Privacy preserved duplicate check using multi-biometric fusion

Automated recognition of individuals can be performed using biometrics without any requirement of explicit knowledge of a PIN or a password. On the one side biometrics has given convenience to citizens as they do not need to memorize a bunch of passwords, but on the other side intra (inter) class variations within (between) biometric features makes biometric authentications untrustworthy. Therefore, decisions based on biometric authentications are made more reliable by using several biometric authentications performed on single or multiple biomet-ric modalities (i.e. multi-biometric fusion). This paper describes a method to identify if a person tries to re-enrol him/herself in a database, when he/she is already enrolled. This is referred to as duplicate check. In this work, duplicate check is performed using two modalities: face and iris. The templates used during the duplicate check are compliant to the ISO/IEC 24745 - Biometric information protection. Such templates are known as protected biometric templates. The protected biometric templates used in this work are generated using the recently published irreversible transformation based on Bloom filters. Scores are calculated from face and iris Bloom filters based templates by comparison with their respective enrolment templates using the normalized Hamming distance. As a decision of the duplicate check, these scores from both modalities are fused with appropriate weighting factors in order to get improved performance compared to using single individual modalities. The presented scheme is experimentally validated using two public benchmark databases namely the LFW and the CASIA-Iris-Thousand databases for face and iris respectively.

[1]  Naser Damer,et al.  Helper data scheme for 2D cancelable face recognition using bloom filters , 2014, IWSSIP 2014 Proceedings.

[2]  Rama Chellappa,et al.  Secure and Robust Iris Recognition Using Random Projections and Sparse Representations , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[3]  Tieniu Tan,et al.  Synthesis of large realistic iris databases using patch-based sampling , 2008, 2008 19th International Conference on Pattern Recognition.

[4]  Andy Adler,et al.  Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.

[5]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[6]  Konstantinos N. Plataniotis,et al.  An Analysis of Random Projection for Changeable and Privacy-Preserving Biometric Verification , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[7]  Bernadette Rainey 2. European Convention on Human Rights , 2013 .

[8]  Herbert Burkert,et al.  Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .

[9]  Andrew Teoh Beng Jin,et al.  High security Iris verification system based on random secret integration , 2006 .

[10]  Sudeep Sarkar,et al.  Privacy & Security Issues Related to Match Scores , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[11]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[12]  Norimichi Tsumura,et al.  BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes , 2010, IEICE Trans. Inf. Syst..

[13]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[14]  Tieniu Tan,et al.  Ordinal Measures for Iris Recognition , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[15]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[16]  Slobodan Ribaric,et al.  Local Binary LDA for Face Recognition , 2011, BIOID.

[17]  Pong C. Yuen,et al.  Selection of Distinguish Points for Class Distribution Preserving Transform for Biometric Template Protection , 2007, ICB.

[18]  Chris J. Hill,et al.  Risk of Masquerade Arising from the Storage of Biometrics , 2001 .

[19]  Christoph Busch,et al.  Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters , 2014, Comput. Secur..

[20]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[21]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[22]  Marina L. Gavrilova,et al.  Multimodal biometric approach for cancelable face template generation , 2012, Defense + Commercial Sensing.

[23]  Marwan Mattar,et al.  Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .

[24]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[25]  Chulhan Lee,et al.  Changeable Biometrics for Appearance Based Face Recognition , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[26]  Ramachandra Raghavendra,et al.  Towards e-Passport Duplicate Enrollment Check in the European Union , 2013, 2013 European Intelligence and Security Informatics Conference.

[27]  Andrew Beng Jin Teoh,et al.  Biometric hash: high-confidence face recognition , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[28]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[29]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[30]  Christoph Busch,et al.  Multi-Biometric Template Protection: Issues and Challenges , 2012 .

[31]  Lars Nolle,et al.  Towards a Best Linear Combination for Multimodal Biometric Fusion , 2010, 2010 20th International Conference on Pattern Recognition.

[32]  Andreas Uhl,et al.  Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems , 2010, ICIAR.

[33]  Christoph Busch,et al.  On application of bloom filters to iris biometrics , 2014, IET Biom..

[34]  Andrew Beng Jin Teoh,et al.  Iris Authentication Using Privatized Advanced Correlation Filter , 2006, ICB.

[35]  Andrew Beng Jin Teoh,et al.  Extraction and fusion of partial face features for cancelable identity verification , 2012, Pattern Recognit..

[36]  Pong C. Yuen,et al.  Class-Distribution Preserving Transform for Face Biometric Data Security , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[37]  C. Busch,et al.  Multi-algorithm fusion with template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[38]  Andreas Uhl,et al.  Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.

[39]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[40]  Christoph Busch,et al.  Alignment-free cancelable iris biometric templates based on adaptive bloom filters , 2013, 2013 International Conference on Biometrics (ICB).

[41]  Nalini K. Ratha,et al.  Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.