Iris Template Protection using Discrete Logarithm

Biometric authentication systems gained a huge public attention when compared to password authentication systems due to its direct connection with user identity. As Biometrics cannot be revoked or cancelled, several security and privacy issues will come if biometric templates are directly store into the database. To overcome this, there is a need to protect the biometric templates by applying transformations and at the same time accuracy won't be compromised. The transformed template is called cancellable template and it must satisfies all the requirements of Biometric Template Protection Schemes (BTPS) i.e., Diversity, unlinkability, accuracy, noninvertibility. The proposed method focused on generating cancellable iris templates by using discrete logarithm. By applying 1-D log Gabor filter on the iris images, iris codes were generated. Later a row vector is formed by appending next row to the previous one. Then the row vector is partitioned and converted into decimal vector. To achieve security or noninvertibility decimal vector is subjected to discrete logarithm over a prime field. To confirm the accuracy of the proposed approach, experiments are performed on CASIA-V 1.0 & CASIA-V3-Interval and achieved EER as 0.57% & 0.79%. Although the EER seems somewhat high, proposed approach is efficient in terms of security and noninvertible perspectives.

[1]  Aditya Prasad,et al.  A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping , 2017, Comput. Secur..

[2]  Loris Nanni,et al.  Biohashing applied to orientation-based minutia descriptor for secure fingerprint authentication system , 2011 .

[3]  Zhe Jin,et al.  Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing , 2017, IEEE Transactions on Information Forensics and Security.

[4]  David Zhang,et al.  A Novel Cryptosystem Based on Iris Key Generation , 2008, 2008 Fourth International Conference on Natural Computation.

[5]  Andreas Uhl,et al.  Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.

[6]  Arun Ross,et al.  Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms , 2013, Comput. Vis. Image Underst..

[7]  Sharath Pankanti,et al.  Biometrics: Personal Identification in Networked Society , 2013 .

[8]  Suela Kodra Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .

[9]  Norimichi Tsumura,et al.  Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes , 2010, 2010 20th International Conference on Pattern Recognition.

[10]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[11]  Yen-Lung Lai,et al.  Cancellable iris template generation based on Indexing-First-One hashing , 2017, Pattern Recognit..

[12]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  Marios Savvides,et al.  How to Generate Spoofed Irises From an Iris Code Template , 2011, IEEE Transactions on Information Forensics and Security.

[14]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[15]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[16]  Andreas Uhl,et al.  Cancelable iris-templates using key-dependent wavelet transforms , 2013, 2013 International Conference on Biometrics (ICB).

[17]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[18]  Gérard D. Cohen,et al.  Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.

[19]  Kai Yang,et al.  Key Incorporation Scheme for Cancelable Biometrics , 2011, J. Information Security.

[20]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[21]  Norimichi Tsumura,et al.  Securing BioEncoded IrisCodes against Correlation Attacks , 2011, 2011 IEEE International Conference on Communications (ICC).

[22]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[23]  Zhe Jin,et al.  A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template , 2014, Secur. Commun. Networks.

[24]  Christoph Busch,et al.  Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters , 2014, Comput. Secur..

[25]  Rama Chellappa,et al.  Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[26]  Christoph Busch,et al.  Alignment-free cancelable iris biometric templates based on adaptive bloom filters , 2013, 2013 International Conference on Biometrics (ICB).

[27]  Nalini K. Ratha,et al.  Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.

[28]  Libor Masek,et al.  Recognition of Human Iris Patterns for Biometric Identification , 2003 .

[29]  John Daugman,et al.  Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.