On the Reliability of Cancelable Biometrics: Revisit the Irreversibility

Over the years, many biometric template protection schemes, primarily based on the notion of "cancelable biometrics" have been proposed. A cancelable biometric algorithm needs to satisfy four biometric template protection criteria, i.e., irreversibility, revocability, unlinkability, and performance preservation. However, a systematic analysis of irreversibility has been often neglected. In this paper, the common distance correlation characteristic of cancelable biometrics is analyzed. Next, a similarity-based attack is formulated to break the irreversibility of cancelable biometric under the Kerckhoffs's assumption where the cancelable biometrics algorithm and parameter are known to the attackers. The irreversibility based on the mutual information is also redefined, and a framework to measure the information leakage from the distance correlation characteristic is proposed. The results achieved on face, iris, and fingerprint prove that it is theoretically hard to meet full irreversibility. To have a good biometric system, a balance has to be achieved between accuracy and security.

[1]  Pong C. Yuen,et al.  Masquerade attack on transform-based binary-template protection based on perceptron learning , 2014, Pattern Recognit..

[2]  Nalini K. Ratha,et al.  Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[3]  Christophe Rosenberger,et al.  Preimage attack on BioHashing , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[4]  John Daugman,et al.  Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.

[5]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Davide Maltoni,et al.  Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[7]  Richard E. Blahut,et al.  Computation of channel capacity and rate-distortion functions , 1972, IEEE Trans. Inf. Theory.

[8]  Christos Dimitrakakis,et al.  On the Leakage of Information in Biometric Authentication , 2014, INDOCRYPT.

[9]  Zhe Jin,et al.  A Cancellable Face Template Scheme Based on Nonlinear Multi-Dimension Spectral Hashing , 2019, 2019 7th International Workshop on Biometrics and Forensics (IWBF).

[10]  Davide Maltoni,et al.  A two-factor protection scheme for MCC fingerprint templates , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[11]  Rama Chellappa,et al.  Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.

[12]  Masakazu Fujio,et al.  Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification , 2019, IEEE Access.

[13]  Zhe Jin,et al.  Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Pong C. Yuen,et al.  Vulnerabilities in binary face template , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[15]  Libor Masek,et al.  MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .

[16]  Kiyoung Moon,et al.  Inverse operation and preimage attack on BioHashing , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.

[17]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[18]  Kenta Takahashi,et al.  Parameter management schemes for cancelable biometrics , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[19]  Stefanos Zafeiriou,et al.  ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[20]  Takashi Ito,et al.  Provably-Secure Cancelable Biometrics Using 2-DNF Evaluation , 2012, J. Inf. Process..

[21]  Munaga V. N. K. Prasad,et al.  Biometric Template Protection: A Systematic Literature Review of Approaches and Modalities , 2017 .

[22]  Guoqiang Han,et al.  Deep Secure Quantization: On secure biometric hashing against similarity-based attacks , 2019, Signal Process..

[23]  Marwan Mattar,et al.  Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .

[24]  Zhe Jin,et al.  A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics , 2019, 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[25]  Anil K. Jain,et al.  Fingerprint Reconstruction: From Minutiae to Phase , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[26]  Zhe Jin,et al.  A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template , 2014, Pattern Recognit. Lett..

[27]  Geoffrey Smith,et al.  On the Foundations of Quantitative Information Flow , 2009, FoSSaCS.

[28]  K. Kanagalakshmi,et al.  Cancelable biometric template generation and protection schemes: A review , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[29]  Christoph Busch,et al.  Alignment-free cancelable iris biometric templates based on adaptive bloom filters , 2013, 2013 International Conference on Biometrics (ICB).

[30]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.

[31]  Davide Maltoni,et al.  Noninvertible Minutia Cylinder-Code Representation , 2012, IEEE Transactions on Information Forensics and Security.

[32]  Yumi Sakemi,et al.  A Spoofing Attack against a Cancelable Biometric Authentication Scheme , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[33]  Suguru Arimoto,et al.  An algorithm for computing the capacity of arbitrary discrete memoryless channels , 1972, IEEE Trans. Inf. Theory.

[34]  Marta Gomez-Barrero,et al.  General Framework to Evaluate Unlinkability in Biometric Template Protection Systems , 2018, IEEE Transactions on Information Forensics and Security.

[35]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[36]  J. Wade Davis,et al.  Statistical Pattern Recognition , 2003, Technometrics.