A Generic Model for Privacy-Preserving Authentication on Smartphones

With the increasing use of biometrics for user authentication especially on mobile devices, its privacy and resource requirements are becoming big challenges to consider. In this paper, we propose a generic model for privacy-preserving yet accurate authentication on smartphones using the mobile matching on card (MMOC) technique and transfer learning. MMOC technique takes advantage of SIM cards as a secure element (SE) on smartphones to increase the security and privacy of user verification with low performance overhead. In order to improve the performance accuracy of the system, we use transfer learning and fine-tune a network suitable for implementation on off-the-shelf SIM cards available on smartphones. The classification sub-network is migrated to the SIM card for a lightweight and secure user verification. However, the implementation of classification sub-network on constrained resource smart cards with high accuracy and efficiency is a challenging task. We propose log quantization scheme and an on-card optimization architecture to speed-up the forward pass of the sub-network and retain the system’s accuracy close to the original model with low memory footprint and real-time verification response. Using a public mobile face dataset, we evaluate our privacy-preserving verification system. Our results show that the proposed system achieves Equal Error Rate (EER) of 0.4%-2% in real-time, with response time of 1.5 seconds.

[1]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[2]  Stefano Bistarelli,et al.  An Asymmetric Fingerprint Matching Algorithm for Java Card™ , 2005, AVBPA.

[3]  Daesung Moon,et al.  An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card , 2003, IEEE Trans. Consumer Electron..

[4]  Andrew K. C. Wong,et al.  Classification of Imbalanced Data: a Review , 2009, Int. J. Pattern Recognit. Artif. Intell..

[5]  Luc Vandendorpe,et al.  Evaluation of LDA based face verification with respect to available computational resources , 2002, PRIS.

[6]  Hyeran Byun,et al.  A new face authentication system for memory-constrained devices , 2003, IEEE Trans. Consumer Electron..

[7]  Jack W. Davidson,et al.  An Aggressive Approach to Loop Unrolling , 2001 .

[8]  Matti Pietikäinen,et al.  Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data , 2012, 2012 IEEE International Conference on Multimedia and Expo Workshops.

[9]  Rama Chellappa,et al.  Active user authentication for smartphones: A challenge data set and benchmark results , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[10]  Nadia Nedjah,et al.  Efficient fingerprint matching on smart cards for high security and privacy in smart systems , 2019, Inf. Sci..

[11]  Andrew W. Appel,et al.  Modern Compiler Implementation in Java, 2nd edition , 2002 .

[12]  Ryan M. Rifkin,et al.  In Defense of One-Vs-All Classification , 2004, J. Mach. Learn. Res..

[13]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[14]  René Mayrhofer,et al.  Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics , 2018, IEEE Transactions on Mobile Computing.

[15]  Omkar M. Parkhi,et al.  VGGFace2: A Dataset for Recognising Faces across Pose and Age , 2017, 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018).

[16]  Yoshua Bengio,et al.  BinaryConnect: Training Deep Neural Networks with binary weights during propagations , 2015, NIPS.

[17]  Josef Kittler,et al.  On design and optimization of face verification systems that are smart-card based , 2010, Machine Vision and Applications.

[18]  Samuel Pierre,et al.  Mobile Match on Card Active Authentication Using Touchscreen Biometric , 2020, IEEE Transactions on Consumer Electronics.