Skip to main content

Biometric Encryption: Creating a Privacy-Preserving ‘Watch-List’ Facial Recognition System

  • Chapter
Security and Privacy in Biometrics

Abstract

This paper presents the proof of concept of a facial recognition (FR) system combined with Biometric Encryption (BE) in a watch-list scenario. The system was successfully deployed for Ontario Lottery and Gaming Corporation (OLG) self-exclusion (SE) program. The system is hybrid in nature and comprises a commercial facial recognition module with anonymous templates sequentially combined with a BE module. BE is used to conceal the relationship between a self-excluded person’s FR template and their other personal information (PI). To reveal the corresponding PI record for a matched FR record, BE will attempt to release the pointer key. The FR templates and BE helper data use different biometric feature vectors to prevent interoperability between two modules. In case of a positive match, the final decision is made by a human operator. The BE scheme is based on improved Quantization Index Modulation (QIM) method. It is shown that, unlike other BE schemes, QIM offers a curve of operating points, thus allowing optimal tuning of the entire system. The simulations were performed on a subset of the CMU PIE face image database and then on the actual live test database involving OLG control group participants (simulating the self-excluded persons) and the general public. The maximum Correct Identification Rate was 91 % without BE and 90 % with BE, while FAR (before manual inspection) was of the order of 1 % (depending on the SE database size) without BE and by 30 % to 50 % lower with BE. This system, which we consider an example of Privacy by Design approach, was shown to enhance patron privacy (both for those on the watch list, and regular patrons), system security, and overall accuracy of the watch list system within the context of the OLG self-exclusion program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The Ontario Lottery and Gaming Corporation is designated as an institution for the purposes of the Freedom of Information and Protection of Privacy Act, R.S.O. 1990, c. F.31.

References

  1. Self Exclusion (2009) Ontario Lottery and Gaming Corporation. http://www.knowyourlimit.ca/self-exclusion.html

  2. Cavoukian A, Stoianov A (2009) Biometric encryption: the new breed of untraceable biometrics. In: Boulgouris NV, Plataniotis KN, Micheli-Tzanakou E (eds) Biometrics: Fundamentals, Theory, and Systems. Wiley/IEEE Press, New York, pp 655–718. Chapter 26

    Google Scholar 

  3. Martin K, Lu H, Bui F, Plataniotis KN, Hatzinakos D (2009) A biometric encryption system for the self-exclusion scenario of face recognition. IEEE Systems Journal 3(4):440–450. Special issue on biometrics systems

    Article  Google Scholar 

  4. Bui FM, Martin K, Lu H, Plataniotis KN, Hatzinakos D (2010) Fuzzy key binding strategies based on quantization index modulation (QIM) for biometric encryption (BE) applications. IEEE Transactions on Information Forensics and Security 5(1):118–132

    Article  Google Scholar 

  5. For information on casino self-exclusion programs in Canada, see: British Columbia: http://www.bclc.com/cm/gamesense/voluntary-self-exclusion.htm; Alberta: http://www.aglc.gov.ab.ca/responsiblegambling/selfexclusionprogram.asp; Saskatchewan (Indian Gaming Authority): http://www.siga.sk.ca/Self~%20Exlusion~%20Broch.pdf; Manitoba: http://www.mlc.mb.ca/MLC/content.php?pageid=420&langdir=E; Ontario: http://www.olg.ca/about/responsible_gaming/practices.jsp; Quebec: http://lotoquebec.com/corporatif/nav/en/responsible-gaming/self-exclusion-program; Nova Scotia: http://www.nsgc.ca/rgVoluntary.php; PEI: http://www.alc.ca/PlayResponsibly.aspx?id=2041

  6. Hancock P, Bruce V, Burton AM (2000) Recognition of unfamiliar faces. Trends in Cognitive Sciences 4(9):330–337

    Article  Google Scholar 

  7. Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3):614–634

    Article  Google Scholar 

  8. Cavoukian A (2010) The 7 foundational principles: implementation and mapping of fair information practices. IPC, May 2010. http://www.ipc.on.ca/images/Resources/pbd-implement-7found-principles.pdf

  9. Privacy by Design Resolution (2010) 32nd international conference of data protection and privacy commissioners, Jerusalem, Israel, 27–29 October 2010

    Google Scholar 

  10. Tomko GJ, Soutar C, Schmidt GJ (1996) Fingerprint controlled public key cryptographic system. US Patent 5541994, 30 July 1996 (Filing date: 7 Sept 1994)

    Google Scholar 

  11. Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP Journal on Advances in Signal Processing 2008:1–17. Article ID 579416

    Article  Google Scholar 

  12. Tuyls P, Škorić B, Kevenaar T (eds) (2007) Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-counterfeiting. Springer, London

    MATH  Google Scholar 

  13. Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security 2011:3–25. http://jis.eurasipjournals.com/content/2011/1/3

    Article  Google Scholar 

  14. Delvaux N, Bringer J, Grave J, Kratsev K, Lindeberg P, Midgren J, Breebaart J, Akkermans T, Van der Veen M, Veldhuis R, Kindt E, Simoens K, Busch C, Bours P, Gafurov D, Yang B, Stern J, Rust C, Cucinelli B, Skepastianos D (2008) Pseudo identities based on fingerprint characteristics. In: IEEE 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15–17 August

    Google Scholar 

  15. Adjedj M, Bringer J, Chabanne H, Kindarji B (2009) Biometric identification over encrypted data made feasible. In: Lecture Notes in Computer Science, vol 5905. Springer, Berlin, pp 86–100

    Google Scholar 

  16. Ultra fast fingerprint matching for large scale databases (2010) Product Brochure FastAFIS® SDK, priv-ID BV. http://www.priv-id.com/wp-content/uploads/priv-ID-Product-Brochure-FastAFIS-SDK.pdf

  17. Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4):561–572

    Article  Google Scholar 

  18. Savvides M, Vijaya Kumar BVK, Khosla PK (2004) Cancelable biometric filters for face recognition. In: Proc 17th International Conference on Pattern Recognition (ICPR’04), vol 3 Cambridge, England, pp 922–925

    Google Scholar 

  19. Teoh ABJ, Yuang CT (2007) Cancelable biometrics realization with multispace random projections. IEEE Transactions on Systems, Man and Cybernetics. Part B. Cybernetics 37(5):1096–1106

    Article  Google Scholar 

  20. Boult T (2006) Robust distance measures for face recognition supporting revocable biometric tokens. In: Proceedings of the 7th International Conference on Automatic Face and Gesture Recognition, 10–12 April 2006. IEEE Computer Society, Washington, pp 560–566

    Google Scholar 

  21. Grother PJ, Quinn GW, Phillips JP (2010) Report on the evaluation of 2D still-image face recognition algorithms. NIST interagency report 7709, multiple-biometric evaluation (MBE), 22 June 2010

    Google Scholar 

  22. Face recognition as a search tool: Bundeskriminalamt, final report. http://www.eucpn.org/download/?file=GER%20FAce%20Recognition.pdf&type=14

  23. Phillips PJ, Scruggs WT, O’Toole AJ, Flynn PJ, Bowyer KW, Schott CL, Sharpe M (2007) FRVT 2006 and ICE 2006 large-scale results. NIST report NISTIR 7408, 29 March 2007

    Google Scholar 

  24. Bonson K, Johnson R How facial recognition systems work. http://electronics.howstuffworks.com/facial-recognition.htm

  25. Olsen S ACLU decries face-recognition tools. http://news.cnet.com/ACLU-decries-face-recognition-tools/2100-1023_3-800864.html

  26. Moss D (2009) FBI techs shy away from facial recognition: spends 40 years losing face, 3 Nov 2009. http://www.theregister.co.uk/2009/11/03/fbio_face_recognition/

  27. Pato JN, Millett LI (eds) (2010) Biometric recognition: challenges and opportunities. Whither biometrics committee, computer science and telecommunications board, Division on Engineering and Physical Sciences, National Research Council, 24 Sept 2010. http://www.nap.edu/catalog/12720.html

  28. Pender JM What facial recognition technology means for privacy and civil liberties. Statement before the subcommittee on privacy, technology and the law committee on the judiciary. United States Senate, 18 July 2012. http://www.judiciary.senate.gov/pdf/12-7-18PenderTestimony.pdf

  29. Youmaran R, Adler A, Loyka S (2006) Towards a measure of biometric information. In: Can Conf Computer Elec Eng (CCECE), Ottawa, Canada, 7–10 May 2006

    Google Scholar 

  30. Nandakumar K, Jain AK (2008) Multibiometric template security using fuzzy vault. In: 2nd IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS 2008), Arlington, VA, 29 Sept–1 Oct 2008, pp 1–6

    Chapter  Google Scholar 

  31. Tuyls P, Akkermans AHM, Kevenaar TAM, Schrijen G-J, Bazen AM, Veldhuis RNJ (2005) Practical biometric authentication with template protection. In: 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, 20–22 July 2005. Lecture Notes in Computer Science, vol 3546. Springer, Berlin, pp 436–446

    Google Scholar 

  32. Van der Veen M, Kevenaar T, Schrijen G-J, Akkermans TH, Zuo F (2006) Face biometrics with renewable templates. In: Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia Contents VIII, vol 6072

    Google Scholar 

  33. Chen C, Veldhuis R, Kevenaar T, Akkermans T (2007) Multi-bits biometric string generation based on the likelihood ratio. In: IEEE Conference on Biometrics: Theory, Applications and Systems, Washington, DC, 27–29 September 2007

    Google Scholar 

  34. Chen B, Wornell GW (2001) Quantization index modulation methods for digital watermarking and information embedding of multimedia. Journal of VLSI Signal Processing 27(1):7–33

    MATH  Google Scholar 

  35. Linnartz J-P, Tuyls P (2003) New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proc of the 4th Int Conf on Audio and Video Based Biometric Person Authentication, Guildford, UK, pp 393–402

    Chapter  Google Scholar 

  36. Buhan IR, Doumen JM, Hartel PH, Veldhuis RNJ (2007) Constructing practical fuzzy extractors using QIM. Technical report TR-CTIT-07-52, Centre for Telematics and Information Technology, University of Twente, Enschede

    Google Scholar 

  37. Sim T, Baker S, Bsat M (2003) The CMU pose, illumination, and expression database. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(12):1615–1618

    Article  Google Scholar 

  38. Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: IEEE Conference on Computer Vision and Pattern Recognition, pp 589–591

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Cavoukian, A. et al. (2013). Biometric Encryption: Creating a Privacy-Preserving ‘Watch-List’ Facial Recognition System. In: Campisi, P. (eds) Security and Privacy in Biometrics. Springer, London. https://doi.org/10.1007/978-1-4471-5230-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5230-9_9

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-5229-3

  • Online ISBN: 978-1-4471-5230-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics