Secure Chaff-less Fuzzy Vault for Face Identification Systems

Biometric cryptosystems such as fuzzy vaults represent one of the most popular approaches for secret and biometric template protection. However, they are solely designed for biometric verification, where the user is required to input both identity credentials and biometrics. Several practical questions related to the implementation of biometric cryptosystems remain open, especially in regard to biometric template protection. In this article, we propose a face cryptosystem for identification (FCI) in which only biometric input is needed. Our FCI is composed of a one-to-N search subsystem for template protection and a one-to-one match chaff-less fuzzy vault (CFV) subsystem for secret protection. The first subsystem stores N facial features, which are protected by index-of-maximum (IoM) hashing, enhanced by a fusion module for search accuracy. When a face image of the user is presented, the subsystem returns the top k matching scores and activates the corresponding vaults in the CFV subsystem. Then, one-to-one matching is applied to the k vaults based on the probe face, and the identifier or secret associated with the user is retrieved from the correct matched vault. We demonstrate that coupling between the IoM hashing and the CFV resolves several practical issues related to fuzzy vault schemes. The FCI system is evaluated on three large-scale public unconstrained face datasets (LFW, VGG2, and IJB-C) in terms of its accuracy, computation cost, template protection criteria, and security.

[1]  Carlisle M. Adams,et al.  Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents , 2016, Recent Advances in Computational Intelligence in Defense and Security.

[2]  Anil K. Jain,et al.  IARPA Janus Benchmark - C: Face Dataset and Protocol , 2018, 2018 International Conference on Biometrics (ICB).

[3]  Jiankun Hu,et al.  A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures , 2016, IEEE Transactions on Information Forensics and Security.

[4]  Yevgeniy Dodis,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.

[5]  John Daugman,et al.  Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.

[6]  Dae-Jong Lee,et al.  Real Fuzzy Vault for Protecting Face Template , 2013 .

[7]  Yongjin Wang,et al.  Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.

[8]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[9]  Zhe Jin,et al.  Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing , 2017, IEEE Transactions on Information Forensics and Security.

[10]  Jian Cheng,et al.  NormFace: L2 Hypersphere Embedding for Face Verification , 2017, ACM Multimedia.

[11]  James Philbin,et al.  FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[12]  David Chaum,et al.  Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..

[13]  Lifang Wu,et al.  A Face Based Fuzzy Vault Scheme for Secure Online Authentication , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.

[14]  Anil K. Jain,et al.  Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.

[15]  Tancrède Lepoint,et al.  SNUSE: A secure computation approach for large-scale user re-enrollment in biometric authentication systems , 2019, Future Gener. Comput. Syst..

[16]  Shengcai Liao,et al.  Learning Face Representation from Scratch , 2014, ArXiv.

[17]  Haiping Lu,et al.  Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.

[18]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[19]  Yu Qiao,et al.  Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks , 2016, IEEE Signal Processing Letters.

[20]  Neil A. Macmillan,et al.  Detection Theory , 2021 .

[21]  Jung Yeon Hwang,et al.  Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem for Vectorial Biometrics , 2018, IEEE Transactions on Dependable and Secure Computing.

[22]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[23]  KyungHee Lee,et al.  Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features , 2007, HCI.

[24]  Ann Cavoukian,et al.  Advances in Biometric Encryption: Taking Privacy by Design from Academic Research to Deployment , 2012 .

[25]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[26]  Venkatesan Guruswami,et al.  List decoding of error correcting codes , 2001 .

[27]  Jiankun Hu,et al.  A survey: Error control methods used in bio-cryptography , 2014, 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).

[28]  Yuxiao Hu,et al.  MS-Celeb-1M: A Dataset and Benchmark for Large-Scale Face Recognition , 2016, ECCV.

[29]  Neil A. Macmillan,et al.  Detection Theory: A User's Guide , 1991 .

[30]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[31]  Andrew Beng Jin Teoh,et al.  A secure biometric discretization scheme for face template protection , 2012, Future Gener. Comput. Syst..

[32]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.

[33]  Margarita Osadchy,et al.  It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary Strings , 2019, IEEE Transactions on Dependable and Secure Computing.

[34]  Omkar M. Parkhi,et al.  VGGFace2: A Dataset for Recognising Faces across Pose and Age , 2017, 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018).

[35]  Khalil El-Khatib,et al.  A Privacy Enhanced Facial Recognition Access Control System Using Biometric Encryption , 2017, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS).

[36]  Jiankun Hu,et al.  FE-SViT , 2016, ACM Trans. Embed. Comput. Syst..

[37]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[38]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[39]  Carlos D. Castillo,et al.  Fuzzy Vault , 2009, Encyclopedia of Biometrics.

[40]  Stefanos Zafeiriou,et al.  ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[41]  Marwan Mattar,et al.  Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .

[42]  Jiankun Hu,et al.  A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement , 2014, IEEE Transactions on Information Forensics and Security.

[43]  Anton H. M. Akkermans,et al.  Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[44]  Axel Munk,et al.  The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.

[45]  Muhammad N. Marsono,et al.  Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm , 2013, Future Gener. Comput. Syst..

[46]  Lei Zhang,et al.  TypicFace: Dynamic Margin Cosine Loss for Deep Face Recognition , 2018, PRICAI.

[47]  Andrew Beng Jin Teoh,et al.  Biometric Feature-Type Transformation: Making templates compatible for secret protection , 2015, IEEE Signal Processing Magazine.

[48]  Shengcai Liao,et al.  A benchmark study of large-scale unconstrained face recognition , 2014, IEEE International Joint Conference on Biometrics.

[49]  Peng Li,et al.  An alignment-free fingerprint cryptosystem based on fuzzy vault scheme , 2010, J. Netw. Comput. Appl..

[50]  Christoph Busch,et al.  Fuzzy Vault for 3D Face Recognition Systems , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[51]  Zhe Jin,et al.  A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems , 2018, Inf. Sci..

[52]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[53]  Andreas Uhl,et al.  Statistical attack against iris-biometric fuzzy commitment schemes , 2011, CVPR 2011 WORKSHOPS.

[54]  Heinrich Ihmor,et al.  Performance of the Fuzzy Vault for Multiple Fingerprints , 2010, BIOSIG.

[55]  Anil K. Jain,et al.  Face Search at Scale , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.