Efficient anonymous biometric matching in privacy-aware environments

OF DISSERTATION EFFICIENT ANONYMOUS BIOMETRIC MATCHING IN PRIVACY-AWARE ENVIRONMENTS Video surveillance is an important tool used in security and environmental monitoring, however, the widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection. To identify these individuals for protection, the most reliable approach is to use biometric signals as they are immutable and highly discriminative. If misused, these characteristics of biometrics can seriously defeat the goal of privacy protection. In this dissertation, an Anonymous Biometric Access Control (ABAC) procedure is proposed based on biometric signals for privacy-aware video surveillance. The ABAC procedure uses Secure Multi-party Computational (SMC) based protocols to verify membership of an incoming individual without knowing his/her true identity. To make SMC-based protocols scalable to large biometric databases, I introduce the k-Anonymous Quantization (kAQ) framework to provide an effective and secure tradeoff of privacy and complexity. kAQ limits systems knowledge of the incoming individual to k maximally dissimilar candidates in the database, where k is a design parameter that controls the amount of complexity-privacy tradeoff. The relationship between biometric similarity and privacy is experimentally validated using a twin iris database. The effectiveness of the entire system is demonstrated based on a public iris biometric database. To provide the protected subjects with full access to their privacy information in video surveillance system, I develop a novel privacy information management system that allows subjects to access their information via the same biometric signals used for ABAC. The system is composed of two encrypted-domain protocols: the privacy information encryption protocol encrypts the original video records using the iris pattern acquired during ABAC procedure; the privacy information retrieval protocol allows the video records to be anonymously retrieved through a GC-based iris pattern matching process. Experimental results on a public iris biometric database demonstrate the validity of my framework.

[1]  Yücel Saygin,et al.  Distributed privacy preserving k-means clustering with additive secret sharing , 2008, PAIS '08.

[2]  Josh Benaloh,et al.  Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.

[3]  Benny Pinkas,et al.  Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.

[4]  Deirdre K. Mulligan,et al.  Respectful cameras: detecting visual markers in real-time to address privacy concerns , 2007, 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[5]  Sharath Pankanti,et al.  On the similarity of identical twin fingerprints , 2002, Pattern Recognit..

[6]  Barry Steinhardt,et al.  Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society , 2014 .

[7]  Sen-Ching S. Cheung,et al.  Video Data Hiding for Managing Privacy Information in Surveillance Systems , 2009, EURASIP J. Inf. Secur..

[8]  K. Nakayama,et al.  Human face recognition ability is specific and highly heritable , 2010, Proceedings of the National Academy of Sciences.

[9]  A. Sadeghi,et al.  How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently , 2009 .

[10]  Chi-Jen Lu,et al.  Oblivious polynomial evaluation and oblivious neural learning , 2001, Theor. Comput. Sci..

[11]  Eike Kiltz,et al.  Secure Linear Algebra Using Linearly Recurrent Sequences , 2007, Complexity of Boolean Functions.

[12]  Nalini Venkatasubramanian,et al.  Privacy protecting data collection in media spaces , 2004, MULTIMEDIA '04.

[13]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[14]  Miao Pan,et al.  Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer , 2012, Wirel. Networks.

[15]  Joe Kilian,et al.  One-Round Secure Computation and Secure Autonomous Mobile Agents , 2000, ICALP.

[16]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[17]  Helger Lipmaa,et al.  Verifiable Homomorphic Oblivious Transfer and Private Equality Test , 2003, ASIACRYPT.

[18]  Marina Blanton,et al.  Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.

[19]  Rong Yan,et al.  Tools for Protecting the Privacy of Specific Individuals in Video , 2007, EURASIP J. Adv. Signal Process..

[20]  Farzin Deravi,et al.  Feasibility of generating biometric encryption keys , 2005 .

[21]  Piotr Indyk,et al.  Similarity Search in High Dimensions via Hashing , 1999, VLDB.

[22]  Mauro Barni,et al.  Oblivious Neural Network Computing via Homomorphic Encryption , 2007, EURASIP J. Inf. Secur..

[23]  Mohan Trivedi,et al.  The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks , 2004, VSSN '04.

[24]  Libor Masek,et al.  MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .

[25]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 1, Basic Tools , 2001 .

[26]  Rebecca N. Wright,et al.  Privacy-preserving Bayesian network structure computation on distributed heterogeneous data , 2004, KDD.

[27]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[28]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[29]  Ying Luo,et al.  Anonymous subject identification in privacy-aware video surveillance , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[30]  K. Plataniotis,et al.  Privacy Protected Surveillance Using Secure Visual Object Coding , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[31]  John Daugman How iris recognition works , 2004 .

[32]  Ju Shen,et al.  Extrinsic calibration for wide-baseline RGB-D camera network , 2014, 2014 IEEE 16th International Workshop on Multimedia Signal Processing (MMSP).

[33]  Benny Pinkas,et al.  Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..

[34]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[35]  Gene Tsudik,et al.  ALARM: Anonymous Location-Aided Routing in Suspicious MANETs , 2007, IEEE Transactions on Mobile Computing.

[36]  Ying Luo,et al.  Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.

[37]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[38]  Elaine B. Barker,et al.  Recommendation for key management: , 2019 .

[39]  Jian Zhao,et al.  Multi-Camera Surveillance with Visual Tagging and Generic Camera Placement , 2007, 2007 First ACM/IEEE International Conference on Distributed Smart Cameras.

[40]  Benny Pinkas,et al.  Secure computation of the kth-ranked element , 2004 .

[41]  Ahmad-Reza Sadeghi,et al.  Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..

[42]  Donald Beaver,et al.  Precomputing Oblivious Transfer , 1995, CRYPTO.

[43]  Oded Goldreich Foundations of Cryptography: Volume 1 , 2006 .

[44]  Mauro Barni,et al.  Privacy preserving evaluation of signal quality with application to ECG analysis , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[45]  Ann Cavoukian Biometric Encryption : A Positive-Sum Technology that Achieves Strong Authentication , Security AND Privacy , 2007 .

[46]  Paulo S. L. M. Barreto,et al.  Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..

[47]  Aviel D. Rubin,et al.  Security considerations for remote electronic voting , 2002, CACM.

[48]  Noboru Babaguchi,et al.  Privacy Preserving: Hiding a Face in a Face , 2007, ACCV.

[49]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[50]  Moni Naor,et al.  Efficient oblivious transfer protocols , 2001, SODA '01.

[51]  Benny Pinkas,et al.  Secure Computation of the k th-Ranked Element , 2004, EUROCRYPT.

[52]  Dimitra I. Kaklamani,et al.  A middleware architecture for privacy protection , 2007, Comput. Networks.

[53]  Jian Zhao,et al.  Anonymous Biometric Access Control , 2009, EURASIP J. Inf. Secur..

[54]  Jian Zhao,et al.  Efficient Object-Based Video Inpainting , 2006, 2006 International Conference on Image Processing.

[55]  William Gasarch A Survey on Private Information Retrieval , 2004 .

[56]  Moni Naor,et al.  Oblivious Polynomial Evaluation , 2006, SIAM J. Comput..

[57]  Moni Naor,et al.  Communication Complexity and Secure Function Evaluation , 2001, Electron. Colloquium Comput. Complex..

[58]  Yuval Ishai,et al.  Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.

[59]  Octavian Catrina,et al.  Improved Primitives for Secure Multiparty Integer Computation , 2010, SCN.

[60]  Christos Faloutsos,et al.  FastMap: a fast algorithm for indexing, data-mining and visualization of traditional and multimedia datasets , 1995, SIGMOD '95.

[61]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[62]  Jian Zhao,et al.  Protecting and Managing Privacy Information in Video Surveillance Systems , 2009, Protecting Privacy in Video Surveillance.

[63]  Andreas Uhl,et al.  Image and Video Encryption - From Digital Rights Management to Secured Personal Communication , 2005, Advances in Information Security.

[64]  Yehuda Lindell,et al.  A Proof of Yao's Protocol for Secure Two-Party Computation , 2004, Electron. Colloquium Comput. Complex..

[65]  Ivan Damgård,et al.  Secure Distributed Linear Algebra in a Constant Number of Rounds , 2001, CRYPTO.

[66]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[67]  Ivan Damgård,et al.  Homomorphic encryption and secure comparison , 2008, Int. J. Appl. Cryptogr..

[68]  Pim Tuyls,et al.  Efficient Binary Conversion for Paillier Encrypted Values , 2006, EUROCRYPT.

[69]  Jaideep Vaidya,et al.  Knowledge and Information Systems , 2007 .

[70]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[71]  Ying Luo,et al.  Anonymous Biometric Access Control based on homomorphic encryption , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[72]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[73]  Sudeep Sarkar,et al.  Privacy & Security Issues Related to Match Scores , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[74]  Stefan Katzenbeisser,et al.  Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..

[75]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[76]  Tsuhan Chen,et al.  Investigating useful and distinguishing features around the eyelash region , 2008, 2008 37th IEEE Applied Imagery Pattern Recognition Workshop.

[77]  Moni Naor,et al.  Oblivious transfer and polynomial evaluation , 1999, STOC '99.

[78]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[79]  Ali Miri,et al.  Privacy preserving ID3 using Gini Index over horizontally partitioned data , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.

[80]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[81]  Ying Luo,et al.  Privacy information management for video surveillance , 2013, Defense, Security, and Sensing.

[82]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[83]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[84]  Ross J. Anderson,et al.  Combining cryptography with biometrics effectively , 2005 .

[85]  Yuval Ishai,et al.  Extending Oblivious Transfers Efficiently , 2003, CRYPTO.

[86]  David Zhang,et al.  A study of identical twins' palmprints for personal verification , 2006, Pattern Recognit..

[87]  Mauro Barni,et al.  Discrete cosine transform of encrypted images , 2008, 2008 15th IEEE International Conference on Image Processing.

[88]  Sen-Ching S. Cheung,et al.  Secure Multiparty Computation between Distrusted Networks Terminals , 2007, EURASIP J. Inf. Secur..

[89]  Mauro Barni,et al.  Division between encrypted integers by means of Garbled Circuits , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[90]  Jian Zhao,et al.  Optimal Camera Network Configurations for Visual Tagging , 2008, IEEE Journal of Selected Topics in Signal Processing.

[91]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[92]  Bart Goethals,et al.  On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.

[93]  Ying Luo,et al.  Efficient multi-party computation with collusion-deterred secret sharing , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[94]  Michael C. Hout,et al.  Multidimensional Scaling , 2003, Encyclopedic Dictionary of Archaeology.

[95]  J. Bourgain On lipschitz embedding of finite metric spaces in Hilbert space , 1985 .

[96]  T.E. Boult,et al.  PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).

[97]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[98]  H. Hotelling Analysis of a complex of statistical variables into principal components. , 1933 .

[99]  Mauro Barni,et al.  An efficient protocol for private iris-code matching by means of garbled circuits , 2012, 2012 19th IEEE International Conference on Image Processing.

[100]  Marc Fischlin,et al.  A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires , 2001, CT-RSA.

[101]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[102]  Touradj Ebrahimi,et al.  Scrambling for Video Surveillance with Privacy , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[103]  Vladimir Kolesnikov,et al.  Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.

[104]  Kenneth H. Rosen Elementary Number Theory , 2004 .

[105]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[106]  Rebecca N. Wright,et al.  A New Privacy-Preserving Distributed k-Clustering Algorithm , 2006, SDM.