Privacy-preserving and verifiable multi-instance iris remote authentication using public auditor

Homomorphic Encryption (HE) is the most widely explored research area to construct privacy-preserving biometric authentication systems due to its advantages over cancelable biometrics and biometric cryptosystem. However, most of the existing privacy-preserving biometric authentication systems using HE assume that the server performs computations honestly. In a malicious server setting, the server may return an arbitrary result to save the computational resources results in false accept/reject. To address this, we propose a privacy-preserving and verifiable multi-instance iris authentication using public auditor (PviaPA). Paillier HE provides confidentiality for the iris templates in PviaPA. A public auditor ensures the correctness of comparator result in PviaPA. Extensive experimental results on benchmark iris databases demonstrate that PviaPA provides privacy to the iris templates with no loss in the accuracy as well as trust on the comparator result.

[1]  Qing Yang,et al.  Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones , 2016, IEEE Transactions on Information Forensics and Security.

[2]  Julian Fiérrez,et al.  Multi-biometric template protection based on Homomorphic Encryption , 2017, Pattern Recognit..

[3]  Balasubramanian Raman,et al.  Generation of Cancelable Iris Templates via Randomized Bit Sampling , 2019, IEEE Transactions on Information Forensics and Security.

[4]  Hakan Erdogan,et al.  Fixed-length asymmetric binary hashing for fingerprint verification through GMM-SVM based representations , 2019, Pattern Recognit..

[5]  Munaga V. N. K. Prasad,et al.  Privacy-preserving iris authentication using fully homomorphic encryption , 2020, Multimedia Tools and Applications.

[6]  J. Fierrez-Aguilar,et al.  Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[7]  Saeed Mozaffari,et al.  Face authentication in encrypted domain based on correlation filters , 2018, Multimedia Tools and Applications.

[8]  Enrique Argones-Rúa,et al.  Efficient Verifiable Computation of XOR for Biometric Authentication , 2016, CANS.

[9]  Ahmed Ben Jmaa,et al.  2DPCA fractal features and genetic algorithm for efficient face representation and recognition , 2011, EURASIP J. Inf. Secur..

[10]  Hui Li,et al.  Efficient and Privacy-preserving Online Fingerprint Authentication Scheme Over Outsourced Data , 2018 .

[11]  Yen-Lung Lai,et al.  Cancellable iris template generation based on Indexing-First-One hashing , 2017, Pattern Recognit..

[12]  Chunming Tang,et al.  Privacy-preserving face recognition with outsourced computation , 2016, Soft Comput..

[13]  Tanja Lange,et al.  The new SHA-3 software shootout , 2012, IACR Cryptol. ePrint Arch..

[14]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[15]  Qian Wang,et al.  Outsourced Biometric Identification With Privacy , 2018, IEEE Transactions on Information Forensics and Security.

[16]  Abdenour Hadid,et al.  Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned , 2015, IEEE Signal Processing Magazine.

[17]  Jian Ren,et al.  PassBio: Privacy-Preserving User-Centric Biometric Authentication , 2017, IEEE Transactions on Information Forensics and Security.

[18]  Hongxun Yao,et al.  Auto-encoder based dimensionality reduction , 2016, Neurocomputing.

[19]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[20]  Arun Ross,et al.  Handbook of Biometrics , 2007 .

[21]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[22]  Ajay Kumar,et al.  Comparison and combination of iris matchers for reliable personal authentication , 2010, Pattern Recognit..

[23]  Julien Bringer,et al.  A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems , 2012, IEEE Transactions on Information Forensics and Security.

[24]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[25]  Fernando Pérez-González,et al.  Fully Private Noninteractive Face Verification , 2013, IEEE Transactions on Information Forensics and Security.

[26]  S. Sasikala,et al.  Generation of Cancelable Iris Template Using Bi-level Transformation , 2017, ICBBS.

[27]  Andreas Uhl,et al.  Customisation of Paillier homomorphic encryption for efficient binary biometric feature vector matching , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[28]  Saman A. Zonouz,et al.  CloudID: Trustworthy cloud-based and cross-enterprise biometric identification , 2015, Expert Syst. Appl..

[29]  K. Srinathan,et al.  Blind Authentication: A Secure Crypto-Biometric Verification Protocol , 2010, IEEE Transactions on Information Forensics and Security.

[30]  Jung Hee Cheon,et al.  Instant Privacy-Preserving Biometric Authentication for Hamming Distance , 2018, IACR Cryptol. ePrint Arch..

[31]  Aditya Prasad,et al.  A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping , 2017, Comput. Secur..

[32]  John Daugman How iris recognition works , 2004 .

[33]  Raphael C.-W. Phan,et al.  Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis , 2013, IEEE Transactions on Affective Computing.

[34]  Frans M. J. Willems,et al.  Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[35]  Tao Xiang,et al.  Towards efficient privacy-preserving face recognition in the cloud , 2019, Signal Process..

[36]  Rupinder Saini,et al.  COMPARISON OF VARIOUS BIOMETRIC METHODS , 2014 .

[37]  Marios Savvides,et al.  How to Generate Spoofed Irises From an Iris Code Template , 2011, IEEE Transactions on Information Forensics and Security.

[38]  Amit Kumar Singh,et al.  Privacy preserving security using biometrics in cloud computing , 2018, Multimedia Tools and Applications.

[39]  A. Abhyankar,et al.  Novel Canonical Correlation Analysis Based Feature Level Fusion Algorithm for Multimodal Recognition in Biometric Sensor Systems , 2019, Sensor Letters.

[40]  Ramachandra Raghavendra,et al.  Multi-biometric template protection based on bloom filters , 2018, Inf. Fusion.

[41]  Montse Pardàs,et al.  Deleted DOI: Audiovisual Head Orientation Estimation with Particle Filtering in Multisensor Scenarios , 2008 .

[42]  Fathi E. Abd El-Samie,et al.  Cancelable Iris recognition system based on comb filter , 2019, Multimedia Tools and Applications.

[43]  Geoffrey E. Hinton,et al.  Reducing the Dimensionality of Data with Neural Networks , 2006, Science.

[44]  Junbeom Hur,et al.  Efficient and privacy-preserving biometric identification in cloud , 2016, ICT Express.

[45]  Alex X. Liu,et al.  FPGA Resource Pooling in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[46]  Mauro Barni,et al.  SEMBA: SEcure multi-biometric authentication , 2018, IET Biom..

[47]  Patrizio Campisi,et al.  Hill-Climbing Attacks on Multibiometrics Recognition Systems , 2015, IEEE Transactions on Information Forensics and Security.

[48]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[49]  Munaga V. N. K. Prasad,et al.  BMIAE: blockchain-based multi-instance Iris authentication using additive ElGamal homomorphic encryption , 2020, IET Biom..

[50]  Takeshi Koshiba,et al.  New packing method in somewhat homomorphic encryption and its applications , 2015, Secur. Commun. Networks.

[51]  Frederik Vercauteren,et al.  Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..

[52]  Vishnu Naresh Boddeti Secure Face Matching Using Fully Homomorphic Encryption , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[53]  Kiran S. Balagani,et al.  Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones , 2015, IEEE Transactions on Information Forensics and Security.

[54]  Yilong Yin,et al.  SDUMLA-HMT: A Multimodal Biometric Database , 2011, CCBR.

[55]  Ayman El-Sayed,et al.  Iris Recognition Using Multi-Algorithmic Approaches for Cognitive Internet of things (CIoT) Framework , 2018, Future Gener. Comput. Syst..

[56]  Andreas Uhl,et al.  Design Decisions for an Iris Recognition SDK , 2016 .

[57]  Gurjit Singh Walia,et al.  Secure multimodal biometric system based on diffused graphs and optimal score fusion , 2019, IET Biom..

[58]  Benny Pinkas,et al.  SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.