[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3627631.3627638acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicvgipConference Proceedingsconference-collections
research-article

S-BAN: Secure Biometric Authentication using Noise

Published: 31 January 2024 Publication History

Abstract

Biometric signal consisting of irrelevant or non-distinctive features can contain useful correlational properties that privacy-preserving verification schemes can exploit. While an efficient protocol for iris verification using noise has been presented [33], it is not applicable to other widely used modalities, i.e., face and fingerprint, since the methods of noise extraction and comparison are different. In this work, we design a verification protocol for secure dot product computation and also propose noise extraction mechanisms for face and fingerprint modalities. We evaluate the performance of the protocol on CFP, LFW, CelebA, FVC 2004 DB1A, DB2A, DB3A, and SOCOFing datasets. While the protocol exhibits a slight degradation in accuracy, it provides information-theoretic security with a practical computational complexity.

Supplementary Material

PDF File (Supplementary_Paper_Id_24-2.pdf)
supplementary
PDF File (Supplementary_Paper_Id_24-1.pdf)
S-BAN, supplementary material.

References

[1]
Steve Arar. 2017. Fixed-point representation: The Q format and addition examples. All About Circuits (30 November 2017). https://www.allaboutcircuits.com/technical-articles/fixed-point-representation-the-q-format-and-addition-examples/
[2]
Mauro Barni, Giulia Droandi, and Riccardo Lazzeretti. 2015. Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing. IEEE Signal Processing Magazine 32, 5 (2015), 66–76.
[3]
Donald Beaver. 1991. Efficient Multiparty Protocols Using Circuit Randomization, Vol. 576. 420–432. https://doi.org/10.1007/3-540-46766-1_34
[4]
Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. 2012. Foundations of garbled circuits. In Proceedings of the 2012 ACM conference on Computer and communications security. 784–796.
[5]
Marina Blanton and Paolo Gasti. 2011. Secure and efficient protocols for iris and fingerprint identification. In Computer Security–ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings 16. Springer, 190–209.
[6]
Julien Bringer, Herve Chabanne, Melanie Favre, Alain Patey, Thomas Schneider, and Michael Zohner. 2014. GSHADE: faster privacy-preserving distance computation and biometric identification. In Proceedings of the 2nd ACM workshop on Information hiding and multimedia security. 187–198.
[7]
Julien Bringer, Hervé Chabanne, and Alain Patey. 2013. Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends. IEEE Signal Processing Magazine 30, 2 (2013), 42–52.
[8]
Julien Bringer, Hervé Chabanne, and Alain Patey. 2013. Shade: Secure hamming distance computation from oblivious transfer. In Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers 17. Springer, 164–176.
[9]
Moses S Charikar. 2002. Similarity estimation techniques from rounding algorithms. In Proceedings of the thiry-fourth annual ACM symposium on Theory of computing. 380–388.
[10]
Liang-Chieh Chen, Yukun Zhu, George Papandreou, Florian Schroff, and Hartwig Adam. 2018. Encoder-Decoder with Atrous Separable Convolution for Semantic Image Segmentation. CoRR abs/1802.02611 (2018). arXiv:1802.02611http://arxiv.org/abs/1802.02611
[11]
Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International conference on machine learning. PMLR, 1597–1607.
[12]
Ronald Cramer, Ivan Bjerre Damgård, 2015. Secure multiparty computation. Cambridge University Press.
[13]
Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY-A framework for efficient mixed-protocol secure two-party computation. In NDSS.
[14]
Brecht Desplanques, Jenthe Thienpondt, and Kris Demuynck. 2020. Ecapa-tdnn: Emphasized channel attention, propagation and aggregation in tdnn based speaker verification. arXiv preprint arXiv:2005.07143 (2020).
[15]
Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. 2004. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23. Springer, 523–540.
[16]
Cynthia Dwork, Aaron Roth, 2014. The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science 9, 3–4 (2014), 211–407.
[17]
Joshua J. Engelsma, Kai Cao, and Anil K. Jain. 2019. Learning a Fixed-Length Fingerprint Representation. arxiv:1909.09901 [cs.CV]
[18]
David Evans, Yan Huang, Jonathan Katz, and Lior Malka. 2011. Efficient privacy-preserving biometric identification. In Proceedings of the 17th conference Network and Distributed System Security Symposium, NDSS, Vol. 68. 90–98.
[19]
Oded Goldreich, Silvio Micali, and Avi Wigderson. 2019. How to play any mental game, or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307–328.
[20]
Oded Goldreich, Silvio Micali, and Avi Wigderson. 2019. How to play any mental game, or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307–328.
[21]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2015. Deep Residual Learning for Image Recognition. CoRR abs/1512.03385 (2015). arXiv:1512.03385http://arxiv.org/abs/1512.03385
[22]
Gary B. Huang, Manu Ramesh, Tamara Berg, and Erik Learned-Miller. 2007. Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. Technical Report 07-49. University of Massachusetts, Amherst.
[23]
Anil K Jain, Debayan Deb, and Joshua J Engelsma. 2021. Biometrics: Trust, but verify. IEEE Transactions on Biometrics, Behavior, and Identity Science 4, 3 (2021), 303–323.
[24]
Anil K Jain, Patrick Flynn, and Arun A Ross. 2007. Handbook of biometrics. Springer Science & Business Media.
[25]
Anil K Jain, Salil Prabhakar, Lin Hong, and Sharath Pankanti. 1999. FingerCode: a filterbank for fingerprint representation and matching. In Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149), Vol. 2. IEEE, 187–193.
[26]
Anil K Jain, Salil Prabhakar, Lin Hong, and Sharath Pankanti. 2000. Filterbank-based fingerprint matching. IEEE transactions on Image Processing 9, 5 (2000), 846–859.
[27]
Ari Juels and Madhu Sudan. 2006. A fuzzy vault scheme. Designs, Codes and Cryptography 38 (2006), 237–257.
[28]
Tero Karras, Samuli Laine, and Timo Aila. 2019. A Style-Based Generator Architecture for Generative Adversarial Networks. arxiv:1812.04948 [cs.NE]
[29]
Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014).
[30]
Ziwei Liu, Ping Luo, Xiaogang Wang, and Xiaoou Tang. 2015. Deep Learning Face Attributes in the Wild. In Proceedings of International Conference on Computer Vision (ICCV).
[31]
Camillo Lugaresi, Jiuqiang Tang, Hadon Nash, Chris McClanahan, Esha Uboweja, Michael Hays, Fan Zhang, Chuo-Ling Chang, Ming Guang Yong, Juhyun Lee, Wan-Teh Chang, Wei Hua, Manfred Georg, and Matthias Grundmann. 2019. MediaPipe: A Framework for Building Perception Pipelines. CoRR abs/1906.08172 (2019). arXiv:1906.08172http://arxiv.org/abs/1906.08172
[32]
Dario Maio, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain. 2004. FVC2004: Third Fingerprint Verification Competition. In Biometric Authentication, David Zhang and Anil K. Jain (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1–7.
[33]
Praguna Manvi, Achintya Desai, Kannan Srinathan, and Anoop Namboodiri. 2022. SIAN: Secure Iris Authentication using Noise. In 2022 IEEE International Joint Conference on Biometrics (IJCB). 1–9. https://doi.org/10.1109/IJCB54206.2022.10007999
[34]
Arsha Nagrani, Joon Son Chung, Weidi Xie, and Andrew Zisserman. 2019. Voxceleb: Large-scale speaker verification in the wild. Computer Science and Language (2019).
[35]
Lawrence O’Gorman. 2003. Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91, 12 (2003), 2021–2040.
[36]
Margarita Osadchy, Benny Pinkas, Ayman Jarrous, and Boaz Moskovich. 2010. SCiFI - A System for Secure Face Identification. In 2010 IEEE Symposium on Security and Privacy. 239–254. https://doi.org/10.1109/SP.2010.39
[37]
Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle. 2001. Enhancing security and privacy in biometrics-based authentication systems. IBM systems Journal 40, 3 (2001), 614–634.
[38]
Christian Rathgeb and Andreas Uhl. 2011. A survey on biometric cryptosystems and cancelable biometrics. EURASIP journal on information security 2011, 1 (2011), 1–25.
[39]
Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg. 2010. Efficient privacy-preserving face recognition. In Information, Security and Cryptology–ICISC 2009: 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 12. Springer, 229–244.
[40]
Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. FaceNet: A unified embedding for face recognition and clustering. In 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 815–823. https://doi.org/10.1109/CVPR.2015.7298682
[41]
Soumyadip Sengupta, Jun-Cheng Chen, Carlos Castillo, Vishal M. Patel, Rama Chellappa, and David W. Jacobs. 2016. Frontal to profile face verification in the wild. In 2016 IEEE Winter Conference on Applications of Computer Vision (WACV). 1–9. https://doi.org/10.1109/WACV.2016.7477558
[42]
Yahaya Isah Shehu, Ariel Ruiz-Garcia, Vasile Palade, and Anne E. James. 2018. Sokoto Coventry Fingerprint Dataset. CoRR abs/1807.10609 (2018). arXiv:1807.10609http://arxiv.org/abs/1807.10609
[43]
Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, and Wanlei Zhou. 2022. One Parameter Defense—Defending Against Data Inference Attacks via Differential Privacy. IEEE Transactions on Information Forensics and Security 17 (2022), 1466–1480.
[44]
Xun Yi, Russell Paulet, Elisa Bertino, Xun Yi, Russell Paulet, and Elisa Bertino. 2014. Homomorphic encryption. Springer.
[45]
Felix Yu, Sanjiv Kumar, Yunchao Gong, and Shih-Fu Chang. 2014. Circulant binary embedding. In International conference on machine learning. PMLR, 946–954.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICVGIP '23: Proceedings of the Fourteenth Indian Conference on Computer Vision, Graphics and Image Processing
December 2023
352 pages
ISBN:9798400716256
DOI:10.1145/3627631
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 January 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication using noise
  2. biometrics
  3. privacy-preserving verification
  4. template protection
  5. vision

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICVGIP '23

Acceptance Rates

Overall Acceptance Rate 95 of 286 submissions, 33%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 66
    Total Downloads
  • Downloads (Last 12 months)66
  • Downloads (Last 6 weeks)3
Reflects downloads up to 24 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media