ABSTRACT
Biometric signal consisting of irrelevant or non-distinctive features can contain useful correlational properties that privacy-preserving verification schemes can exploit. While an efficient protocol for iris verification using noise has been presented [33], it is not applicable to other widely used modalities, i.e., face and fingerprint, since the methods of noise extraction and comparison are different. In this work, we design a verification protocol for secure dot product computation and also propose noise extraction mechanisms for face and fingerprint modalities. We evaluate the performance of the protocol on CFP, LFW, CelebA, FVC 2004 DB1A, DB2A, DB3A, and SOCOFing datasets. While the protocol exhibits a slight degradation in accuracy, it provides information-theoretic security with a practical computational complexity.
Supplemental Material
Available for Download
supplementary
S-BAN, supplementary material.
- Steve Arar. 2017. Fixed-point representation: The Q format and addition examples. All About Circuits (30 November 2017). https://www.allaboutcircuits.com/technical-articles/fixed-point-representation-the-q-format-and-addition-examples/Google Scholar
- Mauro Barni, Giulia Droandi, and Riccardo Lazzeretti. 2015. Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing. IEEE Signal Processing Magazine 32, 5 (2015), 66–76.Google ScholarCross Ref
- Donald Beaver. 1991. Efficient Multiparty Protocols Using Circuit Randomization, Vol. 576. 420–432. https://doi.org/10.1007/3-540-46766-1_34Google ScholarCross Ref
- Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. 2012. Foundations of garbled circuits. In Proceedings of the 2012 ACM conference on Computer and communications security. 784–796.Google ScholarDigital Library
- Marina Blanton and Paolo Gasti. 2011. Secure and efficient protocols for iris and fingerprint identification. In Computer Security–ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings 16. Springer, 190–209.Google ScholarCross Ref
- Julien Bringer, Herve Chabanne, Melanie Favre, Alain Patey, Thomas Schneider, and Michael Zohner. 2014. GSHADE: faster privacy-preserving distance computation and biometric identification. In Proceedings of the 2nd ACM workshop on Information hiding and multimedia security. 187–198.Google ScholarDigital Library
- Julien Bringer, Hervé Chabanne, and Alain Patey. 2013. Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends. IEEE Signal Processing Magazine 30, 2 (2013), 42–52.Google ScholarCross Ref
- Julien Bringer, Hervé Chabanne, and Alain Patey. 2013. Shade: Secure hamming distance computation from oblivious transfer. In Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers 17. Springer, 164–176.Google ScholarCross Ref
- Moses S Charikar. 2002. Similarity estimation techniques from rounding algorithms. In Proceedings of the thiry-fourth annual ACM symposium on Theory of computing. 380–388.Google ScholarDigital Library
- Liang-Chieh Chen, Yukun Zhu, George Papandreou, Florian Schroff, and Hartwig Adam. 2018. Encoder-Decoder with Atrous Separable Convolution for Semantic Image Segmentation. CoRR abs/1802.02611 (2018). arXiv:1802.02611http://arxiv.org/abs/1802.02611Google Scholar
- Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International conference on machine learning. PMLR, 1597–1607.Google Scholar
- Ronald Cramer, Ivan Bjerre Damgård, 2015. Secure multiparty computation. Cambridge University Press.Google Scholar
- Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY-A framework for efficient mixed-protocol secure two-party computation.. In NDSS.Google Scholar
- Brecht Desplanques, Jenthe Thienpondt, and Kris Demuynck. 2020. Ecapa-tdnn: Emphasized channel attention, propagation and aggregation in tdnn based speaker verification. arXiv preprint arXiv:2005.07143 (2020).Google Scholar
- Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. 2004. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23. Springer, 523–540.Google ScholarCross Ref
- Cynthia Dwork, Aaron Roth, 2014. The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science 9, 3–4 (2014), 211–407.Google ScholarDigital Library
- Joshua J. Engelsma, Kai Cao, and Anil K. Jain. 2019. Learning a Fixed-Length Fingerprint Representation. arxiv:1909.09901 [cs.CV]Google Scholar
- David Evans, Yan Huang, Jonathan Katz, and Lior Malka. 2011. Efficient privacy-preserving biometric identification. In Proceedings of the 17th conference Network and Distributed System Security Symposium, NDSS, Vol. 68. 90–98.Google Scholar
- Oded Goldreich, Silvio Micali, and Avi Wigderson. 2019. How to play any mental game, or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307–328.Google Scholar
- Oded Goldreich, Silvio Micali, and Avi Wigderson. 2019. How to play any mental game, or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307–328.Google Scholar
- Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2015. Deep Residual Learning for Image Recognition. CoRR abs/1512.03385 (2015). arXiv:1512.03385http://arxiv.org/abs/1512.03385Google Scholar
- Gary B. Huang, Manu Ramesh, Tamara Berg, and Erik Learned-Miller. 2007. Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. Technical Report 07-49. University of Massachusetts, Amherst.Google Scholar
- Anil K Jain, Debayan Deb, and Joshua J Engelsma. 2021. Biometrics: Trust, but verify. IEEE Transactions on Biometrics, Behavior, and Identity Science 4, 3 (2021), 303–323.Google ScholarCross Ref
- Anil K Jain, Patrick Flynn, and Arun A Ross. 2007. Handbook of biometrics. Springer Science & Business Media.Google ScholarDigital Library
- Anil K Jain, Salil Prabhakar, Lin Hong, and Sharath Pankanti. 1999. FingerCode: a filterbank for fingerprint representation and matching. In Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149), Vol. 2. IEEE, 187–193.Google ScholarCross Ref
- Anil K Jain, Salil Prabhakar, Lin Hong, and Sharath Pankanti. 2000. Filterbank-based fingerprint matching. IEEE transactions on Image Processing 9, 5 (2000), 846–859.Google ScholarDigital Library
- Ari Juels and Madhu Sudan. 2006. A fuzzy vault scheme. Designs, Codes and Cryptography 38 (2006), 237–257.Google ScholarDigital Library
- Tero Karras, Samuli Laine, and Timo Aila. 2019. A Style-Based Generator Architecture for Generative Adversarial Networks. arxiv:1812.04948 [cs.NE]Google Scholar
- Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014).Google Scholar
- Ziwei Liu, Ping Luo, Xiaogang Wang, and Xiaoou Tang. 2015. Deep Learning Face Attributes in the Wild. In Proceedings of International Conference on Computer Vision (ICCV).Google ScholarDigital Library
- Camillo Lugaresi, Jiuqiang Tang, Hadon Nash, Chris McClanahan, Esha Uboweja, Michael Hays, Fan Zhang, Chuo-Ling Chang, Ming Guang Yong, Juhyun Lee, Wan-Teh Chang, Wei Hua, Manfred Georg, and Matthias Grundmann. 2019. MediaPipe: A Framework for Building Perception Pipelines. CoRR abs/1906.08172 (2019). arXiv:1906.08172http://arxiv.org/abs/1906.08172Google Scholar
- Dario Maio, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain. 2004. FVC2004: Third Fingerprint Verification Competition. In Biometric Authentication, David Zhang and Anil K. Jain (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1–7.Google Scholar
- Praguna Manvi, Achintya Desai, Kannan Srinathan, and Anoop Namboodiri. 2022. SIAN: Secure Iris Authentication using Noise. In 2022 IEEE International Joint Conference on Biometrics (IJCB). 1–9. https://doi.org/10.1109/IJCB54206.2022.10007999Google ScholarCross Ref
- Arsha Nagrani, Joon Son Chung, Weidi Xie, and Andrew Zisserman. 2019. Voxceleb: Large-scale speaker verification in the wild. Computer Science and Language (2019).Google Scholar
- Lawrence O’Gorman. 2003. Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91, 12 (2003), 2021–2040.Google ScholarCross Ref
- Margarita Osadchy, Benny Pinkas, Ayman Jarrous, and Boaz Moskovich. 2010. SCiFI - A System for Secure Face Identification. In 2010 IEEE Symposium on Security and Privacy. 239–254. https://doi.org/10.1109/SP.2010.39Google ScholarDigital Library
- Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle. 2001. Enhancing security and privacy in biometrics-based authentication systems. IBM systems Journal 40, 3 (2001), 614–634.Google Scholar
- Christian Rathgeb and Andreas Uhl. 2011. A survey on biometric cryptosystems and cancelable biometrics. EURASIP journal on information security 2011, 1 (2011), 1–25.Google Scholar
- Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg. 2010. Efficient privacy-preserving face recognition. In Information, Security and Cryptology–ICISC 2009: 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 12. Springer, 229–244.Google Scholar
- Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. FaceNet: A unified embedding for face recognition and clustering. In 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 815–823. https://doi.org/10.1109/CVPR.2015.7298682Google ScholarCross Ref
- Soumyadip Sengupta, Jun-Cheng Chen, Carlos Castillo, Vishal M. Patel, Rama Chellappa, and David W. Jacobs. 2016. Frontal to profile face verification in the wild. In 2016 IEEE Winter Conference on Applications of Computer Vision (WACV). 1–9. https://doi.org/10.1109/WACV.2016.7477558Google ScholarCross Ref
- Yahaya Isah Shehu, Ariel Ruiz-Garcia, Vasile Palade, and Anne E. James. 2018. Sokoto Coventry Fingerprint Dataset. CoRR abs/1807.10609 (2018). arXiv:1807.10609http://arxiv.org/abs/1807.10609Google Scholar
- Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, and Wanlei Zhou. 2022. One Parameter Defense—Defending Against Data Inference Attacks via Differential Privacy. IEEE Transactions on Information Forensics and Security 17 (2022), 1466–1480.Google ScholarCross Ref
- Xun Yi, Russell Paulet, Elisa Bertino, Xun Yi, Russell Paulet, and Elisa Bertino. 2014. Homomorphic encryption. Springer.Google Scholar
- Felix Yu, Sanjiv Kumar, Yunchao Gong, and Shih-Fu Chang. 2014. Circulant binary embedding. In International conference on machine learning. PMLR, 946–954.Google Scholar
Index Terms
- S-BAN: Secure Biometric Authentication using Noise
Recommendations
Securing Biometric Template using a Hybrid Scheme
ICIA-16: Proceedings of the International Conference on Informatics and AnalyticsBiometric authentication has pulled in significant attention in the course of recent years. Due to the recognition accuracy of biometric verification system, it has been used in various fields. As biometrics used in more and more applications, it is ...
Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication
SACMAT '17 Abstracts: Proceedings of the 22nd ACM on Symposium on Access Control Models and TechnologiesBiometrics are widely used for authentication in several domains, services and applications. However, only very few systems succeed in effectively combining highly secure user authentication with an adequate privacy protection of the biometric templates,...
Unlinkable and irreversible biometric template protection based on bloom filters
New framework for the analysis of the unlinkability of protected templates.New unlinkable and irreversible biometric template protection scheme.Biometric Template Protection scheme robust to cross-matching attacks.Thorough eval of compliance with ISO/...
Comments