Measuring privacy and security of iris fuzzy commitment

Template protection techniques are important supplements to biometrics, which aim to improve system security and safeguard privacy of users. Their development brings a new challenge of privacy and security assessment especially for real systems. In the paper, we take a close look at fuzzy commitment, which is an efficient and widely used template protection algorithm and demonstrates rigorous assessment of an iris fuzzy commitment scheme using the information-theoretical metrics. For instance, a 56 bit long secret can be derived from iris codes. Instead of iris codes, its hash value is stored. However, due to the dependency of iris codes, the uncertainty of secrets reduces to 11.82 bits given protected templates. It confirms the empirical results that an adversary is able to retrieve the iris features from the protected templates with average number of attempts equal to 210.56 as shown in [1]. The poor security and privacy performance is caused by strong correlation of iris feature and unsuitable coding methods used in the algorithm. The quantitative measurement shown in this paper provides a reference guidance on evaluation of template protection in practice. It helps algorithm developers to show the security and privacy of template protection to end-users and to detect the weaknesses of the algorithms.

[1]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[2]  David Zhang,et al.  An Analysis on Invertibility of Cancelable Biometrics based on BioHashing , 2005, CISST.

[3]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[4]  Libor Masek,et al.  MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .

[5]  Anton H. M. Akkermans,et al.  Face biometrics with renewable templates , 2006, Electronic Imaging.

[6]  Anthony Vetro CHAPTER 11 – Securing Biometric Data , 2009 .

[7]  Koen Simoens,et al.  A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[8]  Tanya Ignatenko,et al.  Secret-Key Rates and Privacy Leakage in Biometric Systems , 2007 .

[9]  Pim Tuyls,et al.  Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.

[10]  Xuebing Zhou,et al.  Privacy and Security Assessment of Biometric Template Protection , 2012, it Inf. Technol..

[11]  Daniel Willem Elisabeth Schobben,et al.  Privacy-protected biometric templates: acoustic ear identification , 2004, SPIE Defense + Commercial Sensing.

[12]  Ahmad Hussein SECURING BIOMETRIC DATA , 2010 .

[13]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption: enrollment and verification procedures , 1998, Defense + Commercial Sensing.

[14]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[15]  Arjan Kuijper,et al.  Quantifying privacy and security of biometric fuzzy commitment , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[16]  Gérard D. Cohen,et al.  Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[17]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[18]  Ross J. Anderson,et al.  Combining cryptography with biometrics effectively , 2005 .

[19]  Christoph Busch,et al.  Privacy enhancing technology for a 3D-face recognition system , 2007, BIOSIG.

[20]  Pieter H. Hartel,et al.  Embedding Renewable Cryptographic Keys into Continuous Noisy Data , 2008, ICICS.

[21]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..