skip to main content
10.1145/3637732.3637777acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbbeConference Proceedingsconference-collections
research-article

Advanced Research on High-security-level Error-correction-based Iris Recognition System

Published:28 February 2024Publication History

ABSTRACT

Over recent years, biometric systems have been popularly applied in various scenarios. Unfortunately, potential threats associated with these systems may lead to significant social concerns and pose risks to security. In this paper, an error-correction-based iris recognition (EC-IR) scheme which uses multi-scale dominating feature points (msDFPs) is produced to improve the security level against a stricter concern of error-correction-based attack. The EC-based attack can be initiated if an attacker is thoroughly knowledgeable about the structure of the adopted error correcting code. Hence, the system can be compromised with much fewer attempts compared to the brute force attack. To improve the number of security bits under this attack, the extraction method of the msDFPs is proposed to modify the essence of original iris data. As a result, it has been demonstrated that the proposed msDFPs-based EC-IR scheme provides a well-balanced design that ensures both a large value of security bits and an optimized recognition performance.

References

  1. [1] R. P. Wildes, “Iris recognition: An emerging biometric technology," Proceedings of the IEEE, vol. 85, no. 9, pp. 1348-1363, Sep. 1997.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] J. Daugman, “Statistical richness of visual phase information: update on recognizing persons by iris patterns," Int’l J. of Computer Vision, vol.45, no. 1,pp.25-38, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] J. Daugman, “How iris recognition works," IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, Jan. 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] K. W. Bowyer, K. Hollingsworth, and P. J. Flynn, “Image understanding for iris biometrics: A survey," Computer Vision and Image Understanding, vol. 110, no. 2, pp. 281-307, May 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Z. Sun and T. Tan, “Ordinal measures for iris recognition," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 12, pp. 2211-2226, Dec. 2009.Google ScholarGoogle Scholar
  6. [6] A. Kumar and A. Passi, “Comparison and combination of iris matchers for reliable personal authentication," Pattern recognition, vol. 43, no. 3, pp. 1016-1026, Mar. 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] A. Ross, J. Shah, and A. K. Jain, “From template to image: Reconstructing fingerprints from minutiae points," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 544–560, Apr. 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] A. Ceccarelli, L. Montecchi, F. Brancati, P. Lollini, A. Marguglio, and A. Bondavalli, “Continuous and transparent user identity verification for secure internet services," IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 3, pp. 270-283, May 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] J. Srinivas, A. K. Das, N. Kumar and J. J. P. C. Rodrigues, “Cloud Centric Authentication for Wearable Healthcare Monitoring System," IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 5, pp. 942-956, 1 Sept.-Oct. 2020.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] R. Dwivedi, S. Dey, “Securing fingerprint template using noninvertible ridge feature transformation," Journal of Electronic Imaging, 27(5) 053031, Oct. 2018.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Y.-L. Lai et al., “Cancellable iris template generation based on indexing-first-one hashing," Pattern recognition, vol. 64, pp. 105–117, Apr. 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] O. Ouda, N. Tsumura, and T. Nakaguchi, “Tokenless cancelable biometrics scheme for protecting iris codes," in 2010 20th International Conference on Pattern Recognition, Aug. 2010, pp. 882–885.Google ScholarGoogle Scholar
  13. [13] C. Rathgeb, F. Breitinger, and C. Busch, “Alignment-free cancelable iris biometric templates based on adaptive bloom filters,” 2013 International Conference on Biometrics (ICB), Jun. 2013, pp. 1–8.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] J. Zuo, N. K. Ratha, and J. H. Connell, “Cancelable iris biometric," 2008 19th International Conference on Pattern Recognition, Dec. 2008, pp. 1–4.Google ScholarGoogle Scholar
  15. [15] D. Sadhya and B. Raman, “Generation of Cancelable iris templates via randomized bit sampling," IEEE Transactions on Information Forensics and Security, vol. 14, no. 11, pp. 2972-2986, Nov. 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] P. Punithavathi, S. Geetha, and S. Sasikala, “Generation of cancelable iris template using bi-level transformation," Proceedings of the 6th International Conference on Bioinformatics and Biomedical Science, Jun. 2017, pp. 94–100.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] C. Rathgeb and C. Busch, “Cancelable multi-biometrics: mixing iris codes based on adaptive bloom filters," Computers & Security, vol. 42, pp. 1–12, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] M. Gomez-Barrero, C. Rathgeb, G. Li, R. Ramachandra, J. Galbally, and C. Busch, ‘Multi-biometric template protection based on bloom filters," Information Fusion, vol. 42, pp. 37–50, Jul. 2018.Google ScholarGoogle Scholar
  19. [19] C. Rathgeb and A. Uhl, “A survey on biometric cryptosystems and cancelable biometrics," EURASIP Journal on Information Security, vol. 2011, no. 1, p. 3, Sep. 2011. [Online]. Available: https://link.springer.com/article/10.1186/1687-417X-2011-3Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] C. Li, J. Hu, J. Pieprzyk and W. Susilo, “A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion," IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp. 1193-1206, June 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] G. E. Hine, E. Maiorana and P. Campisi, “A zero-leakage fuzzy embedder from the theoretical formulation to real data," IEEE Transactions on Information Forensics and Security, vol. 12, no. 7, pp. 1724-1734, July 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Y.-L. Lai, J. Y. Hwang, Z. Jin, S. Kim, S. Cho and A. B. J. Teoh, “Secure secret sharing enabled b-band mini vaults bio-cryptosystem for vectorial biometrics," IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 1, pp. 58-71, 1 Jan.-Feb. 2021.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] U. Uludag, S. Pankanti, S. Prabhakar and A. K. Jain, “Biometric cryptosystems: issues and challenges," Proceedings of the IEEE, vol. 92, no. 6, pp. 948-960, June 2004.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] F. Hao, R. Anderson, and J. Daugman, “Combining crypto with biometrics effectively," IEEE Transactions on Computers, vol. 55, no. 9, pp.1081–1088, Sep. 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] A. Vetro, S. Draper, S. Rane, J. S. Yedidia, “Securing biometric data," Distributed source coding, P. L. Dragotti and M. Gastpar, Eds. New York: Academic, 2009, ch. 11.Google ScholarGoogle Scholar
  26. [26] A. Juels, M. Wattenberg, “A fuzzy commitment scheme," in Proceedings of the 6th ACM conference on Computer and communications security, Singapore, 1999, pp. 28–36.Google ScholarGoogle Scholar
  27. [27] A. Juels and M. Sudan, “A fuzzy vault scheme," Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237–257, Feb. 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] W. Ponce-Hernandez, R. Blanco-Gonzalo, J. Liu-Jimenez and R. Sanchez-Reillo, “Fuzzy vault scheme based on fixed-length templates applied to dynamic signature verification," IEEE Access, vol. 8, pp. 11152-11164, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] S. Noto, P. L. Correia and L. D. Soares, “Analysis of error correcting codes for the secure storage of biometric templates," 2011 IEEE EUROCON - International Conference on Computer as a Tool, Lisbon, Portugal, 2011, pp. 1-4.Google ScholarGoogle Scholar
  30. [30] M. B. Ramalho, P. L. Correia, L. D. Soares, “Hand-based multimodal identification system with secure biometric template storage," IET Computer Vision, vol. 6, no. 3, pp. 165-173, May 2012.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] A. Stoianov, “Security of Error Correcting Code for biometric Encryption," 2010 Eighth International Conference on Privacy, Security and Trust, Ottawa, ON, Canada, Aug. 2010, pp.231-235.Google ScholarGoogle Scholar
  32. [32] T. M. Santos, L. D. Soares, and P. L. Correia, “Iris verification system with secure template storage," 010 18th European Signal Processing Conference, Aalborg, Denmark, 2010, pp. 279-283.Google ScholarGoogle Scholar
  33. [33] K.-C. Lin and Y.-M. Chen, “A high-security-level iris cryptosystem based on fuzzy commitment and soft reliability extraction," IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2023.3289916. (in early access)Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez, and J. Ortega-Garcia, “From the iriscode to the iris: A new vulnerability of iris recognition systems," Black Hat Briefings USA, Jan., 2012Google ScholarGoogle Scholar
  35. [35] J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez, and J. Ortega-Garcia, “Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms," Computer Vision and Image Understanding, 117(10):1512–1525, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] S. Ahmad and B. Fuller, “Resist: Reconstruction of irises from templates," 2020 IEEE International Joint Conference on Biometrics (IJCB), Houston, TX, USA, pp. 1-10, 2020.Google ScholarGoogle Scholar
  37. [37] S. Venugopalan and M. Savvides, “How to generate spoofed irises from an iris code template," IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 385-395, June 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] A. Kumar and A. Passi, “Comparison and combination of iris matchers for reliable personal authentication," Pattern Recognit., vol. 43, no. 3, pp. 1016-1026, 2010. [Online] Available: http ://www4.comp.polyu.edu.hk/c̃sajaykr/IITD/Database_Iris.htmlGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] V. Rincon-Melchor, M. Nakano-Miyatake, O. Juarez-Sandoval, J. Olivares-Mercado, J. Moreno-Saenz and G. Benitez-Garcia, “Deep Learning Algorithm for the People Identification Using their ECG Signals as a Biometric Parameter," 2023 46th International Conference on Telecommunications and Signal Processing (TSP), Prague, Czech Republic, 2023, pp. 154-159.Google ScholarGoogle Scholar
  40. [40] D. G. Lowe, “Object recognition from local scaleinvariant features," Proceedings of the Seventh IEEE International Conference on Computer Vision, Kerkyra, Greece, 1999, pp. 1150-1157.Google ScholarGoogle Scholar
  41. [41] G. Evgin “Intensity normalization in brain MR images using spatially varying distribution matching," In: 11th International conference on computer graphics, visualization, computer vision and image processing (CGVCVIP), 2017, pp. 300–304.Google ScholarGoogle Scholar
  42. [42] E. Goceri, "Fully automated and adaptive intensity normalization using statistical features for brain MR images", Celal Bayar Üniversitesi Fen Bilimleri Dergisi., vol. 14, no. 1, 2018, pp. 125-134.Google ScholarGoogle ScholarCross RefCross Ref
  43. [43] Chinese Academy of Science Institute of Automation, CASIA-IrisV4-Distance. Accessed: Oct. 14, 2022. [Online] Available: http://biometrics.idealtest.org/dbDetailForUser.do?id=4Google ScholarGoogle Scholar
  44. [44] Chinese Academy of Science Institute of Automation, CASIA-IrisV4-Thousand. Accessed: Oct. 14, 2022. [Online] Available: http://biometrics.idealtest.org/dbDetailForUser.do?id=4Google ScholarGoogle Scholar

Index Terms

  1. Advanced Research on High-security-level Error-correction-based Iris Recognition System

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Article Metrics

            • Downloads (Last 12 months)10
            • Downloads (Last 6 weeks)3

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format