Biometric Encryption: Creating a Privacy-Preserving 'Watch-List' Facial Recognition System

This paper presents the proof of concept of a facial recognition (FR) system combined with Biometric Encryption (BE) in a watch-list scenario. The system was successfully deployed for Ontario Lottery and Gaming Corporation (OLG) self-exclusion (SE) program. The system is hybrid in nature and comprises a commercial facial recognition module with anonymous templates sequentially combined with a BE module. BE is used to conceal the relationship between a self-excluded person’s FR template and their other personal information (PI). To reveal the corresponding PI record for a matched FR record, BE will attempt to release the pointer key. The FR templates and BE helper data use different biometric feature vectors to prevent interoperability between two modules. In case of a positive match, the final decision is made by a human operator. The BE scheme is based on improved Quantization Index Modulation (QIM) method. It is shown that, unlike other BE schemes, QIM offers a curve of operating points, thus allowing optimal tuning of the entire system. The simulations were performed on a subset of the CMU PIE face image database and then on the actual live test database involving OLG control group participants (simulating the self-excluded persons) and the general public. The maximum Correct Identification Rate was 91 % without BE and 90 % with BE, while FAR (before manual inspection) was of the order of 1 % (depending on the SE database size) without BE and by 30 % to 50 % lower with BE. This system, which we consider an example of Privacy by Design approach, was shown to enhance patron privacy (both for those on the watch list, and regular patrons), system security, and overall accuracy of the watch list system within the context of the OLG self-exclusion program.

[1]  Pieter H. Hartel,et al.  Constructing practical Fuzzy Extractors using QIM , 2007 .

[2]  Xingzhao Liu,et al.  Nonlinear Frequency Scaling Algorithm for High Squint Spotlight SAR Data Processing , 2008, EURASIP J. Adv. Signal Process..

[3]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[4]  George W. Quinn,et al.  Report on the Evaluation of 2D Still-Image Face Recognition Algorithms , 2011 .

[5]  Haiping Lu,et al.  Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications , 2010, IEEE Transactions on Information Forensics and Security.

[6]  Gregory W. Wornell,et al.  Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia , 2001, J. VLSI Signal Process..

[7]  Alex Pentland,et al.  Face recognition using eigenfaces , 1991, Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[8]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[9]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[10]  Anil K. Jain,et al.  Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[11]  Terence Sim,et al.  The CMU Pose, Illumination, and Expression Database , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[12]  V. Bruce,et al.  Recognition of unfamiliar faces , 2000, Trends in Cognitive Sciences.

[13]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[14]  Terrance E. Boult,et al.  Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[15]  Richard Youmaran,et al.  Towards a Measure of Biometric Information , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[16]  Andrew Beng Jin Teoh,et al.  Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[17]  Anton H. M. Akkermans,et al.  Face biometrics with renewable templates , 2006, Electronic Imaging.

[18]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[19]  Alex Stoianov,et al.  Chapter 26. Biometric Encryption: The New Breed of Untraceable Biometrics , 2009 .

[20]  Boris Skoric,et al.  Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .

[21]  Yong Wang,et al.  ISAR Imaging of Rotating Target with Equal Changing Acceleration Based on the Cubic Phase Function , 2008, EURASIP J. Adv. Signal Process..

[22]  Alice J. O'Toole,et al.  FRVT 2006 and ICE 2006 large-scale results , 2007 .

[23]  Lynette I. Millett,et al.  Biometric Recognition: Challenges and Opportunities , 2010 .

[24]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[25]  R.N.J. Veldhuis,et al.  Multi-Bits Biometric String Generation based on the Likelihood Ratio , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[26]  Raymond N. J. Veldhuis,et al.  Pseudo Identities Based on Fingerprint Characteristics , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[27]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[28]  Julien Bringer,et al.  Biometric Identification over Encrypted Data Made Feasible , 2009, ICISS.

[29]  Haiping Lu,et al.  A Biometric Encryption System for the Self-Exclusion Scenario of Face Recognition , 2009, IEEE Systems Journal.

[30]  Thomas B. Moeslund,et al.  Long-Term Occupancy Analysis Using Graph-Based Optimisation in Thermal Imagery , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.