A New and Practical Design of Cancellable Biometrics: Index-of-Max Hashing

Despite a variety of theoretical-sound techniques have been proposed to generate cancellable biometric templates, there is rarely practical solution that satisfies non-invertibility, revocability, non-linkability and performance simultaneously. In this paper, we propose a locality sensitive hashing inspired cancellable biometrics framework, namely "Index-of-Max" (IoM) hashing. Briefly, IoM hashing non-linearly transforms a realvalued feature vector into discrete index hashed code. We demonstrate two realizations from IoM hashing framework, namely Gaussian Random Projection based and Uniformly Random Permutation based hashing schemes. The discrete indices representation nature of IoM hashed codes enjoy several merits such as it empowers strong concealment to biometric information. This contributes to the solid ground of noninvertibility guarantee. IoM hashing is insensitive to the magnitude of features, hence are more robust against biometric features variation and its magnitude-independence trait makes the resultant hash codes scale-invariant, which is critical for matching and feature alignment. The experimental results demonstrate reasonable accuracy performance on benchmark FVC2002 and FVC2004 fingerprint databases. Moreover, the analyses justify its resilience to the existing and newly introduced security and privacy attacks as well as satisfy the revocability and unlinkability criteria of cancellable biometrics. Besides, the implementation of IoM hashing is also incredibly simple for practical applications.

[1]  Vaibhava Goel,et al.  Random Maxout Features , 2015, ArXiv.

[2]  Jay Yagnik,et al.  The power of comparative reasoning , 2011, 2011 International Conference on Computer Vision.

[3]  Julian Fiérrez,et al.  Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters , 2014, 2014 22nd International Conference on Pattern Recognition.

[4]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[5]  Heikki Mannila,et al.  Random projection in dimensionality reduction: applications to image and text data , 2001, KDD '01.

[6]  Davide Maltoni,et al.  A two-factor protection scheme for MCC fingerprint templates , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[7]  Jiankun Hu,et al.  A blind system identification approach to cancelable fingerprint templates , 2016, Pattern Recognit..

[8]  Bart Preneel,et al.  Reversing protected minutiae vicinities , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[9]  Rama Chellappa,et al.  Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.

[10]  Christoph Busch,et al.  On application of bloom filters to iris biometrics , 2014, IET Biom..

[11]  Leonard J. Schulman,et al.  Dimensionality reduction: beyond the Johnson-Lindenstrauss bound , 2011, SODA '11.

[12]  Narishige Abe,et al.  Irreversible fingerprint template using Minutiae Relation Code with Bloom Filter , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[13]  Yen-Lung Lai,et al.  Cancellable iris template generation based on Indexing-First-One hashing , 2017, Pattern Recognit..

[14]  Andrew Beng Jin Teoh,et al.  High security Iris verification system based on random secret integration , 2006, Comput. Vis. Image Underst..

[15]  Chris J. Hill,et al.  Risk of Masquerade Arising from the Storage of Biometrics , 2001 .

[16]  Alan M. Frieze,et al.  Improved approximation algorithms for MAXk-CUT and MAX BISECTION , 1995, Algorithmica.

[17]  Bart Mennink,et al.  When a Bloom filter is a Doom filter: Security assessment of a novel iris biometric template protection system , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[18]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[19]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.

[20]  Davide Maltoni,et al.  Noninvertible Minutia Cylinder-Code Representation , 2012, IEEE Transactions on Information Forensics and Security.

[21]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[22]  Shree K. Nayar,et al.  Ordinal measures for visual correspondence , 1996, Proceedings CVPR IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[23]  Zhe Jin,et al.  Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[24]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[25]  Julien Bringer,et al.  Security analysis of Bloom filter-based iris biometric template protection , 2015, 2015 International Conference on Biometrics (ICB).

[26]  Bian Yang,et al.  Parameterized geometric alignment for minutiae-based fingerprint template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[27]  Davide Maltoni,et al.  Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[28]  Kristen Grauman,et al.  Kernelized Locality-Sensitive Hashing , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[29]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[30]  Moses Charikar,et al.  Similarity estimation techniques from rounding algorithms , 2002, STOC '02.

[31]  Christoph Busch,et al.  Towards generating protected fingerprint templates based on bloom filters , 2015, 3rd International Workshop on Biometrics and Forensics (IWBF 2015).

[32]  Christoph Busch,et al.  Dynamic random projection for biometric template protection , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[33]  R. Graham,et al.  Spearman's Footrule as a Measure of Disarray , 1977 .

[34]  Anil K. Jain,et al.  Fingerprint Reconstruction: From Minutiae to Phase , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[35]  Kien A. Hua,et al.  Rank Subspace Learning for Compact Hash Codes , 2015, ArXiv.

[36]  David A. Wagner,et al.  A Generalized Birthday Problem , 2002, CRYPTO.

[37]  Axel Munk,et al.  Security Considerations in Minutiae-Based Fuzzy Vaults , 2015, IEEE Transactions on Information Forensics and Security.

[38]  Andrew Beng Jin Teoh,et al.  Enhanced multi-line code for minutiae-based fingerprint template protection , 2013, Pattern Recognit. Lett..