A face template protection approach using chaos and GRP permutation

In biometric systems, template protection is a vital issue for preventing from identity theft. Fuzzy commitment scheme is a template cryptographic method providing secure templates by binding a uniform random key to a template. Fuzzy commitment scheme suffers from its lacks in privacy, in cancelability, and also in robustness against cross-matching attacks. To improve both the security and cancelability properties simultaneously, we present a novel template protection approach for face recognition systems based on fuzzy commitment scheme, permutated features, and chaos symmetric key. To permute feature vectors, we produce pseudo random numbers by using nonlinear chaos function to fill the control array of GRP permutation method. Even if the permutated template is compromised, it is possible to substitute it with a new permutated template by changing the initial conditions of chaos map. To evaluate our proposed approach, a series of experiments have been conducted on two well-known face databases ORL and Yale. We showed that the new feature permutation leads to more secure protected templates against decodability based on cross-matching attacks. The experimental results also showed that our proposed approach outperforms existing fuzzy commitment methods both in security and privacy aspects without influencing the accuracy. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Nalini K. Ratha,et al.  Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[2]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[3]  Haiping Lu,et al.  Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.

[4]  Anton H. M. Akkermans,et al.  Face biometrics with renewable templates , 2006, Electronic Imaging.

[5]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[6]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[7]  J. I. Hall,et al.  Notes on Coding Theory , 2003 .

[8]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[9]  Pong C. Yuen,et al.  Binary Discriminant Analysis for Generating Binary Face Template , 2012, IEEE Transactions on Information Forensics and Security.

[10]  Nur Izura Udzir,et al.  Face Recognition and Template Protection with Shielding Function , 2015 .

[11]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[12]  Ming-Hsuan Yang,et al.  Kernel Eigenfaces vs. Kernel Fisherfaces: Face recognition using kernel methods , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.

[13]  S. Mazloom,et al.  Color image encryption based on Coupled Nonlinear Chaotic Map , 2009 .

[14]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[15]  Raymond N. J. Veldhuis,et al.  Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.

[16]  Xin Zhang,et al.  A new chaotic algorithm for image encryption , 2006 .

[17]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[18]  Anil K. Jain,et al.  Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.

[19]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[20]  Suela Kodra Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .

[21]  David Zhang,et al.  Combination of two novel LDA-based methods for face recognition , 2007, Neurocomputing.

[22]  Pong C. Yuen,et al.  A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.

[23]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[24]  Andy Adler,et al.  Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.

[25]  Xi Chen,et al.  Chaotic Random Projection for Cancelable Biometric Key Generation , 2012, IScIDE.

[26]  H. M. Ebied Feature extraction using PCA and Kernel-PCA for face recognition , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).

[27]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[28]  Andreas Uhl,et al.  Secure Iris Recognition Based on Local Intensity Variations , 2010, ICIAR.

[29]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[30]  Frans M. J. Willems,et al.  Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.

[31]  Elwyn R. Berlekamp,et al.  Algebraic coding theory , 1984, McGraw-Hill series in systems science.

[32]  B. Scholkopf,et al.  Fisher discriminant analysis with kernels , 1999, Neural Networks for Signal Processing IX: Proceedings of the 1999 IEEE Signal Processing Society Workshop (Cat. No.98TH8468).

[33]  Andreas Uhl,et al.  Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.

[34]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[35]  Bart Preneel,et al.  Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[36]  Andrew Beng Jin Teoh,et al.  Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.

[37]  Sébastien Marcel,et al.  On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..