A Biometric Encryption System for the Self-Exclusion Scenario of Face Recognition

This paper presents a biometric encryption system that addresses the privacy concern in the deployment of the face recognition technology in real-world systems. In particular, we focus on a self-exclusion scenario (a special application of watch-list) of face recognition and propose a novel design of a biometric encryption system deployed with a face recognition system under constrained conditions. From a system perspective, we investigate issues ranging from image preprocessing, feature extraction, to cryptography, error-correcting coding/decoding, key binding, and bit allocation. In simulation studies, the proposed biometric encryption system is tested on the CMU PIE face database. An important observation from the simulation results is that in the proposed system, the biometric encryption module tends to significantly reduce the false acceptance rate with a marginal increase in the false rejection rate.

[1]  Konstantinos N. Plataniotis,et al.  Face recognition using kernel direct discriminant analysis algorithms , 2003, IEEE Trans. Neural Networks.

[2]  R. Morelos-Zaragoza The art of error correcting coding , 2002 .

[3]  Terence Sim,et al.  The CMU Pose, Illumination, and Expression Database , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[4]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[5]  Yongjin Wang,et al.  Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.

[6]  Anton H. M. Akkermans,et al.  Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[7]  R.N.J. Veldhuis,et al.  Multi-Bits Biometric String Generation based on the Likelihood Ratio , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[8]  Josef Bigün,et al.  Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..

[9]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[10]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[11]  P. Jonathon Phillips,et al.  Face Recognition Vendor Test 2002 Performance Metrics , 2003, AVBPA.

[12]  N. Kiyavash,et al.  Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .

[13]  William H. Press,et al.  Numerical Recipes in C, 2nd Edition , 1992 .

[14]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[15]  Robert H. Morelos-Zaragoza,et al.  The Art of Error Correcting Coding: Morelos-Zaragoza/The Art of Error Correcting Coding, Second Edition , 2006 .

[16]  Gregory Shakhnarovich,et al.  Face Recognition in Subspaces , 2011, Handbook of Face Recognition.

[17]  Ann Cavoukian Biometric Encryption : A Positive-Sum Technology that Achieves Strong Authentication , Security AND Privacy , 2007 .

[18]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[19]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[20]  Pieter H. Hartel,et al.  Constructing practical Fuzzy Extractors using QIM , 2007 .

[21]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[22]  Haiping Lu,et al.  Uncorrelated Multilinear Discriminant Analysis With Regularization and Aggregation for Tensor Object Recognition , 2009, IEEE Transactions on Neural Networks.

[23]  William H. Press,et al.  Numerical recipes in C , 2002 .

[24]  Gregory W. Wornell,et al.  Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.

[25]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[26]  Haiping Lu,et al.  Multilinear Subspace Learning for Face and Gait Recognition , 2009 .

[27]  Ann Cavoukian,et al.  Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.

[28]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[29]  Haiping Lu,et al.  MPCA: Multilinear Principal Component Analysis of Tensor Objects , 2008, IEEE Transactions on Neural Networks.