Skip to main content

R-IoM: Enhance Biometric Security with Redundancy-Reduced Hashcode Reliability

  • Conference paper
  • First Online:
Biometric Recognition (CCBR 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14463))

Included in the following conference series:

  • 365 Accesses

Abstract

This research focuses on analyzing vulnerabilities in the IoM hashing technique concerning its susceptibility to preimage attacks, which poses a significant security concern in biometric template protection (BTP) systems. To address these vulnerabilities and achieve a balanced trade-off between performance and security, we propose a novel approach called R-IoM hashing. This method introduces innovative mitigation strategies to minimize information leakage and enhance the resistance to preimage attacks. By employing a dimensionality reduction technique during the IoM hashing process, R-IoM hashing effectively eliminates extraneous data, ensuring improved security without compromising computational efficiency. Through comprehensive experiments, we demonstrate the effectiveness of R-IoM hashing. Notably, this approach maintains remarkably low error rates while showcasing robust resilience against preimage attacks compared to conventional IoM hashing. This substantial improvement in security positions R-IoM hashing as a promising solution for real-world BTP applications. Our research underscores the importance of accurate distance measurement in feature comparison, identifies vulnerabilities in IoM hashing, and introduces a practical and efficient solution through R-IoM hashing to enhance the reliability and security of biometric-based systems. This paper contributes valuable insights into biometric template protection and offers a potential avenue for future research and implementation in security-critical environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Simmons, G.J.: A survey of information authentication. Proc. IEEE 76(5), 603–620 (1988)

    Article  Google Scholar 

  2. Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25–31 (2004)

    Article  Google Scholar 

  3. Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)

    Article  Google Scholar 

  4. Unar, J., Seng, W.C., Abbasi, A.: A review of biometric technology along with trends and prospects. Pattern Recogn. 47(8), 2673–2688 (2014)

    Article  Google Scholar 

  5. Zhao, W., Chellappa, R., Phillips, P.J., Rosenfeld, A.: Face recognition: a literature survey. ACM Comput. Surv. (CSUR) 35(4), 399–458 (2003)

    Article  Google Scholar 

  6. Hu, G., et al.: When face recognition meets with deep learning: an evaluation of convolutional neural networks for face recognition. In: Proceedings of the IEEE International Conference on Computer Vision Workshops, pp. 142–150 (2015)

    Google Scholar 

  7. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 2008, 1–17 (2008)

    Article  Google Scholar 

  8. Rathgeb, C., Busch, C.: Multi-biometric template protection: issues and challenges. In: New Trends and Developments in Biometrics, pp. 173–190 (2012)

    Google Scholar 

  9. Nandakumar, K., Jain, A.K.: Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process. Mag. 32(5), 88–100 (2015)

    Article  Google Scholar 

  10. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)

    Article  Google Scholar 

  11. Jin, Z., Hwang, J.Y., Lai, Y.-L., Kim, S., Teoh, A.B.J.: Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Trans. Inf. Forensics Secur. 13(2), 393–407 (2017)

    Article  Google Scholar 

  12. Jafari, O., Maurya, P., Nagarkar, P., Islam, K.M., Crushev, C.: A survey on locality sensitive hashing algorithms and their applications. arXiv preprint arXiv:2102.08942 (2021)

  13. Kong, A., Cheung, K.-H., Zhang, D., Kamel, M., You, J.: An analysis of biohashing and its variants. Pattern Recogn. 39(7), 1359–1368 (2006)

    Article  MATH  Google Scholar 

  14. Seifert, C.: Data mining: an overview. In: National Security Issues, pp. 201–217 (2004)

    Google Scholar 

  15. Dong, X., Jin, Z., Teoh, A., Tistarelli, M., Wong, K.: On the security risk of cancelable biometrics. arXiv preprint arXiv:1910.07770 (2019)

  16. Wang, H., Dong, X., Jin, Z., Teoh, A.B.J., Tistarelli, M.: Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack. In: Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, pp. 70–77 (2021)

    Google Scholar 

  17. Lai, Y., Jin, Z., Wong, K., Tistarelli, M.: Efficient known-sample attack for distance-preserving hashing biometric template protection schemes. IEEE Trans. Inf. Forensics Secur. 16, 3170–3185 (2021)

    Article  Google Scholar 

  18. Dong, X., Jin, Z., Jin, A.T.B.: A genetic algorithm enabled similarity-based attack on cancellable biometrics. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–8. IEEE (2019)

    Google Scholar 

  19. Meng, Q., Zhao, S., Huang, Z., Zhou, F.: MagFace: a universal representation for face recognition and quality assessment. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 14 225–14 234 (2021)

    Google Scholar 

  20. Huang, G.B., Mattar, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database forstudying face recognition in unconstrained environments. In: Workshop on Faces in ‘Real-Life’ Images: Detection, Alignment, and Recognition (2008)

    Google Scholar 

Download references

Acknowledgement

This work was supported by the National Natural Science Foundation of China (Nos. 62376003, 62306003) and Anhui Provincial Natural Science Foundation (No. 2308085MF200).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to YenLung Lai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Goh, Z., Liang, SN., Jin, Z., Lai, Y., Lee, MJ., Wang, X. (2023). R-IoM: Enhance Biometric Security with Redundancy-Reduced Hashcode Reliability. In: Jia, W., et al. Biometric Recognition. CCBR 2023. Lecture Notes in Computer Science, vol 14463. Springer, Singapore. https://doi.org/10.1007/978-981-99-8565-4_32

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-8565-4_32

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-8564-7

  • Online ISBN: 978-981-99-8565-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics