An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption

In order to provide protection for biometric features in palmprint authentication, we propose a palmprint authentication scheme suitable for personal environments with privacy-preserving trait using the ElGamal encryption scheme which is mulplicatively homomorphic. To achieve faster running speed, we use binary vectors to represent palmprint features and use Hamming distance to indicate the similarity of different feature vectors. We give security and performance analysis, and use Matlab to implement some key modules of the proposed scheme. Theoretical analysis and experimental results show that the proposed scheme achieves confidential computations of palmprint feature vectors. The recognition accuracy can meet practical requirements and the overall performance transcends existing relative schemes.

[1]  Dario Fiore,et al.  Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data , 2015, CCS.

[2]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[3]  Marina Blanton,et al.  Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.

[4]  K. Srinathan,et al.  Blind Authentication: A Secure Crypto-Biometric Verification Protocol , 2010, IEEE Transactions on Information Forensics and Security.

[5]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[6]  Dimitris Achlioptas,et al.  Database-friendly random projections: Johnson-Lindenstrauss with binary coins , 2003, J. Comput. Syst. Sci..

[7]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[8]  Xiaojiang Du,et al.  Self-healing sensor networks with distributed decision making , 2007, Int. J. Sens. Networks.

[9]  Mun-Kyu Lee,et al.  Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[10]  Andrew Beng Jin Teoh,et al.  An automated palmprint recognition system , 2005, Image Vis. Comput..

[11]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[12]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[13]  Xiaojiang Du,et al.  A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.

[14]  Heikki Mannila,et al.  Random projection in dimensionality reduction: applications to image and text data , 2001, KDD '01.

[15]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[16]  Berry Schoenmakers,et al.  Computationally Secure Authentication with Noisy Data , 2007 .

[17]  Honggang Zhang,et al.  Comments on "Globally Maximizing, Locally Minimizing: Unsupervised Discriminant Projection with Application to Face and Palm Biometrics" , 2007, IEEE Trans. Pattern Anal. Mach. Intell..

[18]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[19]  Wang-Meng Zuo,et al.  Survey of Palmprint Recognition Algorithms: Survey of Palmprint Recognition Algorithms , 2010 .

[20]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.