Optimal sequential fusion for multibiometric cryptosystems

We propose a general framework for feature level sequential fusion.We propose an optimal algorithm for feature level sequential fusion.The proposed algorithm does not output scores but appropriately sets a threshold.We prove that the proposed algorithm is optimal by showing its equivalence to SPRT.We show the effectiveness of the proposed algorithm through experiments. Biometric cryptosystems have been widely studied in the literature to protect biometric templates. To ensure sufficient security of the biometric cryptosystem against the offline brute-force attack (also called the FAR attack), it is critical to reduce FAR of the system. One of the most effective approaches to improve the accuracy is multibiometric fusion, which can be divided into three categories: feature level fusion, score level fusion, and decision level fusion. Among them, only feature level fusion can be applied to the biometric cryptosystem for security and accuracy reasons. Conventional feature level fusion schemes, however, require a user to input all of the enrolled biometric samples at each time of authentication, and make the system inconvenient.In this paper, we first propose a general framework for feature level sequential fusion, which combines biometric features and makes a decision each time a user inputs a biometric sample. We then propose a feature level sequential fusion algorithm that can minimize the average number of input, and prove its optimality theoretically. We apply the proposed scheme to the fuzzy commitment scheme, and demonstrate its effectiveness through experiments using the finger-vein dataset that contains six fingers from 505 subjects. We also analyze the security of the proposed scheme against various attacks: attacks that exploit the relationship between multiple protected templates, the soft-decoding attack, the statistical attack, and the decodability attack.

[1]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[2]  Tom A. M. Kevenaar,et al.  Multi-modal and multi-instance fusion for biometric cryptosystems , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[3]  M J Sold,et al.  If nothing goes wrong—is everything alright? , 1987, Anaesthesia.

[4]  Chris J. Hill,et al.  Risk of Masquerade Arising from the Storage of Biometrics , 2001 .

[5]  Ching Y. Suen,et al.  Application of majority voting to pattern recognition: an analysis of its behavior and performance , 1997, IEEE Trans. Syst. Man Cybern. Part A.

[6]  Raymond N. J. Veldhuis,et al.  Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.

[7]  Arun Ross,et al.  Fusion in Multibiometric Identification Systems: What about the Missing Data? , 2009, ICB.

[8]  A. Stoianov,et al.  Security issues of Biometric Encryption , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[9]  Naoto Miura,et al.  Feature Extraction of Finger-vein Patterns Based on Repeated Line Tracking and Its Application to Personal Identification , 2022 .

[10]  Yilong Yin,et al.  SDUMLA-HMT: A Multimodal Biometric Database , 2011, CCBR.

[11]  Anil K. Jain,et al.  Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.

[12]  Ajay Kumar,et al.  Human Identification Using Finger Images , 2012, IEEE Transactions on Image Processing.

[13]  Benjamin Tams,et al.  Decodability Attack against the Fuzzy Commitment Scheme with Public Feature Transforms , 2014, ArXiv.

[14]  Andreas Uhl,et al.  Reliability-balanced feature level fusion for fuzzy commitment scheme , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[15]  Gian Luca Marcialis,et al.  Serial Fusion of Fingerprint and Face Matchers , 2007, MCS.

[16]  C. Rathgeb,et al.  Statistical attack against fuzzy commitment scheme , 2012, IET Biom..

[17]  Evangelos Eleftheriou,et al.  On the computation of the minimum distance of low-density parity-check codes , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[18]  Jiri Matas,et al.  On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[19]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[20]  J A Hanley,et al.  If nothing goes wrong, is everything all right? Interpreting zero numerators. , 1983, JAMA.

[21]  Yong Wang,et al.  ISAR Imaging of Rotating Target with Equal Changing Acceleration Based on the Cubic Phase Function , 2008, EURASIP J. Adv. Signal Process..

[22]  Suela Kodra Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .

[23]  Alex Stoianov,et al.  Security of Error Correcting Code for biometric Encryption , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[24]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[25]  A. Ross,et al.  Level Fusion Using Hand and Face Biometrics , 2005 .

[26]  W. W. Peterson,et al.  Error-Correcting Codes. , 1962 .

[27]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[28]  Venugopal V. Veeravalli,et al.  Multihypothesis sequential probability ratio tests - Part I: Asymptotic optimality , 1999, IEEE Trans. Inf. Theory.

[29]  C. Busch,et al.  Multi-algorithm fusion with template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[30]  T. Lai Asymptotic Optimality of Invariant Sequential Probability Ratio Tests , 1981 .

[31]  David J. C. MacKay,et al.  Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.

[32]  Arun Ross,et al.  Feature level fusion of hand and face biometrics , 2005, SPIE Defense + Commercial Sensing.

[33]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[34]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[35]  Kenta Takahashi,et al.  Accuracy improvement with high convenience in biometric identification using multihypothesis sequential probability ratio test , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[36]  Kenta Takahashi,et al.  A secure and user-friendly multimodal biometric system , 2004, SPIE Defense + Commercial Sensing.

[37]  Takashi Yanagawa,et al.  Kyushu University Institutional Repository DIVERSITY OF HUMAN FINGER VEIN PATTERNS AND ITS APPLICATION TO PERSONAL IDENTIFICATION , 2022 .

[38]  E. Mayoraz,et al.  Fusion of face and speech data for person identity verification , 1999, IEEE Trans. Neural Networks.

[39]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.