Abstract
The use of biometrics such as fingerprints, voices, and images are becoming increasingly more ubiquitous through people’s daily lives, in applications ranging from authentication, identification, to much more sophisticated analytics, thanks to the recent rapid advances in both the sensing hardware technologies and machine learning techniques. While providing improved user experiences and better business insights, the use of biometrics has raised serious privacy concerns, due to their intrinsic sensitive nature and the accompanying high risk of leaking personally identifiable and private information.
In this paper, we propose a novel utility-preserving biometric anonymization framework, which provides a method to anonymize a biometric dataset without introducing artificial or external noise, with a process that retains features relevant for downstream machine learning-based analyses to extract interesting attributes that are valuable to relevant services, businesses, and research organizations. We carried out a thorough experimental evaluation using publicly available visual and vocal datasets. Results show that our proposed framework can achieve a high level of anonymization, while at the same time retain underlying data utility such that subsequent analyses on the anonymized biometric data could still be carried out to yield satisfactory accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rui, Z., Yan, Z.: A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE Access 7, 5994–6009 (2018)
Ortiz, N., Hernández, R.D., Jimenez, R., Mauledeoux, M., Avilés, O.: Survey of biometric pattern recognition via machine learning techniques. Contemp. Eng. Sci. 11(34), 1677–1694 (2018)
Barni, M., Donida Labati, R., Genovese, A., Piuri, V., Scotti, F.: Iris deidentification with high visual realism for privacy protection on websites and social networks. IEEE Access 9, 131995–132010 (2021). 2169-3536
Datta, P., Bhardwaj, S., Panda, S.N., Tanwar, S., Badotra, S.: Survey of security and privacy issues on biometric system. In: Gupta, B.B., Perez, G.M., Agrawal, D.P., Gupta, D. (eds.) Handbook of Computer Networks and Cyber Security, pp. 763–776. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-22277-2_30
Labati, R.D., Piuri, V., Scotti, F.: Biometric privacy protection: guidelines and technologies. In: Obaidat, M.S., Sevillano, J.L., Filipe, J. (eds.) ICETE 2011. CCIS, vol. 314, pp. 3–19. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35755-8_1
Garfinkel, S.: De-identification of Personal Information: US Department of Commerce, National Institute of Standards and Technology (2015)
Goodfellow, I.J., et al.: Challenges in representation learning: a report on three machine learning contests. In: NIPS (2013)
Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: ICCV (2015)
Becker, S., Ackermann, M., Lapuschkin, S., Müller, K.-R., Samek, W.: Interpreting and explaining deep neural networks for classification of audio signals. CoRR, vol. abs/1807.03418 (2018)
Apple, “Vision framework: Apply computer vision algorithms to perform a variety of tasks on input images and video” (2021). https://developer.apple.com/documentation/vision
Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. In: IEEE TKDE (2005)
Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2015
Hsu, W.-N., Bolte, B., Tsai, Y.-H.H., Lakhotia, K., Salakhutdinov, R., Mohamed, A.: HuBERT: self-supervised speech representation learning by masked prediction of hidden units. IEEE/ACM Trans. Audio Speech Lang. Process. 29, 3451–3460 (2021)
Breiman, L.: Random forests. Mach. Learn. 45, 5–32 (2001)
Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011)
Roffo, G., Melzi, S., Cristani, M.: Infinite feature selection. In: IEEE International Conference on Computer Vision (ICCV) 2015, pp. 4202–4210 (2015)
Gu, Q., Li, Z., Han, J.: Generalized fisher score for feature selection. In: Proceedings of the Twenty-Seventh Conference on Uncertainty in Artificial Intelligence, ser. UAI 2011, Arlington, Virginia, USA, pp. 266–273. AUAI Press (2011)
De Capitani, S., di Vimercati, S., Foresti, G.L., Samarati, P.: Data privacy: definitions and techniques. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 20(6), 793–817 (2012)
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: k-Anonymity. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Springer, Cham (2007)
Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng. (TKDE) 13(6), 1010–1027 (2001)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: \(\ell \)-diversity: privacy beyond \(k\)-anonymity. In: ACM TKDD (2007)
Bayardo, R.J., Agrawal, R.: Data privacy through optimal \(k\)-anonymization. In: ICDE (2005)
Ribaric, S., Ariyaeeinia, A., Pavesic, N.: De-identification for privacy protection in multimedia content. Image Commun. 47, 131–151 (2016)
Gross, R., Airoldi, E., Malin, B., Sweeney, L.: Integrating utility into face de-identification. In: PET (2005)
Gross, R., Sweeney, L., de la Torre, F., Baker, S.: Semi-supervised learning of multi-factor models for face de-identification. In: CVPR (2008)
Sun, Z., Meng, L., Ariyaeeinia, A.: Distinguishable de-identified faces. In: FG (2015)
Meden, B., Emersic, Z., Struc, V., Peer, P.: \(\kappa \)-Same-Net: neural-network-based face deidentification. In: IWOBI (2017)
Pan, Y.-L., Haung, M.-J., Ding, K.-T., Wu, J.-L., Jang, J.-S.: K-Same-Siamese-GAN: K-same algorithm with generative adversarial network for facial image de-identification with hyperparameter tuning and mixed precision training. In: AVSS (2019)
Li, T., Lin, L.: AnonymousNet: natural face de-identification with measurable privacy. In: CVPR Workshops (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Moriarty, B. et al. (2022). Utility-Preserving Biometric Information Anonymization. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds) Computer Security – ESORICS 2022. ESORICS 2022. Lecture Notes in Computer Science, vol 13555. Springer, Cham. https://doi.org/10.1007/978-3-031-17146-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-17146-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-17145-1
Online ISBN: 978-3-031-17146-8
eBook Packages: Computer ScienceComputer Science (R0)