Cancelable biometric schemes for Euclidean metric and Cosine metric

Cybersecurity - Tập 6 - Trang 1-20 - 2023
Yubing Jiang1,2, Peisong Shen1, Li Zeng1,2, Xiaojie Zhu3, Di Jiang1, Chi Chen1,2
1State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
2School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
3College of Engineering, Abu Dhabi University, Abu Dhabi, United Arab Emirates

Tóm tắt

The handy biometric data is a double-edged sword, paving the way of the prosperity of biometric authentication systems but bringing the personal privacy concern. To alleviate the concern, various biometric template protection schemes are proposed to protect the biometric template from information leakage. The preponderance of existing proposals is based on Hamming metric, which ignores the fact that predominantly deployed biometric recognition systems (e.g. face, voice, gait) generate real-valued templates, more applicable to Euclidean metric and Cosine metric. Moreover, since the emergence of similarity-based attacks, those schemes are not secure under a stolen-token setting. In this paper, we propose a succinct biometric template protection scheme to address such a challenge. The proposed scheme is designed for Euclidean metric and Cosine metric instead of Hamming distance. Mainly, the succinct biometric template protection scheme consists of distance-preserving, one-way, and obfuscation modules. To be specific, we adopt location sensitive hash function to realize the distance-preserving and one-way properties simultaneously and use the modulo operation to implement many-to-one mapping. We also thoroughly analyze the proposed scheme in three aspects: irreversibility, unlinkability and revocability. Moreover, comprehensive experiments are conducted on publicly known face databases. All the results show the effectiveness of the proposed scheme.

Tài liệu tham khảo

AT &T Laboratories Cambridge. The ORL database of faces. https://cam-orl.co.uk/facedatabase.html Baevski A, Hsu W-N, Conneau A, Auli M (2021) Unsupervised speech recognition. Adv Neural Inf Process Syst 34:27826–27839 Chao H, Wang K, He Y, Zhang J, Feng J (2022) Gaitset: cross-view gait recognition through utilizing gait as a deep set. IEEE Trans Pattern Anal Mach Intell 44(7):3467–3478 Charikar MS (2002) Similarity estimation techniques from rounding algorithms. In: Proceedings of the thiry-fourth annual ACM symposium on theory of computing, pp 380–388 Chen Y, Wo Y, Xie R, Wu C, Han G (2019) Deep secure quantization: on secure biometric hashing against similarity-based attacks. Signal Process 154:314–323 Chin CS, Jin ATB, Ling DNC (2006) High security iris verification system based on random secret integration. Comput Vis Image Underst 102(2):169–177 Chinese Academy of Sciences Institute of Automation: CASIA-FaceV5. http://biometrics.idealtest.org Cho S, Teoh ABJ (2017) Face template protection via random permutation maxout transform. In: Proceedings of the 2017 international conference on biometrics engineering and application, pp21–27 Conneau A, Baevski A, Collobert R, Mohamed A, Auli M (2020) Unsupervised cross-lingual representation learning for speech recognition. arXiv preprint arXiv:2006.13979 Dang TM, Tran L, Nguyen TD, Choi D (2020) Fehash: full entropy hash for face template protection. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops, pp 810–811 Datar M, Immorlica N, Indyk P, Mirrokni VS (2004) Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the twentieth annual symposium on computational geometry, pp 253–262 Deng J, Guo J, Xue N, Zafeiriou S (2019) Arcface: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 4690–4699 Deng J, Guo J, Ververas E, Kotsia I, Zafeiriou S (2020) Retinaface: single-shot multi-level face localisation in the wild. In: Proceedings of the IEEE/CVF conference on computer vision and pattern fingerprint recognition, pp 5203–5212 Dong X, Jin Z, Jin ATB (2019) A genetic algorithm enabled similarity-based attack on cancellable biometrics. In: 2019 IEEE 10th international conference on biometrics theory, applications and systems (BTAS). IEEE, pp 1–8 Fan C, Peng Y, Cao C, Liu X, Hou S, Chi J, Huang Y, Li Q, He Z (2020) Gaitpart: temporal part-based model for gait recognition. In: 2020 IEEE/CVF conference on computer vision and pattern recognition (CVPR), pp 14213–14221 Ghammam L, Karabina K, Lacharme P, Thiry-Atighehchi K (2020) A cryptanalysis of two cancelable biometric schemes based on index-of-max hashing. IEEE Trans Inf Forensics Secur 15:2869–2880 Gionis A, Indyk P, Motwani R et al (1999) Similarity search in high dimensions via hashing. In: VLDB, vol 99, pp 518–529 Goel N, Bebis G, Nefian A (2005) Face recognition experiments with random projection. In: Biometric technology for human identification II, vol 5779. SPIE, pp 426–437 Gomez-Barrero M, Galbally J (2020) Reversing the irreversible: a survey on inverse biometrics. Comput Secur 90:101700 Gomez-Barrero M, Rathgeb C, Galbally J, Fierrez J, Busch C (2014) Protected facial biometric templates based on local Gabor patterns and adaptive bloom filters. In: 2014 22nd international conference on pattern recognition. IEEE, pp 4483–4488 Gomez-Barrero M, Galbally J, Rathgeb C, Busch C (2017) General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans Inf Forensics Secur 13(6):1406–1420 Hahn VK, Marcel S (2021) Biometric template protection for neural-network-based face recognition systems: a survey of methods and evaluation techniques. ArXiv arXiv:2110.05044 Huang GB, Mattar M, Berg T, Learned-Miller E (2008) Labeled faces in the wild: a database forstudying face recognition in unconstrained environments. In: Workshop on faces in ’real-life’ images: detection, alignment, and recognition Institute of Computing Technology (2020) SeetaFace2. https://github.com/seetafaceengine/SeetaFace2 Jin ATB, Ling DNC, Goh A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit 37(11):2245–2255 Jin Z, Teoh ABJ, Ong TS, Tee C (2012) Fingerprint template protection with minutiae-based bit-string for security and privacy preserving. Expert Syst Appl 39(6):6157–6167 Jin Z, Hwang JY, Lai Y-L, Kim S, Teoh ABJ (2018) Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Trans Inf Forensics Secur 13(2):393–407 Kumar Pandey R, Zhou Y, Urala Kota B, Govindaraju V (2016) Deep secure encoding for face template protection. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 9–15 Lacharme P, Cherrier E, Rosenberger C (2013) Preimage attack on biohashing. In: 2013 International conference on security and cryptography (SECRYPT). IEEE, pp 1–8 Lai Y-L, Jin Z, Teoh ABJ, Goi B-M, Yap W-S, Chai T-Y, Rathgeb C (2017) Cancellable iris template generation based on indexing-first-one hashing. Pattern Recognit 64:105–117 Lai Y, Jin Z, Wong K, Tistarelli M (2021) Efficient known-sample attack for distance-preserving hashing biometric template protection schemes. IEEE Trans Inf Forensics Secur 16:3170–3185 Mai G, Cao K, Yuen PC, Jain AK (2018) On the reconstruction of face images from deep face templates. IEEE Trans Pattern Anal Mach Intell 41(5):1188–1202 Mai G, Cao K, Lan X, Yuen PC (2021) Secureface: face template protection. IEEE Trans Inf Forensics Secur 16:262–277 Martinez A, Benavente R (1998) The AR face database. Tech. Rep. 24 CVC Technical Report Pathak MA, Raj B (2012) Privacy-preserving speaker verification as password matching. In: 2012 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 1849–1852 Pillai JK, Patel VM, Chellappa R, Ratha NK (2011) Secure and robust iris recognition using random projections and sparse representations. IEEE Trans Pattern Anal Mach Intell 33(9):1877–1893 Ranjan R, Patel VM, Chellappa R (2019) Hyperface: a deep multi-task learning framework for face detection, landmark localization, pose estimation, and gender recognition. IEEE Trans Pattern Anal Mach Intell 41(01):121–135 Rathgeb C, Breitinger F, Busch C, Baier H (2014) On application of bloom filters to iris biometrics. IET Biom 3(4):207–218 Sadhya D, Raman B (2019) Generation of cancelable iris templates via randomized bit sampling. IEEE Trans Inf Forensics Secur 14(11):2972–2986 Sadhya D, Akhtar Z, Dasgupta D (2019) A locality sensitive hashing based approach for generating cancelable fingerprints templates. In: 2019 IEEE 10th international conference on biometrics theory, applications and systems (BTAS). IEEE, pp 1–9 Tams B, Mihăilescu P, Munk A (2015) Security considerations in minutiae-based fuzzy vaults. IEEE Trans Inf Forensics Secur 10(5):985–998 Wang H, Dong X, Jin Z, Teoh ABJ, Tistarelli M (2021a) Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack. In: 2021 IEEE winter conference on applications of computer vision workshops (WACVW), pp 70–77 Wang H, Wang S, Jin Z, Wang Y, Chen C, Tistarelli M (2021b) Similarity-based gray-box adversarial attack against deep face recognition. In: 2021 16th IEEE international conference on automatic face and gesture recognition (FG 2021), pp 1–8 Xu Q, Likhomanenko T, Kahn J, Hannun A, Synnaeve G, Collobert R (2020) Iterative pseudo-labeling for speech recognition. arXiv preprint arXiv:2005.09267