Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server

In recent years, biometric authentication system (BAS) has become the most promising and popular authentication system in identity management. Due to its capability to solve the limitations of unimodal systems, multi-biometric systems (MBS) have been extensively accepted in various fields. The main step in MBS is information fusion. On the other hand, directly storing the fused templates into a centralized server leads to privacy concerns. Recently, many BAS based on homomorphic encryption has been introduced to provide confidentiality for the fused templates. However, most of the existing solutions rely on an implication of the assumption that the server is “Honest-but-Curious”. As a result, the compromise of such server results into entire system vulnerability. To address this, we propose a novel P rivacy P reserving (PP) multi-instance iris remote authentication system to accord with attacks at the malicious server and over the transmission channel. Our scheme uses F ully H omomorphic E ncryption (FHE) to achieve the confidentiality of the fused iris templates and polynomial factorization algorithm to achieve the integrity of the matching result. We propose a PP iris authentication system using P rivate M ulti-C lass P erceptron (PMCP) by using the properties of FHE. Moreover, we propose C ontradistinguish S imilarity A nalysis (CSA), a feature level fusion technique that minimizes the between-class correlations and maximizes the pair-wise correlations. Our method has experimented on IITD and CASIA-V3-Interval iris databases to check the effectiveness and robustness. Experimental results show that our method provides improved accuracy, and eliminates the need to trust the cloud server when compared to the state-of-the-art approaches.

[1]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[2]  Craig Gentry,et al.  Packed Ciphertexts in LWE-Based Homomorphic Encryption , 2013, Public Key Cryptography.

[3]  Takeshi Koshiba,et al.  New packing method in somewhat homomorphic encryption and its applications , 2015, Secur. Commun. Networks.

[4]  Rosario Gennaro,et al.  Fully Homomorphic Message Authenticators , 2013, IACR Cryptol. ePrint Arch..

[5]  Oded Regev,et al.  The Learning with Errors Problem (Invited Survey) , 2010, 2010 IEEE 25th Annual Conference on Computational Complexity.

[6]  Patrizio Campisi,et al.  Hill-Climbing Attacks on Multibiometrics Recognition Systems , 2015, IEEE Transactions on Information Forensics and Security.

[7]  Jian Liu,et al.  Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Craig Gentry,et al.  Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.

[9]  Yan Liu,et al.  A new method of feature fusion and its application in image recognition , 2005, Pattern Recognit..

[10]  J. Fierrez-Aguilar,et al.  Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[11]  Christoph Busch,et al.  Unlinkable improved multi-biometric iris fuzzy vault , 2016, EURASIP J. Inf. Secur..

[12]  Rama Chellappa,et al.  Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.

[13]  Zijing Zhao,et al.  A deep learning based unified framework to detect, segment and recognize irises using spatially corresponding features , 2019, Pattern Recognit..

[14]  Stanley S. Ipson,et al.  A multi-biometric iris recognition system based on a deep learning approach , 2017, Pattern Analysis and Applications.

[15]  Frederik Vercauteren,et al.  Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..

[16]  Frederik Vercauteren,et al.  Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.

[17]  Weixin Xie,et al.  Private Machine Learning Classification Based on Fully Homomorphic Encryption , 2020, IEEE Transactions on Emerging Topics in Computing.

[18]  Julian Fiérrez,et al.  Multi-biometric template protection based on Homomorphic Encryption , 2017, Pattern Recognit..

[19]  Ali Noruzi,et al.  Iris recognition in unconstrained environment on graphic processing units with CUDA , 2019, Artificial Intelligence Review.

[20]  Chris Peikert,et al.  On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.

[21]  Ajay Kumar,et al.  Comparison and combination of iris matchers for reliable personal authentication , 2010, Pattern Recognit..

[22]  Sambit Bakshi,et al.  Iris recognition with tunable filter bank based feature , 2017, Multimedia Tools and Applications.

[23]  Srinath T. V. Setty,et al.  Making argument systems for outsourced computation practical (sometimes) , 2012, NDSS.

[24]  David P. Anderson,et al.  SETI@home: an experiment in public-resource computing , 2002, CACM.

[25]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[26]  O. Regev The Learning with Errors problem , 2010 .

[27]  Bala Srinivasan,et al.  Privacy-preserving biometrics authentication systems using fully homomorphic encryption , 2015, Int. J. Pervasive Comput. Commun..

[28]  Marios Savvides,et al.  How to Generate Spoofed Irises From an Iris Code Template , 2011, IEEE Transactions on Information Forensics and Security.

[29]  J. Daugman,et al.  Epigenetic randomness, complexity and singularity of human iris patterns , 2001, Proceedings of the Royal Society of London. Series B: Biological Sciences.

[30]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[31]  RegevOded,et al.  On Ideal Lattices and Learning with Errors over Rings , 2013 .

[32]  Jian Yang,et al.  Feature fusion: parallel strategy vs. serial strategy , 2003, Pattern Recognit..

[33]  Chengjun Liu,et al.  A shape- and texture-based enhanced Fisher classifier for face recognition , 2001, IEEE Trans. Image Process..

[34]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[35]  Ahmad-Reza Sadeghi,et al.  Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.

[36]  YasudaMasaya,et al.  New packing method in somewhat homomorphic encryption and its applications , 2015 .

[37]  Marina Blanton,et al.  Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.

[38]  Arun Ross,et al.  Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.

[39]  Andreas Uhl,et al.  Design Decisions for an Iris Recognition SDK , 2016 .

[40]  Sushmita Mitra,et al.  Iris localization using rough entropy and CSA: A soft computing approach , 2018, Appl. Soft Comput..

[41]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[42]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[43]  Abdenour Hadid,et al.  Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned , 2015, IEEE Signal Processing Magazine.

[44]  Kang Ryoung Park,et al.  FRED-Net: Fully residual encoder-decoder network for accurate iris segmentation , 2019, Expert Syst. Appl..

[45]  Mauro Barni,et al.  Oblivious Neural Network Computing via Homomorphic Encryption , 2007, EURASIP J. Inf. Secur..

[46]  Michael Naehrig,et al.  ML Confidential: Machine Learning on Encrypted Data , 2012, ICISC.

[47]  Michele Mosca,et al.  Cybersecurity in an Era with Quantum Computers: Will We Be Ready? , 2017, IEEE Security & Privacy.

[48]  Mohamed Abdel-Mottaleb,et al.  Discriminant Correlation Analysis: Real-Time Feature Level Fusion for Multimodal Biometric Recognition , 2016, IEEE Transactions on Information Forensics and Security.

[49]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[50]  V. A. Bharadi,et al.  Multi-Instance Iris Recognition , 2018, 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA).