Privacy-preserving model for biometric-based authentication and Key Derivation Function

Journal of Information Security and Applications - Tập 78 - Trang 103624 - 2023
Olson Italis1, Samuel Pierre1, Alejandro Quintero1
1Department of Computer and Software Engineering, Polytechnique Montreal, 2500 Chem. de Polytechnique, Montreal, H3T 1J4, QC, Canada

Tài liệu tham khảo

Saxena S, Vyas S, Kumar BS, Gupta S. Survey on Online Electronic Payments Security. In: 2019 Amity international conference on artificial intelligence (AICAI). Dubai, United Arab Emirates; 2019, p. 756–1. http://dx.doi.org/10.1109/AICAI.2019.8701353. Ogbanufe, 2018, Comparing fingerprint-based biometrics authentication versus traditional authentication methods for E-payment, Decis Support Syst, 106, 1, 10.1016/j.dss.2017.11.003 Dai F, Shi Y, Meng N, Wei L, Ye Z. From Bitcoin to Cybersecurity: A Comparative Study of Blockchain Application and Security Issues. In: 2017 4th international conference on systems and informatics (ICSAI). 2017, p. 975–9. Dodis, 2008, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, SIAM J Comput, 38, 97, 10.1137/060651380 Becker, 2019, Robust fuzzy extractors and helper data manipulation attacks revisited: Theory vs practice, IEEE Trans Dependable Secure Comput, 16, 783, 10.1109/TDSC.2017.2762675 2017 Simoens K, Tuyls P, Preneel B. Privacy Weaknesses in Biometric Sketches. In: 2009 30th IEEE symposium on security and privacy. Oakland, CA, USA; 2009, p. 188–203. Osadchy, 2019, It is all in the system’s parameters: Privacy and security issues in transforming biometric raw data into binary strings, IEEE Trans Dependable Secure Comput, 16, 796, 10.1109/TDSC.2018.2804949 Seo, 2018, Construction of a new biometric-based key derivation function and its application, Secur Commun Netw, 2018, 1 Smart, 2016, Hash functions, message authentication codes, and key derivation functions, 271 2018 2008 Jenks, 1977 Kang H, Hori Y, Katashita T, Hagiwara M. The Implementation of Fuzzy Extractor is not Hard to Do: An Approach Using PUF Data. In: Proceedings of the 30th symposium on cryptography and information security. Kyoto, Japan; 2013, p. 22–5. Guruswami, 2012, 19 Huffman, 2010, BCH and Reed–Solomon codes, 168 Doddis, 2012, Robust fuzzy extractors and authenticated key agreement from close secrets, IEEE Trans Inform Theory, 58, 6207, 10.1109/TIT.2012.2200290 Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A. Secure Remote Authentication Using Biometric Data. In: Annual international conference on the theory and applications of cryptographic techniques. Berlin, Germany; 2005, p. 147–63. Herder, 2017, Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions, IEEE Trans Dependable Secure Comput, 14, 65, 10.1109/TDSC.2016.2536609 Yasunaga, 2018, On the limitations of computational fuzzy extractors, Work, 3, 7 Anees, 2018, Discriminative binary feature learning and quantization in biometric key generation, Pattern Recognit, 77, 289, 10.1016/j.patcog.2017.11.018 Sheng, 2015, A biometric key generation method based on semisupervised data clustering, IEEE Trans Syst Man Cybern: Syst, 45, 1205, 10.1109/TSMC.2015.2389768 Feng, 2010, A hybrid approach for generating secure and discriminating face template, IEEE Trans Inf Forensics Secur, 5, 103, 10.1109/TIFS.2009.2038760 Teoh, 2006, Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs, IEEE Trans Pattern Anal Mach Intell, 28, 1892, 10.1109/TPAMI.2006.250 Erkin, 2009, Privacy-preserving face recognition, 235 Sadeghi, 2009, Efficient privacy-preserving face recognition, 229 Sivanandam, 2007, 95 Starczewski, 2013, Uncertainty in fuzzy sets, 1 Zadeh, 1965, Fuzzy sets, Inf Control, 8, 338, 10.1016/S0019-9958(65)90241-X Sayood, 2006, Scalar quantization, 227 Keykhaie, 2020, Mobile match on card active authentication using touchscreen biometric, IEEE Trans Consum Electron, 66, 376, 10.1109/TCE.2020.3029955 Lloyd, 1982, Least squares quantization in PCM, IEEE Trans Inform Theory, 28, 129, 10.1109/TIT.1982.1056489 Arthur D, Vassilvitskii S. K-means++: The Advantages of Careful Seeding. In: SODA ‘07: Proceedings of the eighteenth annual ACM-SIAM symposium on discrete algorithms. 2007, p. 1027–35. Lee, 2005, Acquiring linear subspaces for face recognition under variable lighting, IEEE Trans Pattern Anal Mach Intell, 27, 684, 10.1109/TPAMI.2005.92 Wolf L, Hassner T, Maoz I. Face recognition in unconstrained videos with matched background similarity, CVPR 2011. Colorado Springs, CO, USA; 2011, p. 529–34. http://dx.doi.org/10.1109/CVPR.2011.5995566. Schroff F, Kalenichenko D, Philbin JK. Facenet: A unified embedding for face recognition and clustering. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2015, p. 815–23. Keykhaie, 2023, Lightweight and secure face-based active authentication for mobile users, IEEE Trans Mob Comput, 22, 1551 Zhang, 2016, Joint face detection and alignment using multitask cascaded convolutional networks, IEEE Signal Process Lett, 23, 1499, 10.1109/LSP.2016.2603342 The MathWorks, Inc., 2023 Kalami SM. Implementation of Linear Discriminant Analysis in MATLAB, Yarpiz, available at https://yarpiz.com/. Krawczyk, 2010 Tsobdjou, 2021, A new mutual authentication and key agreement protocol for mobile client—Server environment, IEEE Trans Netw Serv Manag, 18, 1275, 10.1109/TNSM.2021.3071087 Abavisani, 2018, Deep multimodal subspace clustering networks, IEEE J Sel Top Sign Proces, 12, 1601, 10.1109/JSTSP.2018.2875385 Chakraborty, 2020, Facial biometric system for recognition using extended LGHP algorithm on raspberry pi, IEEE Sens J, 20, 8117, 10.1109/JSEN.2020.2979907 Lim, 2020