skip to main content
10.1145/3627631.3627638acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicvgipConference Proceedingsconference-collections
research-article

S-BAN: Secure Biometric Authentication using Noise

Published:31 January 2024Publication History

ABSTRACT

Biometric signal consisting of irrelevant or non-distinctive features can contain useful correlational properties that privacy-preserving verification schemes can exploit. While an efficient protocol for iris verification using noise has been presented [33], it is not applicable to other widely used modalities, i.e., face and fingerprint, since the methods of noise extraction and comparison are different. In this work, we design a verification protocol for secure dot product computation and also propose noise extraction mechanisms for face and fingerprint modalities. We evaluate the performance of the protocol on CFP, LFW, CelebA, FVC 2004 DB1A, DB2A, DB3A, and SOCOFing datasets. While the protocol exhibits a slight degradation in accuracy, it provides information-theoretic security with a practical computational complexity.

Skip Supplemental Material Section

Supplemental Material

References

  1. Steve Arar. 2017. Fixed-point representation: The Q format and addition examples. All About Circuits (30 November 2017). https://www.allaboutcircuits.com/technical-articles/fixed-point-representation-the-q-format-and-addition-examples/Google ScholarGoogle Scholar
  2. Mauro Barni, Giulia Droandi, and Riccardo Lazzeretti. 2015. Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing. IEEE Signal Processing Magazine 32, 5 (2015), 66–76.Google ScholarGoogle ScholarCross RefCross Ref
  3. Donald Beaver. 1991. Efficient Multiparty Protocols Using Circuit Randomization, Vol. 576. 420–432. https://doi.org/10.1007/3-540-46766-1_34Google ScholarGoogle ScholarCross RefCross Ref
  4. Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. 2012. Foundations of garbled circuits. In Proceedings of the 2012 ACM conference on Computer and communications security. 784–796.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Marina Blanton and Paolo Gasti. 2011. Secure and efficient protocols for iris and fingerprint identification. In Computer Security–ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings 16. Springer, 190–209.Google ScholarGoogle ScholarCross RefCross Ref
  6. Julien Bringer, Herve Chabanne, Melanie Favre, Alain Patey, Thomas Schneider, and Michael Zohner. 2014. GSHADE: faster privacy-preserving distance computation and biometric identification. In Proceedings of the 2nd ACM workshop on Information hiding and multimedia security. 187–198.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Julien Bringer, Hervé Chabanne, and Alain Patey. 2013. Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends. IEEE Signal Processing Magazine 30, 2 (2013), 42–52.Google ScholarGoogle ScholarCross RefCross Ref
  8. Julien Bringer, Hervé Chabanne, and Alain Patey. 2013. Shade: Secure hamming distance computation from oblivious transfer. In Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers 17. Springer, 164–176.Google ScholarGoogle ScholarCross RefCross Ref
  9. Moses S Charikar. 2002. Similarity estimation techniques from rounding algorithms. In Proceedings of the thiry-fourth annual ACM symposium on Theory of computing. 380–388.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Liang-Chieh Chen, Yukun Zhu, George Papandreou, Florian Schroff, and Hartwig Adam. 2018. Encoder-Decoder with Atrous Separable Convolution for Semantic Image Segmentation. CoRR abs/1802.02611 (2018). arXiv:1802.02611http://arxiv.org/abs/1802.02611Google ScholarGoogle Scholar
  11. Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International conference on machine learning. PMLR, 1597–1607.Google ScholarGoogle Scholar
  12. Ronald Cramer, Ivan Bjerre Damgård, 2015. Secure multiparty computation. Cambridge University Press.Google ScholarGoogle Scholar
  13. Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY-A framework for efficient mixed-protocol secure two-party computation.. In NDSS.Google ScholarGoogle Scholar
  14. Brecht Desplanques, Jenthe Thienpondt, and Kris Demuynck. 2020. Ecapa-tdnn: Emphasized channel attention, propagation and aggregation in tdnn based speaker verification. arXiv preprint arXiv:2005.07143 (2020).Google ScholarGoogle Scholar
  15. Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. 2004. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23. Springer, 523–540.Google ScholarGoogle ScholarCross RefCross Ref
  16. Cynthia Dwork, Aaron Roth, 2014. The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science 9, 3–4 (2014), 211–407.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Joshua J. Engelsma, Kai Cao, and Anil K. Jain. 2019. Learning a Fixed-Length Fingerprint Representation. arxiv:1909.09901 [cs.CV]Google ScholarGoogle Scholar
  18. David Evans, Yan Huang, Jonathan Katz, and Lior Malka. 2011. Efficient privacy-preserving biometric identification. In Proceedings of the 17th conference Network and Distributed System Security Symposium, NDSS, Vol. 68. 90–98.Google ScholarGoogle Scholar
  19. Oded Goldreich, Silvio Micali, and Avi Wigderson. 2019. How to play any mental game, or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307–328.Google ScholarGoogle Scholar
  20. Oded Goldreich, Silvio Micali, and Avi Wigderson. 2019. How to play any mental game, or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307–328.Google ScholarGoogle Scholar
  21. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2015. Deep Residual Learning for Image Recognition. CoRR abs/1512.03385 (2015). arXiv:1512.03385http://arxiv.org/abs/1512.03385Google ScholarGoogle Scholar
  22. Gary B. Huang, Manu Ramesh, Tamara Berg, and Erik Learned-Miller. 2007. Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. Technical Report 07-49. University of Massachusetts, Amherst.Google ScholarGoogle Scholar
  23. Anil K Jain, Debayan Deb, and Joshua J Engelsma. 2021. Biometrics: Trust, but verify. IEEE Transactions on Biometrics, Behavior, and Identity Science 4, 3 (2021), 303–323.Google ScholarGoogle ScholarCross RefCross Ref
  24. Anil K Jain, Patrick Flynn, and Arun A Ross. 2007. Handbook of biometrics. Springer Science & Business Media.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Anil K Jain, Salil Prabhakar, Lin Hong, and Sharath Pankanti. 1999. FingerCode: a filterbank for fingerprint representation and matching. In Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149), Vol. 2. IEEE, 187–193.Google ScholarGoogle ScholarCross RefCross Ref
  26. Anil K Jain, Salil Prabhakar, Lin Hong, and Sharath Pankanti. 2000. Filterbank-based fingerprint matching. IEEE transactions on Image Processing 9, 5 (2000), 846–859.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Ari Juels and Madhu Sudan. 2006. A fuzzy vault scheme. Designs, Codes and Cryptography 38 (2006), 237–257.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Tero Karras, Samuli Laine, and Timo Aila. 2019. A Style-Based Generator Architecture for Generative Adversarial Networks. arxiv:1812.04948 [cs.NE]Google ScholarGoogle Scholar
  29. Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014).Google ScholarGoogle Scholar
  30. Ziwei Liu, Ping Luo, Xiaogang Wang, and Xiaoou Tang. 2015. Deep Learning Face Attributes in the Wild. In Proceedings of International Conference on Computer Vision (ICCV).Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Camillo Lugaresi, Jiuqiang Tang, Hadon Nash, Chris McClanahan, Esha Uboweja, Michael Hays, Fan Zhang, Chuo-Ling Chang, Ming Guang Yong, Juhyun Lee, Wan-Teh Chang, Wei Hua, Manfred Georg, and Matthias Grundmann. 2019. MediaPipe: A Framework for Building Perception Pipelines. CoRR abs/1906.08172 (2019). arXiv:1906.08172http://arxiv.org/abs/1906.08172Google ScholarGoogle Scholar
  32. Dario Maio, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain. 2004. FVC2004: Third Fingerprint Verification Competition. In Biometric Authentication, David Zhang and Anil K. Jain (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1–7.Google ScholarGoogle Scholar
  33. Praguna Manvi, Achintya Desai, Kannan Srinathan, and Anoop Namboodiri. 2022. SIAN: Secure Iris Authentication using Noise. In 2022 IEEE International Joint Conference on Biometrics (IJCB). 1–9. https://doi.org/10.1109/IJCB54206.2022.10007999Google ScholarGoogle ScholarCross RefCross Ref
  34. Arsha Nagrani, Joon Son Chung, Weidi Xie, and Andrew Zisserman. 2019. Voxceleb: Large-scale speaker verification in the wild. Computer Science and Language (2019).Google ScholarGoogle Scholar
  35. Lawrence O’Gorman. 2003. Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91, 12 (2003), 2021–2040.Google ScholarGoogle ScholarCross RefCross Ref
  36. Margarita Osadchy, Benny Pinkas, Ayman Jarrous, and Boaz Moskovich. 2010. SCiFI - A System for Secure Face Identification. In 2010 IEEE Symposium on Security and Privacy. 239–254. https://doi.org/10.1109/SP.2010.39Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle. 2001. Enhancing security and privacy in biometrics-based authentication systems. IBM systems Journal 40, 3 (2001), 614–634.Google ScholarGoogle Scholar
  38. Christian Rathgeb and Andreas Uhl. 2011. A survey on biometric cryptosystems and cancelable biometrics. EURASIP journal on information security 2011, 1 (2011), 1–25.Google ScholarGoogle Scholar
  39. Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg. 2010. Efficient privacy-preserving face recognition. In Information, Security and Cryptology–ICISC 2009: 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 12. Springer, 229–244.Google ScholarGoogle Scholar
  40. Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. FaceNet: A unified embedding for face recognition and clustering. In 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 815–823. https://doi.org/10.1109/CVPR.2015.7298682Google ScholarGoogle ScholarCross RefCross Ref
  41. Soumyadip Sengupta, Jun-Cheng Chen, Carlos Castillo, Vishal M. Patel, Rama Chellappa, and David W. Jacobs. 2016. Frontal to profile face verification in the wild. In 2016 IEEE Winter Conference on Applications of Computer Vision (WACV). 1–9. https://doi.org/10.1109/WACV.2016.7477558Google ScholarGoogle ScholarCross RefCross Ref
  42. Yahaya Isah Shehu, Ariel Ruiz-Garcia, Vasile Palade, and Anne E. James. 2018. Sokoto Coventry Fingerprint Dataset. CoRR abs/1807.10609 (2018). arXiv:1807.10609http://arxiv.org/abs/1807.10609Google ScholarGoogle Scholar
  43. Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, and Wanlei Zhou. 2022. One Parameter Defense—Defending Against Data Inference Attacks via Differential Privacy. IEEE Transactions on Information Forensics and Security 17 (2022), 1466–1480.Google ScholarGoogle ScholarCross RefCross Ref
  44. Xun Yi, Russell Paulet, Elisa Bertino, Xun Yi, Russell Paulet, and Elisa Bertino. 2014. Homomorphic encryption. Springer.Google ScholarGoogle Scholar
  45. Felix Yu, Sanjiv Kumar, Yunchao Gong, and Shih-Fu Chang. 2014. Circulant binary embedding. In International conference on machine learning. PMLR, 946–954.Google ScholarGoogle Scholar

Index Terms

  1. S-BAN: Secure Biometric Authentication using Noise

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ICVGIP '23: Proceedings of the Fourteenth Indian Conference on Computer Vision, Graphics and Image Processing
            December 2023
            352 pages
            ISBN:9798400716256
            DOI:10.1145/3627631

            Copyright © 2023 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 31 January 2024

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            Overall Acceptance Rate95of286submissions,33%
          • Article Metrics

            • Downloads (Last 12 months)16
            • Downloads (Last 6 weeks)6

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format