Securing CNN Model and Biometric Template using Blockchain

Blockchain has emerged as a leading technology that ensures security in a distributed framework. Recently, it has been shown that blockchain can be used to convert traditional blocks of any deep learning models into secure systems. In this research, we model a trained biometric recognition system in an architecture which leverages the blockchain technology to provide fault tolerant access in a distributed environment. The advantage of the proposed approach is that tampering in one particular component alerts the whole system and helps in easy identification of ‘any’ possible alteration. Experimentally, with different biometric modalities, we have shown that the proposed approach provides security to both deep learning model and the biometric template.

[1]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[2]  Richa Singh,et al.  Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition , 2019, International Journal of Computer Vision.

[3]  Richa Singh,et al.  Unravelling Robustness of Deep Learning based Face Recognition Against Adversarial Attacks , 2018, AAAI.

[4]  Richa Singh,et al.  Are Image-Agnostic Universal Adversarial Perturbations for Face Recognition Difficult to Detect? , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[5]  Mayank Vatsa,et al.  DeepRing: Protecting Deep Neural Network With Blockchain , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[6]  Christian Catalini,et al.  Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability , 2018, Computational and structural biotechnology journal.

[7]  Anish Jindal,et al.  EnergyChain: Enabling Energy Trading for Smart Homes using Blockchains in Smart Grid Ecosystem , 2018, SmartCitiesSecurity@MobiHoc.

[8]  Takeo Kanade,et al.  Multi-PIE , 2008, 2008 8th IEEE International Conference on Automatic Face & Gesture Recognition.

[9]  Johan A. Pouwelse,et al.  Deployment of a Blockchain-Based Self-Sovereign Identity , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[10]  Jinfeng Yi,et al.  EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples , 2017, AAAI.

[11]  David A. Wagner,et al.  Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[12]  Yonghao Wang,et al.  A Simple Auditable Fingerprint Authentication Scheme Using Smart-Contracts , 2018, SmartBlock.

[13]  Richa Singh,et al.  SmartBox: Benchmarking Adversarial Detection and Mitigation Algorithms for Face Recognition , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[14]  Andrew Zisserman,et al.  Deep Face Recognition , 2015, BMVC.

[15]  Sébastien Marcel,et al.  Biometric Antispoofing Methods: A Survey in Face Recognition , 2014, IEEE Access.

[16]  Paco Garcia,et al.  Biometrics on the blockchain , 2018 .

[17]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[18]  Julian Fiérrez,et al.  Blockchain and Biometrics: A First Look into Opportunities and Challenges , 2019, BLOCKCHAIN.

[19]  Ajmal Mian,et al.  Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.

[20]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[21]  Paolo Palmieri,et al.  Feather forking as a positive force: incentivising green energy production in a blockchain-based smart grid , 2018, CRYBLOCK@MobiSys.

[22]  Sharath Pankanti,et al.  Secure one-time biometrie tokens for non-repudiable multi-party transactions , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).

[23]  Christoph Busch,et al.  Enhancing Breeder Document Long-Term Security Using Blockchain Technology , 2017, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).

[24]  Adi Shamir,et al.  How to share a secret , 1979, CACM.