Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A biometric cryptosystem scheme based on random projection and neural network

Published: 01 June 2021 Publication History

Abstract

Several biometric cryptosystem techniques have been proposed to protect biometric templates and preserve users’ privacy. Although such techniques can thwart different attacks, it is difficult to achieve well non-linkability between biometric cryptosystems. In this paper, we propose a novel biometric cryptosystem scheme based on random projection (RP) and back propagation neural network (BPNN) to perform the task of biometric template protection. With the help of RP, an original biometric feature vector can be projected onto a fix-length feature vector of random subspace that is derived from a user-specific projection matrix. This process is revocable and produces unlinkable biometric templates. The proposed scheme further utilizes a BPNN model to bind a projected feature vector with a random key. Based on BPNN, a robust mapping between a projected feature vector and a random key is learned to generate an error-correction-based biometric cryptosystem. The security of the proposed scheme is analyzed and the experimental results on multiple biometric datasets show the feasibility and efficiency of the proposed scheme.

References

[1]
Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, and Gupta B Impact of digital fingerprint image quality on the fingerprint recognition accuracy Multimed Tools Appl 2019 78 3 3649-3688
[2]
Bingham E, Mannila H (2001) Random projection in dimensionality reduction: applications to image and text data. In: Proceedings of the seventh ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’01. New York, NY, USA, pp 245–250. ACM
[3]
Bose R and Ray-Chaudhuri D On a class of error correcting binary group codes Inf Control 1960 3 1 68-79
[4]
Collection of facial images: Faces94 (2021). https://cmp.felk.cvut.cz/~spacelib/faces/faces94.html. Accessed 23 Mar 2021
[5]
Dodis Y, Ostrovsky R, Reyzin L, and Smith A Fuzzy extractors: how to generate strong keys from biometrics and other noisy data SIAM J Comput 2008 38 1 97-139
[6]
Esposito C, Ficco M, Gupta BB (2021) Blockchain-based authentication and authorization for smart city applications. Inf Process Manage 58(2):102468
[7]
Feng YC, Yuen PC, and Jain AK A hybrid approach for generating secure and discriminating face template IEEE Trans Inf Forensics Secur 2010 5 1 103-117
[8]
Figueiredo MAT and Jain AK Unsupervised learning of finite mixture models IEEE Trans Pattern Anal Mach Intell 2002 24 3 381-396
[9]
Gad R, Talha M, Abd El-Latif AA, Zorkany M, Ayman ES, Nawal EF, and Muhammad G Iris recognition using multi-algorithmic approaches for cognitive internet of things (ciot) framework Future Gener Comput Syst 2018 89 178-191
[10]
General Data Protection Regulation (2016). https://ec.europa.eu/info/law/law-topic/data-protection_en. Accessed 23 Mar 2021
[11]
Gomez-Barrero M, Rathgeb C, Galbally J, Busch C, and Fierrez J Unlinkable and irreversible biometric template protection based on bloom filters Inf Sci 2016 370 C 18-32
[12]
Hermans J, Peeters R, Mennink B (2014) Shattering the glass maze. In: 2014 International conference of the biometrics special interest group (BIOSIG), pp 1–6
[13]
ISO/IEC19795-1: biometric performance testing and reporting: principles and framework. International Organization for Standardization (2011)
[14]
ISO/IEC24745:2011: information technology-security techniques-biometric information protection. International Organization for Standardization (2011)
[15]
Jain AK and Maltoni D Handbook of fingerprint recognition 2003 New York Springer
[16]
Jain AK, Prabhakar S, Hong L, and Pankanti S Filterbank-based fingerprint matching Trans. Img. Proc. 2000 9 5 846-859
[17]
Jain A, Nandakumar K, and Nagar A Biometric template security EURASIP J Adv Signal Process 2008 1 579416
[18]
Jin ATB (2006) Cancellable biometrics and multispace random projections. In: 2006 Conference on computer vision and pattern recognition workshop (CVPRW’06), p 164
[19]
Jin ATB, Ling DNC, and Goh A Biohashing: two factor authentication featuring fingerprint data and tokenised random number Pattern Recognit 2004 37 11 2245-2255
[20]
Juels A and Sudan M A fuzzy vault scheme Des Codes Cryptogr 2006 38 2 237-257
[21]
Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on computer and communications security, CCS ’99. ACM, New York, NY, USA, pp 28–36
[22]
Kaski S (1998) Dimensionality reduction by random mapping: fast similarity computation for clustering. In: 1998 IEEE international joint conference on neural networks proceedings. IEEE world congress on computational intelligence, vol 1, pp 413–418
[23]
Kaushik S and Gandhi C Ensure hierarchal identity based data security in cloud environment Int J Cloud Appl Comput (IJCAC) 2019 9 4 21-36
[24]
Kelkboom EJC, Breebaart J, Kevenaar TAM, Buhan I, and Veldhuis RNJ Preventing the decodability attack based cross-matching in a fuzzy commitment scheme IEEE Trans Inf Forensics Secur 2011 6 1 107-121
[25]
Kullback S and Leibler RA On information and sufficiency Ann Math Stat 1951 22 1 79-86
[26]
Lee Y, Chung Y, Moon K (2009) Inverse operation and preimage attack on biohashing. In: 2009 IEEE workshop on computational intelligence in biometrics: theory, algorithms, and applications, pp 92–97
[27]
Li JQ, Barron AR (1999) Mixture density estimation. In: Advances in neural information processing systems 12. MIT Press, pp 279–285
[28]
Li SZ and Jain A Encyclopedia of biometrics 2015 Berlin Springer
[29]
Li J, Cheng Jh, Shi Jy, Huang F (2012) Brief introduction of back propagation (BP) neural network algorithm and its improvement. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 553–558
[30]
Li D, Deng L, Gupta BB, Wang H, and Choi C A novel cnn based security guaranteed image watermarking generation scenario for smart city applications Inf Sci 2019 479 432-447
[31]
Martiri E, Gomez-Barrero M, Yang B, and Busch C Biometric template protection based on bloom filters and honey templates IET Biomet 2017 6 1 19-26
[32]
Nandakumar K and Jain AK Biometric template protection: bridging the performance gap between theory and practice IEEE Signal Process Mag 2015 32 5 88-100
[33]
Olakanmi OO and Dada A An efficient privacy-preserving approach for secure verifiable outsourced computing on untrusted platforms Int J Cloud Appl Comput (IJCAC) 2019 9 2 79-98
[34]
Ouda O, Tsumura N, Nakaguchi T (2010) Tokenless cancelable biometrics scheme for protecting iris codes. In: 2010 20th international conference on pattern recognition, pp 882–885
[35]
Patel VM, Ratha NK, and Chellappa R Cancelable biometrics: a review IEEE Signal Process Mag 2015 32 5 54-65
[36]
Peng J, Yang B (2017) A novel binarization scheme for real-valued biometric feature. In: 2017 IEEE 41st annual computer software and applications conference (COMPSAC), vol 2. IEEE, pp 724–729
[37]
Peng J, Li Q, El-Latif AAA, Wang N, and Niu X Finger vein recognition with Gabor wavelets and local binary patterns IEICE Trans. Inf. Syst 2013 E96—-D(8) 1886-1889
[38]
Peng J, Li Q, Abd El-Latif AA, and Niu X Finger multibiometric cryptosystems: fusion strategy and template security J Electron Imaging 2014 23 2 023001
[39]
Rane S, Wang Y, Draper SC, and Ishwar P Secure biometrics: concepts, authentication architectures, and challenges IEEE Signal Process Mag 2013 30 5 51-64
[40]
Ratha NK, Connell JH, and Bolle RM Enhancing security and privacy in biometrics-based authentication systems IBM Syst J 2001 40 3 614-634
[41]
Ratha NK, Chikkerur S, Connell JH, and Bolle RM Generating cancelable fingerprint templates IEEE Trans Pattern Anal Mach Intell 2007 29 4 561-572
[42]
Rathgeb C and Uhl A A survey on biometric cryptosystems and cancelable biometrics EURASIP J Inf Secur 2011 1 3
[43]
Sarkar A and Singh BK A review on performance, security and various biometric template protection schemes for biometric authentication systems Multimed Tools Appl 2020 79 37 27721-27776
[44]
Securid (2021). https://en.wikipedia.org/wiki/RSA_SecurID. Accessed 23 Mar 2021
[45]
Talreja V, Valenti MC, and Nasrabadi NM Deep hashing for secure multimodal biometrics IEEE Trans Inf Forensics Secur 2020 16 1306-1321
[46]
Tarek M, Ouda O, and Hamza T Robust cancellable biometrics scheme based on neural networks IET Biomet 2016 5 3 220-228
[47]
Teoh ABJ and Yuang CT Cancelable biometrics realization with multispace random projections IEEE Trans Syst Man Cybern Part B (Cybernetics) 2007 37 5 1096-1106
[48]
The Hong Kong polytechnic university finger image database version 1.0 (2010). http://www4.comp.polyu.edu.hk/~csajaykr/fvdatabase.htm. Accessed 23 Mar 2021
[49]
Viulib (2021). https://www.viulib.org/index.html. Accessed date: 23 Mar 2021
[50]
Wang Y and Plataniotis KN An analysis of random projection for changeable and privacy-preserving biometric verification IEEE Trans Syst Man Cybern Part B (Cybern) 2010 40 5 1280-1293
[51]
Wang N, Li Q, Abd El-Latif AA, Peng J, Niu X (2014a) An enhanced thermal face recognition method based on multiscale complex fusion for Gabor coefficients. Multimed Tools Appl 72(3):2339–2358
[52]
Wang N, Li Q, Abd El-Latif AA, Zhang T, Niu X (2014b) Toward accurate localization and high recognition performance for noisy iris images. Multimed Tools Appl 71(3):1411–1430
[53]
Wang H, Li Z, Li Y, Gupta B, and Choi C Visual saliency guided complex image retrieval Pattern Recognit Lett 2020 130 64-72
[54]
Yang B, Hartung D, Simoens K, Busch C (2010) Dynamic random projection for biometric template protection. In: 2010 Fourth IEEE international conference on biometrics: theory, applications and systems (BTAS), pp. 1–7
[55]
Yu C, Li J, Li X, Ren X, and Gupta BB Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram Multimed Tools Appl 2018 77 4 4585-4608
[56]
Zuo J, Ratha NK, Connell JH (2008) Cancelable iris biometric. In: 2008 19th International conference on pattern recognition, pp 1–4

Cited By

View all
  • (2024)Industrial technology network security measurement in international trade under discrete hopfield neural networkJournal of Computational Methods in Sciences and Engineering10.3233/JCM-23712824:2(657-674)Online publication date: 1-Jan-2024
  • (2023)Biometric cryptosystems: a comprehensive surveyMultimedia Tools and Applications10.1007/s11042-022-13817-982:11(16635-16690)Online publication date: 1-May-2023
  • (2022)A multi-spectral palmprint fuzzy commitment based on deep hashing code with discriminative bit selectionArtificial Intelligence Review10.1007/s10462-022-10334-x56:7(6169-6186)Online publication date: 21-Nov-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Soft Computing - A Fusion of Foundations, Methodologies and Applications
Soft Computing - A Fusion of Foundations, Methodologies and Applications  Volume 25, Issue 11
Jun 2021
447 pages
ISSN:1432-7643
EISSN:1433-7479
Issue’s Table of Contents

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 June 2021
Accepted: 02 March 2021

Author Tags

  1. Biometric template protection
  2. Biometric cryptosystem
  3. Random projection
  4. Back propagation neural network

Qualifiers

  • Research-article

Funding Sources

  • Heilongjiang Provincial Natural Science Foundation of China (Grant No.LH2020F044),the 2019 “Chunhui Plan” Cooperative Scientific Research Project of Ministry of Education of China
  • Fundamental Research Funds for Heilongjiang Universities, China (Grant Number: Heilongjiang University Special Fund Project, KJCX202015)

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Industrial technology network security measurement in international trade under discrete hopfield neural networkJournal of Computational Methods in Sciences and Engineering10.3233/JCM-23712824:2(657-674)Online publication date: 1-Jan-2024
  • (2023)Biometric cryptosystems: a comprehensive surveyMultimedia Tools and Applications10.1007/s11042-022-13817-982:11(16635-16690)Online publication date: 1-May-2023
  • (2022)A multi-spectral palmprint fuzzy commitment based on deep hashing code with discriminative bit selectionArtificial Intelligence Review10.1007/s10462-022-10334-x56:7(6169-6186)Online publication date: 21-Nov-2022

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media