A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping

Biometric-based recognition systems have overcome passive issues of traditional human authentication systems. However, security theft and privacy invasion are two passive issues that still persist in the effective deployment of biometric-based authentication systems. Compromise of biometric data can potentially lead to serious security violation as the user's biometric trait cannot be changed. In order to prevent the invasion of biometric templates, it is desired to morph the original biometric template through non-invertible or irreversible transformation function. This transformed template is referred to as cancelable template and can be replaced or reissued in case of compromise. In this paper, we propose a novel cancelable iris template generation technique based on randomized look-up table mapping. The technique utilizes a decimal vector generated from a rotation-invariant feature vector. The feature vector is generated using 1-D Log Gabor filter applied to the iris image. Experiments carried out on various iris databases confirm the efficacy of the proposed approach. After applying the template protection mechanism, we have achieved Equal Error Rate (EER) of 0.37%, 0.43% and 0.79% for CASIA-V 1.0, CASIA-V3-Interval and ICE 2005 iris databases, respectively. Moreover, the transformation preserves the irreversibility, revocability and diversity properties of the concealable iris templates.

[1]  Rama Chellappa,et al.  Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[2]  Zhe Jin,et al.  A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template , 2014, Secur. Commun. Networks.

[3]  Loris Nanni,et al.  Biohashing applied to orientation-based minutia descriptor for secure fingerprint authentication system , 2011 .

[4]  David Zhang,et al.  A Novel Cryptosystem Based on Iris Key Generation , 2008, 2008 Fourth International Conference on Natural Computation.

[5]  K.W. Bowyer,et al.  The Best Bits in an Iris Code , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[7]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Tee Connie,et al.  Remarks on BioHashing based cancelable biometrics in verification system , 2006 .

[9]  Norimichi Tsumura,et al.  Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes , 2010, 2010 20th International Conference on Pattern Recognition.

[10]  Andreas Uhl,et al.  Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.

[11]  Muhammad Ali Akbar,et al.  Secure biometric template generation for multi-factor authentication , 2015, Pattern Recognit..

[12]  Norimichi Tsumura,et al.  Securing BioEncoded IrisCodes against Correlation Attacks , 2011, 2011 IEEE International Conference on Communications (ICC).

[13]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[14]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[15]  Andreas Uhl,et al.  Cancelable iris-templates using key-dependent wavelet transforms , 2013, 2013 International Conference on Biometrics (ICB).

[16]  Libor Masek,et al.  Recognition of Human Iris Patterns for Biometric Identification , 2003 .

[17]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[18]  Christoph Busch,et al.  Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters , 2014, Comput. Secur..

[19]  Somnath Dey,et al.  Cancelable iris template generation using look-up table mapping , 2015, 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN).

[20]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[21]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[22]  Gérard D. Cohen,et al.  Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.

[23]  Kai Yang,et al.  Key Incorporation Scheme for Cancelable Biometrics , 2011, J. Information Security.

[24]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[25]  Nalini K. Ratha,et al.  Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.

[26]  J. Daugman Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. , 1985, Journal of the Optical Society of America. A, Optics and image science.

[27]  K.W. Bowyer,et al.  The Iris Challenge Evaluation 2005 , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[28]  Christoph Busch,et al.  Comparison Score Fusion Towards an Optimal Alignment for Enhancing Cancelable Iris Biometrics , 2013, 2013 Fourth International Conference on Emerging Security Technologies.

[29]  Ee-Chien Chang,et al.  Robust Extraction of Secret Bits from Minutiae , 2007, ICB.

[30]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[31]  I. R. Babu,et al.  Performance of Iris Based Hard Fuzzy Vault , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.