, Yuang CT (2007) Cancelable biometrics realization with multispace random projections. IEEE Transactions on Systems, Man and Cybernetics. Part B. Cybernetics 37(5):1096–1106
Boult T (2006) Robust distance measures for face recognition supporting revocable biometric tokens. In: Proceedings of the 7th International Conference on Automatic Face and Gesture Recognition, 10–12 April 2006. IEEE Computer Society, Washington, pp 560–566
Grother PJ, Quinn GW, Phillips JP (2010) Report on the evaluation of 2D still-image face recognition algorithms. NIST interagency report 7709, multiple-biometric evaluation (MBE), 22 June 2010
Face recognition as a search tool: Bundeskriminalamt, final report. http://www.eucpn.org/download/?file=GER%20FAce%20Recognition.pdf&type=14
Phillips PJ, Scruggs WT, O’Toole AJ, Flynn PJ, Bowyer KW, Schott CL, Sharpe M (2007) FRVT 2006 and ICE 2006 large-scale results. NIST report NISTIR 7408, 29 March 2007
Bonson K, Johnson R How facial recognition systems work. http://electronics.howstuffworks.com/facial-recognition.htm
Olsen S ACLU decries face-recognition tools. http://news.cnet.com/ACLU-decries-face-recognition-tools/2100-1023_3-800864.html
Moss D (2009) FBI techs shy away from facial recognition: spends 40 years losing face, 3 Nov 2009. http://www.theregister.co.uk/2009/11/03/fbio_face_recognition/
Pato JN, Millett LI (eds) (2010) Biometric recognition: challenges and opportunities. Whither biometrics committee, computer science and telecommunications board, Division on Engineering and Physical Sciences, National Research Council, 24 Sept 2010. http://www.nap.edu/catalog/12720.html
Pender JM What facial recognition technology means for privacy and civil liberties. Statement before the subcommittee on privacy, technology and the law committee on the judiciary. United States Senate, 18 July 2012. http://www.judiciary.senate.gov/pdf/12-7-18PenderTestimony.pdf
Youmaran R, Adler A, Loyka S (2006) Towards a measure of biometric information. In: Can Conf Computer Elec Eng (CCECE), Ottawa, Canada, 7–10 May 2006
Nandakumar K, Jain AK (2008) Multibiometric template security using fuzzy vault. In: 2nd IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS 2008), Arlington, VA, 29 Sept–1 Oct 2008, pp 1–6
Tuyls P, Akkermans AHM, Kevenaar TAM, Schrijen G-J, Bazen AM, Veldhuis RNJ (2005) Practical biometric authentication with template protection. In: 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, 20–22 July 2005. Lecture Notes in Computer Science, vol 3546. Springer, Berlin, pp 436–446
Van der Veen M, Kevenaar T, Schrijen G-J, Akkermans TH, Zuo F (2006) Face biometrics with renewable templates. In: Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia Contents VIII, vol 6072
Chen C, Veldhuis R, Kevenaar T, Akkermans T (2007) Multi-bits biometric string generation based on the likelihood ratio. In: IEEE Conference on Biometrics: Theory, Applications and Systems, Washington, DC, 27–29 September 2007
Chen B, Wornell GW (2001) Quantization index modulation methods for digital watermarking and information embedding of multimedia. Journal of VLSI Signal Processing 27(1):7–33
Linnartz J-P, Tuyls P (2003) New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proc of the 4th Int Conf on Audio and Video Based Biometric Person Authentication, Guildford, UK, pp 393–402
Buhan IR, Doumen JM, Hartel PH, Veldhuis RNJ (2007) Constructing practical fuzzy extractors using QIM. Technical report TR-CTIT-07-52, Centre for Telematics and Information Technology, University of Twente, Enschede
Sim T, Baker S, Bsat M (2003) The CMU pose, illumination, and expression database. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(12):1615–1618
Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: IEEE Conference on Computer Vision and Pattern Recognition, pp 589–591
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Cavoukian, A. et al. (2013). Biometric Encryption: Creating a Privacy-Preserving ‘Watch-List’ Facial Recognition System. In: Campisi, P. (eds) Security and Privacy in Biometrics. Springer, London. https://doi.org/10.1007/978-1-4471-5230-9_9
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5230-9_9
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5229-3
Online ISBN: 978-1-4471-5230-9
eBook Packages: Computer ScienceComputer Science (R0)