Abstract
Rapid advancement in technology has led to the use of biometric authentication in every field. In particular, from the past few years, iris recognition systems has gained overwhelming advancement over other biometric traits due to its stability and uniqueness. Directly storing the templates into a centralized server leads to privacy concerns. Many state-of-the-art iris authentication systems based on cancelable biometrics and bio-cryptosystems have been introduced to provide security for the iris templates. However, these works suffer from accuracy loss relative to unprotected systems, or they require auxiliary data (AD), which compromise the privacy of the templates and security of the system. To address this, we propose a novel privacy-preserving iris authentication using fully homomorphic encryption which ensures the confidentiality of the templates and restricts the leakage of data from the templates. Our method improves the recognition accuracy by generating rotation invariant iris codes and reduces the computational time by using the batching scheme. Our approach satisfies all the requirements specified in the ISO/IEC 24745 standard. The proposed method has experimented on four benchmark publicly available iris databases which illustrate that our method can be practically achievable with no loss in the accuracy and preserve the privacy of the iris templates. Our method encrypts and computes the Hamming distance of 2560-dimensional iris features in about 0.0185 seconds only with an equal error rate value of 0.19% for CASIA-V 1.0 database.
Similar content being viewed by others
Notes
https://www.reuters.com/article/us-usa-cybersecurity-fingerprints/5-6-million-fingerprints-stolen-in-u-s-personnel//-data-hackgovernment-idUSKCN0RN1V820150923https://www.reuters.com/article/us-usa-cybersecurity-fingerprints/5-6-million-fingerprints-stolen-in-u-s-personnel//-data-hackgovernment-idUSKCN0RN1V820150923
References
24745:2011 I (2018) Iso/iec 24745:2011 - information technology – security techniques – biometric information protection. https://www.iso.org/standard/52946.html
Abidin A, Aly A, Rúa EA, Mitrokotsa A (2016) Efficient verifiable computation of xor for biometric authentication. In: International Conference on Cryptology and Network Security, Springer, pp 284–298
Alberto Torres WA, Bhattacharjee N, Srinivasan B (2015) Privacy-preserving biometrics authentication systems using fully homomorphic encryption. International Journal of Pervasive Computing and Communications 11(2):151–168
(Applications of Iris Recognition System) https://www.bayometric.com/biometric-iris-recognition-application/https://www.bayometric.com/biometric-iris-recognition-application/
Barni M, Bianchi T, Catalano D, Di Raimondo M, Labati RD, Failla P, Fiore D, Lazzeretti R, Piuri V, Piva A et al (2010) A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates. In: 2010 Fourth IEEE International Conference on Biometrics: theory applications and systems (BTAS), IEEE, pp 1–7
Barni M, Droandi G, Lazzeretti R, Pignata T (2019) Semba: Secure multi-biometric authentication. IET Biomet 8(6):411–421
Barpanda SS, Sa PK, Marques O, Majhi B, Bakshi S (2018) Iris recognition with tunable filter bank based feature. Multimed Tools Appl 77(6):7637–7674
Bianchi T, Turchi S, Piva A, Labati RD, Piuri V, Scotti F (2010) Implementing fingercode-based identity matching in the encrypted domain. In: Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS), pp 15–21
Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: European Symposium on Research in Computer Security, Springer, pp 190–209
Boddeti VN (2018) Secure face matching using fully homomorphic encryption. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS, IEEE, pp 1–10
Boneh D, Goh EJ, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. In: Theory of Cryptography Conference, Springer, pp 325–341
Bowyer KW, Burge MJ (2016) Handbook of iris recognition. Springer
Brakerski Z, Gentry C, Halevi S (2013) Packed ciphertexts in lwe-based homomorphic encryption. In: Public-Key Cryptography–PKC 2013, Springer, pp 1–13
(Casia iris image database 1.0.) http://www.cbsr.ia.ac.cn/IrisDatabase.htm
(Casia iris image database version 3.0.) http://www.cbsr.ia.ac.cn/IrisDatabase.htm
Catalano D, Fiore D (2015) Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, ACM, pp 1518–1529
Cheon JH, Chung H, Kim M, Lee KW (2016) Ghostshell: Secure biometric authentication using integrity-based homomorphic evaluations. IACR Cryptology ePrint Archive 2016:484
Daugman J (2006) Probing the uniqueness and randomness of iriscodes: Results from 200 billion iris pair comparisons. Proc IEEE 94(11):1927–1935
Daugman J (2009) How iris recognition works. In: The Essential Guide to Image Processing, Elsevier, pp 715–739
Dwivedi R, Dey S, Singh R, Prasad A (2017) A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping. Computers & Security 65:373–386
Fan J, Vercauteren F (2012) Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive 2012:144
Fontaine C, Galand F (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007:15
Gad R, Talha M, El-Latif AAA, Zorkany M, Ayman ES, Nawal EF, Muhammad G (2018) Iris recognition using multi-algorithmic approaches for cognitive internet of things (ciot) framework. Futur Gener Comput Syst 89:178–191
Galbally J, Ross A, Gomez-Barrero M, Fierrez J, Ortega-Garcia J (2013) Iris image reconstruction from binary templates: an efficient probabilistic approach based on genetic algorithms. Comput Vis Image Underst 117(10):1512–1525
Gentry C, Boneh D (2009) A fully homomorphic encryption scheme, vol 20. Stanford University Stanford
Gomez-Barrero M, Maiorana E, Galbally J, Campisi P, Fierrez J (2017) Multi-biometric template protection based on homomorphic encryption. Pattern Recogn 67:149–163
Gomez-Barrero M, Rathgeb C, Li G, Ramachandra R, Galbally J, Busch C (2018) Multi-biometric template protection based on bloom filters. Inform Fusion 42:37–50
Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Proc Mag 32(5):20–30
Halevi S, Shoup V (2014) Helib-an implementation of homomorphic encryption. Cryptology ePrint Archive, Report 2014/039
Im JH, Choi J, Nyang D, Lee MK (2016) Privacy-preserving palm print authentication using homomorphic encryption. In: Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 2016 IEEE 14th Intl C, IEEE, pp 878–881
Jain AK, Flynn P, Ross AA (2007) Handbook of biometrics. Springer Science & Business Media
Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Sig process 2008:113.1–113.17
Jain AK, Prabhakar S, Hong L, Pankanti S (2000) Filterbank-based fingerprint matching. IEEE transactions on Image Processing 9(5):846–859
Kamlaskar C, Deshmukh S, Gosavi S, Abhyankar A (2019) Novel canonical correlation analysis based feature level fusion algorithm for multimodal recognition in biometric sensor systems. Sens Lett 17(1):75–86
Kulkarni R, Namboodiri A (2013) Secure hamming distance based biometric authentication. In: 2013 International Conference on Biometrics (ICB), IEEE, pp 1–6
Kumar A, Passi A (2010) Comparison and combination of iris matchers for reliable personal authentication. Pattern Recognit 43(3):1016–1026
Kumar MM, Prasad MV, Raju U (2018) Iris template protection using discrete logarithm. In: Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications, ACM, pp 43–49
Lai YL, Jin Z, Teoh ABJ, Goi BM, Yap WS, Chai TY, Rathgeb C (2017) Cancellable iris template generation based on indexing-first-one hashing. Pattern Recogn 64:105–117
Liu X, Deng R, Choo KR, Yang Y, Pang H (2018) Privacy-preserving outsourced calculation toolkit in the cloud. IEEE Transactions on Dependable and Secure Computing pp 1–1, https://doi.org/10.1109/TDSC.2018.2816656
Luo Z (2014) Research on blind identity authentication protocol based on biometrics. PhD thesis, Beijing Jiaotong University, Beijing
Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 1–23
Maiorana E, Hine GE, Campisi P (2015) Hill-climbing attacks on multibiometrics recognition systems. IEEE Trans Inf Forensics Secur 10(5):900–915
Martínez Díaz M, Fiérrez J, Alonso Fernández F, Ortega-García J, Sigüenza JA (2006) Hill-climbing and brute-force attacks on biometric systems: A case study in match-on-card fingerprint verification. In: Proceedings-International Carnahan Conference on Security Technology, IEEE, pp 151–159
Patel VM, Ratha NK, Chellappa R (2015) Cancelable biometrics: a review. IEEE Signal Proc Mag 32(5):54–65
Penn GM, Pötzelsberger G, Rohde M, Uhl A (2014) Customisation of paillier homomorphic encryption for efficient binary biometric feature vector matching. In: 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), IEEE, pp 1–6
Punithavathi P, Geetha S, Sasikala S (2017) Generation of cancelable iris template using bi-level transformation. In: Proceedings of the 6th International Conference on Bioinformatics and Biomedical Science, ACM, pp 94–100
Qu Y (2015) Research on palmprint authentication based on homomorphic encryption. PhD thesis, Southwest Jiaotong University
Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 2011(1):3–10
Rathgeb C, Uhl A, Wild P (2012) Iris biometrics: from segmentation to template security, vol 59. Springer Science & Business Media
Sadhya D, Raman B (2019) Generation of cancelable iris templates via randomized bit sampling. IEEE Transactions on Information Forensics and Security
Shoup V (2003) Number theory c++ library (ntl) version 11.0.0
Simoens K, Chang CM, Preneel B (2010) Reversing protected minutiae vicinities. In: 2010 Fourth IEEE International Conference on Biometrics: Theory applications and systems (BTAS), IEEE, pp 1–8
Smart NP, Vercauteren F (2014) Fully homomorphic simd operations. Design code Cryptogr 71(1):57–81
Soliman RF, Amin M, El-Samie FEA (2018) A double random phase encoding approach for cancelable iris recognition. Opt Quant Electron 50(8):326
Soliman RF, Amin M, El-Samie FEA (2019) Cancelable iris recognition system based on comb filter. Multimedia Tools and Applications, pp 1–21
Upmanyu M, Namboodiri AM, Srinathan K, Jawahar C (2010) Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans Inf Foren Sec 5(2):255–268
Venugopalan S, Savvides M (2011) How to generate spoofed irises from an iris code template. IEEE Trans Inf Forensics Sec 6(2):385–395
Walia GS, Rishi S, Asthana R, Kumar A, Gupta A (2019) Secure multimodal biometric system based on diffused graphs and optimal score fusion. IET Biom 8(4):231–242
Yasuda M, Shimoyama T, Kogure J, Yokoyama K, Koshiba T (2015) New packing method in somewhat homomorphic encryption and its applications. Secur Commun Netw 8(13):2194–2213
Yin Y, Liu L, Sun X (2011) Sdumla-hmt: a multimodal biometric database. In: Chinese Conference on Biometric Recognition, Springer, pp 260–268
Zhao D, Hu X, Tian J, Xiong S, Xiang J (2018) Iris template protection based on randomized response technique and aggregated block information. In: 2018 IEEE 29Th International Symposium on Software Reliability Engineering, ISSRE, IEEE, pp 248–258
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Morampudi, M.K., Prasad, M.V.N.K. & Raju, U.S.N. Privacy-preserving iris authentication using fully homomorphic encryption. Multimed Tools Appl 79, 19215–19237 (2020). https://doi.org/10.1007/s11042-020-08680-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08680-5