Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Privacy-preserving iris authentication using fully homomorphic encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Rapid advancement in technology has led to the use of biometric authentication in every field. In particular, from the past few years, iris recognition systems has gained overwhelming advancement over other biometric traits due to its stability and uniqueness. Directly storing the templates into a centralized server leads to privacy concerns. Many state-of-the-art iris authentication systems based on cancelable biometrics and bio-cryptosystems have been introduced to provide security for the iris templates. However, these works suffer from accuracy loss relative to unprotected systems, or they require auxiliary data (AD), which compromise the privacy of the templates and security of the system. To address this, we propose a novel privacy-preserving iris authentication using fully homomorphic encryption which ensures the confidentiality of the templates and restricts the leakage of data from the templates. Our method improves the recognition accuracy by generating rotation invariant iris codes and reduces the computational time by using the batching scheme. Our approach satisfies all the requirements specified in the ISO/IEC 24745 standard. The proposed method has experimented on four benchmark publicly available iris databases which illustrate that our method can be practically achievable with no loss in the accuracy and preserve the privacy of the iris templates. Our method encrypts and computes the Hamming distance of 2560-dimensional iris features in about 0.0185 seconds only with an equal error rate value of 0.19% for CASIA-V 1.0 database.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. http://www.tribuneindia.com/news/nation/rs-500-10-minutes-and-you-have//-access-to-billion-aadhaar-details/523361.html

  2. https://www.reuters.com/article/us-usa-cybersecurity-fingerprints/5-6-million-fingerprints-stolen-in-u-s-personnel//-data-hackgovernment-idUSKCN0RN1V820150923https://www.reuters.com/article/us-usa-cybersecurity-fingerprints/5-6-million-fingerprints-stolen-in-u-s-personnel//-data-hackgovernment-idUSKCN0RN1V820150923

References

  1. 24745:2011 I (2018) Iso/iec 24745:2011 - information technology – security techniques – biometric information protection. https://www.iso.org/standard/52946.html

  2. Abidin A, Aly A, Rúa EA, Mitrokotsa A (2016) Efficient verifiable computation of xor for biometric authentication. In: International Conference on Cryptology and Network Security, Springer, pp 284–298

  3. Alberto Torres WA, Bhattacharjee N, Srinivasan B (2015) Privacy-preserving biometrics authentication systems using fully homomorphic encryption. International Journal of Pervasive Computing and Communications 11(2):151–168

    Article  Google Scholar 

  4. (Applications of Iris Recognition System) https://www.bayometric.com/biometric-iris-recognition-application/https://www.bayometric.com/biometric-iris-recognition-application/

  5. Barni M, Bianchi T, Catalano D, Di Raimondo M, Labati RD, Failla P, Fiore D, Lazzeretti R, Piuri V, Piva A et al (2010) A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates. In: 2010 Fourth IEEE International Conference on Biometrics: theory applications and systems (BTAS), IEEE, pp 1–7

  6. Barni M, Droandi G, Lazzeretti R, Pignata T (2019) Semba: Secure multi-biometric authentication. IET Biomet 8(6):411–421

    Article  Google Scholar 

  7. Barpanda SS, Sa PK, Marques O, Majhi B, Bakshi S (2018) Iris recognition with tunable filter bank based feature. Multimed Tools Appl 77(6):7637–7674

    Article  Google Scholar 

  8. Bianchi T, Turchi S, Piva A, Labati RD, Piuri V, Scotti F (2010) Implementing fingercode-based identity matching in the encrypted domain. In: Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS), pp 15–21

  9. Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: European Symposium on Research in Computer Security, Springer, pp 190–209

  10. Boddeti VN (2018) Secure face matching using fully homomorphic encryption. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS, IEEE, pp 1–10

  11. Boneh D, Goh EJ, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. In: Theory of Cryptography Conference, Springer, pp 325–341

  12. Bowyer KW, Burge MJ (2016) Handbook of iris recognition. Springer

  13. Brakerski Z, Gentry C, Halevi S (2013) Packed ciphertexts in lwe-based homomorphic encryption. In: Public-Key Cryptography–PKC 2013, Springer, pp 1–13

  14. (Casia iris image database 1.0.) http://www.cbsr.ia.ac.cn/IrisDatabase.htm

  15. (Casia iris image database version 3.0.) http://www.cbsr.ia.ac.cn/IrisDatabase.htm

  16. Catalano D, Fiore D (2015) Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, ACM, pp 1518–1529

  17. Cheon JH, Chung H, Kim M, Lee KW (2016) Ghostshell: Secure biometric authentication using integrity-based homomorphic evaluations. IACR Cryptology ePrint Archive 2016:484

    Google Scholar 

  18. Daugman J (2006) Probing the uniqueness and randomness of iriscodes: Results from 200 billion iris pair comparisons. Proc IEEE 94(11):1927–1935

    Article  Google Scholar 

  19. Daugman J (2009) How iris recognition works. In: The Essential Guide to Image Processing, Elsevier, pp 715–739

  20. Dwivedi R, Dey S, Singh R, Prasad A (2017) A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping. Computers & Security 65:373–386

    Article  Google Scholar 

  21. Fan J, Vercauteren F (2012) Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive 2012:144

    Google Scholar 

  22. Fontaine C, Galand F (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007:15

    Google Scholar 

  23. Gad R, Talha M, El-Latif AAA, Zorkany M, Ayman ES, Nawal EF, Muhammad G (2018) Iris recognition using multi-algorithmic approaches for cognitive internet of things (ciot) framework. Futur Gener Comput Syst 89:178–191

    Article  Google Scholar 

  24. Galbally J, Ross A, Gomez-Barrero M, Fierrez J, Ortega-Garcia J (2013) Iris image reconstruction from binary templates: an efficient probabilistic approach based on genetic algorithms. Comput Vis Image Underst 117(10):1512–1525

    Article  Google Scholar 

  25. Gentry C, Boneh D (2009) A fully homomorphic encryption scheme, vol 20. Stanford University Stanford

  26. Gomez-Barrero M, Maiorana E, Galbally J, Campisi P, Fierrez J (2017) Multi-biometric template protection based on homomorphic encryption. Pattern Recogn 67:149–163

    Article  Google Scholar 

  27. Gomez-Barrero M, Rathgeb C, Li G, Ramachandra R, Galbally J, Busch C (2018) Multi-biometric template protection based on bloom filters. Inform Fusion 42:37–50

    Article  Google Scholar 

  28. Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Proc Mag 32(5):20–30

    Article  Google Scholar 

  29. Halevi S, Shoup V (2014) Helib-an implementation of homomorphic encryption. Cryptology ePrint Archive, Report 2014/039

  30. Im JH, Choi J, Nyang D, Lee MK (2016) Privacy-preserving palm print authentication using homomorphic encryption. In: Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 2016 IEEE 14th Intl C, IEEE, pp 878–881

  31. Jain AK, Flynn P, Ross AA (2007) Handbook of biometrics. Springer Science & Business Media

  32. Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Sig process 2008:113.1–113.17

    Google Scholar 

  33. Jain AK, Prabhakar S, Hong L, Pankanti S (2000) Filterbank-based fingerprint matching. IEEE transactions on Image Processing 9(5):846–859

    Article  Google Scholar 

  34. Kamlaskar C, Deshmukh S, Gosavi S, Abhyankar A (2019) Novel canonical correlation analysis based feature level fusion algorithm for multimodal recognition in biometric sensor systems. Sens Lett 17(1):75–86

    Article  Google Scholar 

  35. Kulkarni R, Namboodiri A (2013) Secure hamming distance based biometric authentication. In: 2013 International Conference on Biometrics (ICB), IEEE, pp 1–6

  36. Kumar A, Passi A (2010) Comparison and combination of iris matchers for reliable personal authentication. Pattern Recognit 43(3):1016–1026

    Article  MATH  Google Scholar 

  37. Kumar MM, Prasad MV, Raju U (2018) Iris template protection using discrete logarithm. In: Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications, ACM, pp 43–49

  38. Lai YL, Jin Z, Teoh ABJ, Goi BM, Yap WS, Chai TY, Rathgeb C (2017) Cancellable iris template generation based on indexing-first-one hashing. Pattern Recogn 64:105–117

    Article  Google Scholar 

  39. Liu X, Deng R, Choo KR, Yang Y, Pang H (2018) Privacy-preserving outsourced calculation toolkit in the cloud. IEEE Transactions on Dependable and Secure Computing pp 1–1, https://doi.org/10.1109/TDSC.2018.2816656

  40. Luo Z (2014) Research on blind identity authentication protocol based on biometrics. PhD thesis, Beijing Jiaotong University, Beijing

  41. Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 1–23

  42. Maiorana E, Hine GE, Campisi P (2015) Hill-climbing attacks on multibiometrics recognition systems. IEEE Trans Inf Forensics Secur 10(5):900–915

    Article  Google Scholar 

  43. Martínez Díaz M, Fiérrez J, Alonso Fernández F, Ortega-García J, Sigüenza JA (2006) Hill-climbing and brute-force attacks on biometric systems: A case study in match-on-card fingerprint verification. In: Proceedings-International Carnahan Conference on Security Technology, IEEE, pp 151–159

  44. Patel VM, Ratha NK, Chellappa R (2015) Cancelable biometrics: a review. IEEE Signal Proc Mag 32(5):54–65

    Article  Google Scholar 

  45. Penn GM, Pötzelsberger G, Rohde M, Uhl A (2014) Customisation of paillier homomorphic encryption for efficient binary biometric feature vector matching. In: 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), IEEE, pp 1–6

  46. Punithavathi P, Geetha S, Sasikala S (2017) Generation of cancelable iris template using bi-level transformation. In: Proceedings of the 6th International Conference on Bioinformatics and Biomedical Science, ACM, pp 94–100

  47. Qu Y (2015) Research on palmprint authentication based on homomorphic encryption. PhD thesis, Southwest Jiaotong University

  48. Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 2011(1):3–10

    Article  Google Scholar 

  49. Rathgeb C, Uhl A, Wild P (2012) Iris biometrics: from segmentation to template security, vol 59. Springer Science & Business Media

  50. Sadhya D, Raman B (2019) Generation of cancelable iris templates via randomized bit sampling. IEEE Transactions on Information Forensics and Security

  51. Shoup V (2003) Number theory c++ library (ntl) version 11.0.0

  52. Simoens K, Chang CM, Preneel B (2010) Reversing protected minutiae vicinities. In: 2010 Fourth IEEE International Conference on Biometrics: Theory applications and systems (BTAS), IEEE, pp 1–8

  53. Smart NP, Vercauteren F (2014) Fully homomorphic simd operations. Design code Cryptogr 71(1):57–81

    Article  MATH  Google Scholar 

  54. Soliman RF, Amin M, El-Samie FEA (2018) A double random phase encoding approach for cancelable iris recognition. Opt Quant Electron 50(8):326

    Article  Google Scholar 

  55. Soliman RF, Amin M, El-Samie FEA (2019) Cancelable iris recognition system based on comb filter. Multimedia Tools and Applications, pp 1–21

  56. Upmanyu M, Namboodiri AM, Srinathan K, Jawahar C (2010) Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans Inf Foren Sec 5(2):255–268

    Article  Google Scholar 

  57. Venugopalan S, Savvides M (2011) How to generate spoofed irises from an iris code template. IEEE Trans Inf Forensics Sec 6(2):385–395

    Article  Google Scholar 

  58. Walia GS, Rishi S, Asthana R, Kumar A, Gupta A (2019) Secure multimodal biometric system based on diffused graphs and optimal score fusion. IET Biom 8(4):231–242

    Article  Google Scholar 

  59. Yasuda M, Shimoyama T, Kogure J, Yokoyama K, Koshiba T (2015) New packing method in somewhat homomorphic encryption and its applications. Secur Commun Netw 8(13):2194–2213

    Article  MATH  Google Scholar 

  60. Yin Y, Liu L, Sun X (2011) Sdumla-hmt: a multimodal biometric database. In: Chinese Conference on Biometric Recognition, Springer, pp 260–268

  61. Zhao D, Hu X, Tian J, Xiong S, Xiang J (2018) Iris template protection based on randomized response technique and aggregated block information. In: 2018 IEEE 29Th International Symposium on Software Reliability Engineering, ISSRE, IEEE, pp 248–258

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahesh Kumar Morampudi.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Morampudi, M.K., Prasad, M.V.N.K. & Raju, U.S.N. Privacy-preserving iris authentication using fully homomorphic encryption. Multimed Tools Appl 79, 19215–19237 (2020). https://doi.org/10.1007/s11042-020-08680-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08680-5

Keywords

Navigation