Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Face-Based Authentication Using Computational Secure Sketch

Published: 19 September 2022 Publication History

Abstract

Biometric features are quite suitable for identity authentication due to its inherent properties – universality, uniqueness and persistence. In fact, biometric authentication has been widely used in our daily life, especially in mobile devices. However, biometric features are quite sensitive, and once a feature is leaked to an evil adversary, it cannot be used in authentication any more. This leads to a push on research of biometric privacy protection. In this paper, we propose a face-based authentication system with the help of a computational secure sketch. The computational secure sketch takes charge of error tolerance on the face samplings. Then the face features of the same user are used to extract an authentication key, which is in turn used to do the identity authentication for the user. The computational security of the computational secure sketch makes sure that the public information obtained by the adversary does not affect the pseudorandomness of the authentication key, hence the privacy of face features is guaranteed. Moreover, the privacy protection technique in our face-based authentication system can be extended to other biometric-based authentication.

References

[1]
J.-H. Im, S.-Y. Jeon, and M.-K. Lee, “Practical privacy-preserving face authentication for smartphones secure against malicious clients,” IEEE Trans. Inf. Forensics Secur., vol. 15, pp. 2386–2401, Jan. 2020.
[2]
A. Arakala, J. Jeffers, and K. J. Horadam, “Fuzzy extractors for minutiae-based fingerprint authentication,” in Proc. Int. Conf. Biometrics, 2007, pp. 760–769.
[3]
J. Chen and Y.-S. Moon, “Using SIFT features in palmprint authentication,” in Proc. IEEE 19th Int. Conf. Pattern Recognit., 2008, pp. 1–4.
[4]
K. B. Raja, R. Raghavendra, M. Stokkenes, and C. Busch, “Multi-modal authentication system for smartphones using face, iris and periocular,” in Proc. IEEE Int. Conf. Biometrics, 2015, pp. 143–150.
[5]
A. Kumar and C. Ravikanth, “Personal authentication using finger knuckle surface,” IEEE Trans. Inf. Forensics Secur., vol. 4, no. 1, pp. 98–110, Mar. 2009.
[6]
Y. Dodis, L. Reyzin, and A. D. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 2004, pp. 523–540.
[7]
G. B. Huang, M. Ramesh, T. Berg, and E. Learned-Miller, “Labeled faces in the wild: A database for studying face recognition in unconstrained environments,” University of Massachusetts, Amherst, Amherst, MA, Tech. Rep. 07–49, 2007.
[8]
R. K. Pandey, Y. Zhou, B. U. Kota, and V. Govindaraju, “Deep secure encoding for face template protection,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. Workshops, 2016, pp. 77–83.
[9]
A. K. Jindal, S. Chalamala, and S. K. Jami, “Face template protection using deep convolutional neural network,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. Workshops, 2018, pp. 462–470.
[10]
A. K. Jindal, S. R. Chalamala, and S. K. Jami, “Securing face templates using deep convolutional neural network and random projection,” in Proc. IEEE Int. Conf. Consum. Electron., 2019, pp. 1–6.
[11]
G. Mai, K. Cao, X. Lan, and P. C. Yuen, “SecureFace: Face template protection,” IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 262–277, 2021.
[12]
X. Dong, K. Wong, Z. Jin, and J. Dugelay, “A cancellable face template scheme based on nonlinear multi-dimension spectral hashing,” in Proc. IEEE 7th Int. Workshop Biometrics Forensics, 2019, pp. 1–6.
[13]
M. Taheri, S. Mozaffari, and P. Keshavarzi, “Face authentication in encrypted domain based on correlation filters,” Multimedia Tools Appl., vol. 77, no. 13, pp. 17 043–17 067, 2018.
[14]
S. D. Galbraith and L. Zobernig, “Obfuscated fuzzy hamming distance and conjunctions from subset product problems,” in Proc. Theory Cryptography Conf., 2019, pp. 81–110.
[15]
J. Katz and Y. Lindell, Introduction to Modern Cryptography, London, U.K.: Chapman and Hall/CRC Press, 2007.
[16]
D. Wichs and G. Zirdelis, “Obfuscating compute-and-compare programs under LWE,” in Proc. IEEE 58th Annu. Symp. Found. Comput. Sci., 2017, pp. 600–611.
[17]
N. A. Gumerov and R. Duraiswami, “Chapter 8 - asymptotically faster translation methods,” in Proc. Fast Multipole Methods Helmholtz Equation Three Dimens., 2004, pp. 339–416.
[18]
D. Yi, Z. Lei, S. Liao, and S. Z. Li, “Learning face representation from scratch,” 2014,.
[19]
K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, “Joint face detection and alignment using multi-task cascaded convolutional networks,” IEEE Signal Process. Lett., vol. 23, no. 10, pp. 1499–1503, 2016.
[20]
J. Deng, J. Guo, X. Niannan, and S. Zafeiriou, “ArcFace: Additive angular margin loss for deep face recognition,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2019, pp. 4685–4694.
[21]
T. A. M. Kevenaar, G. J. Schrijen, M. van der Veen, A. H. M. Akkermans, and F. Zuo, “Face recognition with renewable and privacy preserving binary templates,” in Proc. 4th IEEE Workshop Autom. Identification Adv. Technol., 2005, pp. 21–26.
[22]
Y. Guo, L. Zhang, Y. Hu, X. He, and J. Gao, “MS-Celeb-1M: A dataset and benchmark for large-scale face recognition,” in Proc. Eur. Conf. Comput. Vis., 2016, pp. 87–102.
[23]
D. Chicco, M. J. Warrens, and G. Jurman, “The coefficient of determination R-squared is more informative than SMAPE, MAE, MAPE, MSE and RMSE in regression analysis evaluation,” PeerJ Comput. Sci., vol. 7, 2021, Art. no. [Online]. Available: https://doi.org/10.7717/peerj-cs.623
[24]
D. H. Krawczyk, M. Bellare, and R. Canetti, “HMAC: Keyed-hashing for message authentication,” RFC 2104, Feb. 1997. [Online]. Available: https://www.rfc-editor.org/info/rfc2104
[25]
H. Ng and S. Winkler, “A data-driven approach to cleaning large face datasets,” in Proc. IEEE Int. Conf. Image Process., 2014, pp. 343–347.
[26]
S. Sengupta, J. Chen, C. D. Castillo, V. M. Patel, R. Chellappa, and D. W. Jacobs, “Frontal to profile face verification in the wild,” in Proc. IEEE Winter Conf. Appl. Comput. Vis., 2016, pp. 1–9.
[27]
P. J. Phillips, H. Wechsler, J. Huang, and P. J. Rauss, “The FERET database and evaluation procedure for face-recognition algorithms,” Image Vis. Comput., vol. 16, no. 5, pp. 295–306, 1998.
[28]
T. Sim, S. Baker, and M. Bsat, “The CMU pose, illumination, and expression database,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 12, pp. 1615–1618, Dec. 2003.
[29]
Gunther17, “Cmu_pie-dataset,” 2018. [Online]. Available: https://github.com/Gunther17/CMU_PIE-dataset

Cited By

View all

Index Terms

  1. Face-Based Authentication Using Computational Secure Sketch
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Mobile Computing
    IEEE Transactions on Mobile Computing  Volume 22, Issue 12
    Dec. 2023
    649 pages

    Publisher

    IEEE Educational Activities Department

    United States

    Publication History

    Published: 19 September 2022

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 14 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media