Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition with Privacy Protection

Computationally efficient, accurate, and privacy-preserving data storage and retrieval are among the key challenges faced by practical deployments of biometric identification systems worldwide. In this work, a method of protected indexing of biometric data is presented. By utilising feature-level fusion of intelligently paired templates, a multi-stage search structure is created. During retrieval, the list of potential candidate identities is successively pre-filtered, thereby reducing the number of template comparisons necessary for a biometric identification transaction. Protection of the biometric probe templates, as well as the stored reference templates and the created index is carried out using homomorphic encryption. The proposed method is extensively evaluated in closed-set and open-set identification scenarios on publicly available databases using two state-of-the-art open-source face recognition systems. With respect to a typical baseline algorithm utilising an exhaustive search-based retrieval algorithm, the proposed method enables a reduction of the computational workload associated with a biometric identification transaction by 90%, while simultaneously suffering no degradation of the biometric performance. Furthermore, by facilitating a seamless integration of template protection with open-source homomorphic encryption libraries, the proposed method guarantees unlinkability, irreversibility, and renewability of the protected biometric data.

[1]  Arun Ross,et al.  What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics , 2016, IEEE Transactions on Information Forensics and Security.

[2]  Joseph H. Silverman,et al.  NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.

[3]  Christoph Busch,et al.  Unlinkable and irreversible biometric template protection based on bloom filters , 2016, Inf. Sci..

[4]  Michele Nappi,et al.  A Novel Cancelable FaceHashing Technique Based on Non-Invertible Transformation With Encryption and Decryption Template , 2020, IEEE Access.

[5]  S. Shekhar,et al.  Personal Identification Using Multibiometrics Rank-Level Fusion , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[6]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[7]  Christoph Busch,et al.  Finding the Suitable Doppelgänger for a Face Morphing Attack , 2020, 2020 IEEE International Joint Conference on Biometrics (IJCB).

[8]  Ogechukwu N. Iloanusi Fusion of finger types for fingerprint indexing using minutiae quadruplets , 2014, Pattern Recognit. Lett..

[9]  Patrick Lacharme,et al.  A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing , 2020, IEEE Transactions on Information Forensics and Security.

[10]  Christian Gehrmann,et al.  Metadata filtering for user-friendly centralized biometric authentication , 2019, EURASIP J. Inf. Secur..

[11]  Jung Yeon Hwang,et al.  Open-set face identification with index-of-max hashing by learning , 2020, Pattern Recognit..

[12]  Rama Chellappa,et al.  Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.

[13]  Eric Crockett,et al.  A Low-Depth Homomorphic Circuit for Logistic Regression Model Training , 2020, IACR Cryptol. ePrint Arch..

[14]  Feiyue Huang,et al.  CurricularFace: Adaptive Curriculum Learning Loss for Deep Face Recognition , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[15]  Christoph Busch,et al.  Bloom filter-based search structures for indexing and retrieving iris-codes , 2017, IET Biom..

[16]  Tanja Lange,et al.  Post-quantum cryptography , 2008, Nature.

[17]  Qiuxia Wu,et al.  Palm vein recognition based on multi-sampling and feature-level fusion , 2015, Neurocomputing.

[18]  Lavinia Mihaela Dinca,et al.  The Fall of One, the Rise of Many A Survey on Multi-Biometric Fusion Methods , 2017 .

[19]  Vishnu Naresh Boddeti,et al.  HERS: Homomorphically Encrypted Representation Search , 2022, IEEE Transactions on Biometrics, Behavior, and Identity Science.

[20]  Masakazu Fujio,et al.  Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification , 2019, IEEE Access.

[21]  Christoph Busch,et al.  Face Recognition Systems Under Morphing Attacks: A Survey , 2019, IEEE Access.

[22]  Anil K. Jain,et al.  Decision-Level Fusion in Fingerprint Verification , 2001, Multiple Classifier Systems.

[23]  Andreas Uhl,et al.  Is Warping-based Cancellable Biometrics (still) Sensible for Face Recognition? , 2020, 2020 IEEE International Joint Conference on Biometrics (IJCB).

[24]  Arun Ross,et al.  Quality based rank-level fusion in multibiometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[25]  J. Olsen,et al.  The European Commission , 2020, The European Union.

[26]  Konstantinos N. Plataniotis,et al.  Biometric Encryption: The New Breed of Untraceable Biometrics , 2010 .

[27]  Tanuj Kanchan,et al.  The Fingerprint Sourcebook , 2012 .

[28]  Ilaiah Kavati,et al.  Search Space Reduction in Biometric Databases: A Review , 2017 .

[29]  Stark C. Draper,et al.  A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems , 2011, IEEE Transactions on Information Forensics and Security.

[30]  Guy Gogniat,et al.  Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain , 2013, IEEE Signal Processing Magazine.

[31]  Stan Z. Li,et al.  Near Infrared Face Based Biometric Key Binding , 2009, ICB.

[32]  David Zhang,et al.  Contactless and Pose Invariant Biometric Identification Using Hand Surface , 2011, IEEE Transactions on Image Processing.

[33]  Role of Biometric Technology in Aadhaar Enrollment , 2012 .

[34]  Sistema político,et al.  Unique Identification Authority of India , 2011 .

[35]  Christoph Busch,et al.  Fuzzy Vault for 3D Face Recognition Systems , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[36]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[37]  Harold W. Kuhn,et al.  The Hungarian method for the assignment problem , 1955, 50 Years of Integer Programming.

[38]  Kevin W. Bowyer,et al.  Iris recognition technology evaluated for voter registration in Somaliland , 2015 .

[39]  Christoph Busch,et al.  Multi-Biometric Identification With Cascading Database Filtering , 2020, IEEE Transactions on Biometrics, Behavior, and Identity Science.

[40]  Christoph Busch,et al.  Computational workload in biometric identification systems: an overview , 2019, IET Biom..

[41]  Julien Bringer,et al.  Security analysis and improvement of some biometric protected templates based on Bloom filters , 2017, Image Vis. Comput..

[42]  Kim-Sau Chung,et al.  On the Existence of Stable Roommate Matchings , 2000, Games Econ. Behav..

[43]  Boris G. Pittel,et al.  An Upper Bound for the Solvability Probability of a Random Stable Roommates Instance , 2006 .

[44]  Christoph Busch,et al.  Stable Hash Generation for Efficient Privacy-Preserving Face Identification , 2022, IEEE Transactions on Biometrics, Behavior, and Identity Science.

[45]  Christoph Busch,et al.  Signal-level Fusion for Indexing and Retrieval of Facial Biometric Data , 2021, IET Biom..

[46]  Vishnu Naresh Boddeti,et al.  On the Intrinsic Dimensionality of Image Representations , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[47]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.

[48]  Jung Hee Cheon,et al.  Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.

[49]  Yongjin Wang,et al.  Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.

[50]  John Daugman,et al.  Biometric decision landscapes , 2000 .

[51]  Chin-Seng Chua,et al.  PCA-based image recombination for multimodal 2D + 3D face recognition , 2011, Image Vis. Comput..

[52]  Anil K. Jain,et al.  Biometric template transformation: a security analysis , 2010, Electronic Imaging.

[53]  Donghoon Chang,et al.  Privacy-Preserving Indexing of Iris-Codes with Cancelable Bloom Filter-based Search Structures , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[54]  Jascha Kolberg,et al.  Efficiency Analysis of Post-quantum-secure Face Template Protection Schemes based on Homomorphic Encryption , 2020, 2020 International Conference of the Biometrics Special Interest Group (BIOSIG).

[55]  Christoph Busch,et al.  Turning a Vulnerability into an Asset: Accelerating Facial Identification with Morphing , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[56]  Christoph Busch,et al.  A Fingerprint Indexing Algorithm on Encrypted Domain , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[57]  Arun Ross,et al.  Fingerprint mosaicking , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[58]  C. Rathgeb,et al.  On the Application of Homomorphic Encryption to Face Identification , 2019, 2019 International Conference of the Biometrics Special Interest Group (BIOSIG).

[59]  Arun Ross,et al.  A coding scheme for indexing multimodal biometric databases , 2009, 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[60]  Pong C. Yuen,et al.  SecureFace: Face Template Protection , 2021, IEEE Transactions on Information Forensics and Security.

[61]  Christoph Busch,et al.  Benchmarking Binarisation Schemes for Deep Face Templates , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).

[62]  Marta Gomez-Barrero,et al.  General Framework to Evaluate Unlinkability in Biometric Template Protection Systems , 2018, IEEE Transactions on Information Forensics and Security.

[63]  Arun Ross,et al.  Index Codes for Multibiometric Pattern Retrieval , 2012, IEEE Transactions on Information Forensics and Security.

[64]  Karl Ricanek,et al.  MORPH: a longitudinal image database of normal adult age-progression , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[65]  Phalguni Gupta,et al.  Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion , 2008, ICISS.

[66]  Jean-Luc Dugelay,et al.  Recent Advances in Biometric Technology for Mobile Devices , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[67]  Jascha Kolberg,et al.  Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification , 2019, 2019 IEEE International Workshop on Information Forensics and Security (WIFS).

[68]  Christoph Busch,et al.  Multi-iris indexing and retrieval: Fusion strategies for bloom filter-based search structures , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[69]  Nalini Ratha,et al.  An efficient, two-stage iris recognition system , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[70]  Johannes Merkle,et al.  Deep Face Fuzzy Vault: Implementation and Performance , 2021, Comput. Secur..

[71]  Masakazu Fujio,et al.  Cancelable Indexing Based on Low-rank Approximation of Correlation-invariant Random Filtering for Fast and Secure Biometric Identification , 2018, Pattern Recognit. Lett..

[72]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[73]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[74]  Stefanos Zafeiriou,et al.  ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[75]  Hai Huang,et al.  Secure Outsourced Computation of Matrix Determinant Based on Fully Homomorphic Encryption , 2021, IEEE Access.

[76]  Marina L. Gavrilova,et al.  Decision Fusion for Multimodal Biometrics Using Social Network Analysis , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[77]  Arun Ross,et al.  A Comprehensive Overview of Biometric Fusion , 2019, Inf. Fusion.

[78]  Christoph Busch,et al.  Binarization of spectral histogram models: An application to efficient biometric identification , 2015, 2015 IEEE 2nd International Conference on Cybernetics (CYBCONF).

[79]  Christian Rathgeb,et al.  Efficient two-stage speaker identification based on universal background models , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[80]  Anton H. M. Akkermans,et al.  Face biometrics with renewable templates , 2006, Electronic Imaging.

[81]  Frederik Vercauteren,et al.  Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..

[82]  Vishnu Naresh Boddeti Secure Face Matching Using Fully Homomorphic Encryption , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[83]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[84]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[85]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[86]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[87]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[88]  Yiu-Ming Cheung,et al.  Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[89]  Terrance E. Boult,et al.  Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[90]  Mauro Conti,et al.  A Survey on Homomorphic Encryption Schemes: Theory and Implementation , 2017 .

[91]  Alan Mink,et al.  Multimodal biometrics: issues in design and testing , 2003, ICMI '03.