Abstract
Biometric cryptosystems such as fuzzy vaults represent one of the most popular approaches for secret and biometric template protection. However, they are solely designed for biometric verification, where the user is required to input both identity credentials and biometrics. Several practical questions related to the implementation of biometric cryptosystems remain open, especially in regard to biometric template protection. In this article, we propose a face cryptosystem for identification (FCI) in which only biometric input is needed. Our FCI is composed of a one-to-N search subsystem for template protection and a one-to-one match chaff-less fuzzy vault (CFV) subsystem for secret protection. The first subsystem stores N facial features, which are protected by index-of-maximum (IoM) hashing, enhanced by a fusion module for search accuracy. When a face image of the user is presented, the subsystem returns the top k matching scores and activates the corresponding vaults in the CFV subsystem. Then, one-to-one matching is applied to the k vaults based on the probe face, and the identifier or secret associated with the user is retrieved from the correct matched vault. We demonstrate that coupling between the IoM hashing and the CFV resolves several practical issues related to fuzzy vault schemes. The FCI system is evaluated on three large-scale public unconstrained face datasets (LFW, VGG2, and IJB-C) in terms of its accuracy, computation cost, template protection criteria, and security.
- A. K. Jain, K. Nandakumar, and A. Nagar. 2008. Biometric template security. EURASIP J. Adv. Sig. Proc. 113 (2008), 1–17. DOI:https://doi.org/10.1155/2008/579416 Google Scholar
Digital Library
- K. Nandakumar and A. K. Jain. 2015. Biometric template protection: Bridging the performance gap between theory and practice. IEEE Sig. Proc. Mag. 32 (2015), 88–100. DOI:https://doi.org/10.1109/MSP.2015.2427849Google Scholar
Cross Ref
- C. Rathgeb and A. Uhl. 2011. A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. (2011). DOI:https://doi.org/10.1186/1687-417X-2011-3Google Scholar
- K. Xi and J. Hu. 2010. Bio-cryptography. In Handbook of Information and Communication Security, P. Stavroulakis, P. Stamp (Eds.). Springer, 129–157.Google Scholar
- A. Juels and M. Wattenberg. 1999. A fuzzy commitment scheme. In Proceedings of the 6th ACM Conference on Computer and Communications Security. ACM, New York, NY, 28–36. DOI:https://doi.org/10.1145/319709.319714 Google Scholar
Digital Library
- A. Juels and M. Sudan. 2006. A fuzzy vault scheme. Des. Codes Cryptogr 38 (2006), 237–257. DOI:https://doi.org/10.1007/s10623-005-6343-z Google Scholar
Digital Library
- Y. Dodis, L. Reyzin, and A. Smith. 2004. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In Adv. Cryptol. - EUROCRYPT 2004, C. Cachin, J. L. Camenisch (Eds.). Springer Berlin, 523–540.Google Scholar
- K. Xi, J. Hu, and B. V. K. V. Kumar. 2016. FE-SViT: A SViT-based fuzzy extractor framework. ACM Trans. Embed. Comput. Syst 15 (78), 1–24. DOI:https://doi.org/10.1145/2930669 Google Scholar
Digital Library
- D. Bissessar, C. Adams, and A. Stoianov. 2016. Privacy, security and convenience: biometric encryption for smartphone-based electronic travel documents. In Recent Advances in Computational Intelligence in Defense and Security R. Abielmona, R. Falcon, N. Zincir-Heywood, H. A. Abbass (Eds.). Springer International Publishing, Cham, 339–366. DOI:https://doi.org/10.1007/978-3-319-26450-9_13Google Scholar
- A. Cavoukian, M. Chibba, and A. Stoianov. 2012. Advances in biometric encryption: taking privacy by design from academic research to deployment. Rev. Policy Res. 29 (2012), 37–61. DOI:https://doi.org/10.1111/j.1541-1338.2011.00537.xGoogle Scholar
Cross Ref
- 2018 reform of EU data protection rules. 2018. Retrieved from: DOI:https://ec.europa.eu/commission/sites/beta-political/files/data-protection-factsheet-changes_en.pdfGoogle Scholar
- U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain. 2004. Biometric cryptosystems: issues and challenges. Proc. IEEE 92 (2004), 948–960. DOI:https://doi.org/10.1109/JPROC.2004.827372Google Scholar
Cross Ref
- G. Brassard, D. Chaum, and C. Crépeau. 1988. Minimum disclosure proofs of knowledge. J. Comput. Syst. Sci. 37 (1988), 156–189. DOI:https://doi.org/10.1016/0022-0000(88)90005-0 Google Scholar
Digital Library
- F. Hao, R. Anderson, and J. Daugman. 2006. Combining crypto with biometrics effectively. IEEE Trans. Comput. 55 (2006), 1081–1088. https://doi.org/10.1109/TC.2006.138 Google Scholar
Digital Library
- J. Daugman. 2006. Probing the uniqueness and randomness of iriscodes: results from 200 billion iris pair comparisons. Proc. IEEE 94 (2006), 1927–1935. https://doi.org/10.1109/JPROC.2006.884092Google Scholar
Cross Ref
- T. A. M. Kevenaar, G. J. Schrijen, M. van der Veen, A. H. M. Akkermans, and F. Zuo. 2005. Face recognition with renewable and privacy preserving binary templates. In Proceedings of the 4th IEEE Workshop on Automatic Identification Advanced Technologies. 21–26. DOI:https://doi.org/10.1109/AUTOID.2005.24 Google Scholar
Digital Library
- M. Osadchy and O. Dunkelman. 2018. It is all in the system's parameters: Privacy and security issues in transforming biometric raw data into binary strings. IEEE Trans. Depend. Secure Comput. 16, 5 (2018). DOI:https://doi.org/10.1109/TDSC.2018.2804949Google Scholar
- M. Lim, A. B. J. Teoh, and J. Kim. 2015. Biometric feature-type transformation: Making templates compatible for secret protection. IEEE Sig. Proc. Mag. 32 (2015), 77–87. DOI:https://doi.org/10.1109/MSP.2015.2423693Google Scholar
Cross Ref
- H. Lu, K. Martin, F. Bui, K. N. Plataniotis, and D. Hatzinakos. 2009. Face recognition with biometric encryption for privacy-enhancing self-exclusion. In Proceedings of the International Conference on Digital Signal Processing (DSP'09). 1–8. DOI:https://doi.org/10.1109/ICDSP.2009.5201257 Google Scholar
Digital Library
- O. Cole and K. El-Khatib. 2017. A privacy enhanced facial recognition access control system using biometric encryption. In Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS'17). 199–206. DOI:https://doi.org/10.1109/DCOSS.2017.19Google Scholar
- H. Lee, A. B. J. Teoh, H. G. Jung, and J. Kim. 2012. A secure biometric discretization scheme for face template protection. Fut. Gen. Comput. Syst. 28 (2012), 218–231. DOI:https://doi.org/10.1016/j.future.2010.11.006 Google Scholar
Digital Library
- K. Nandakumar, A. K. Jain, and S. Pankanti. 2007. Fingerprint-based fuzzy vault: Implementation and performance. IEEE Trans. Inf. Forens. Secur. 2 (2007), 744–757. DOI:https://doi.org/10.1109/TIFS.2007.908165 Google Scholar
Digital Library
- P. Li, X. Yang, K. Cao, X. Tao, R. Wang, and J. Tian. 2010. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J. Netw. Comput. Appl. 33 (2010), 207–220. DOI:https://doi.org/10.1016/j.jnca.2009.12.003 Google Scholar
Digital Library
- J. Merkle, H. Ihmor, U. Korte, M. Niesing, and M. Schwaiger. 2010. Performance of the fuzzy vault for multiple fingerprints (extended version). Retrieved from https://arxiv.org/abs/1008.0807v5.Google Scholar
- C. Li and J. Hu. 2016. A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures. IEEE Trans. Inf. Forens. Secur. 11 (2016), 543–555. DOI:https://doi.org/10.1109/TIFS.2015.2505630Google Scholar
Digital Library
- W. Yang, J. Hu, and S. Wang. 2014. A Delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Trans. Inf. Forens. Secur. 9 (2014), 1179–1192. DOI:https://doi.org/10.1109/TIFS.2014.2328095 Google Scholar
Digital Library
- V. Guruswami. 2001. List Decoding of Error-correcting Codes. PhD Thesis. Massachusetts Institute of Technology. Google Scholar
Digital Library
- P. Mihailescu. 2007. The fuzzy vault for fingerprints is vulnerable to brute force attack. Retrieved from http://arxiv.org/abs/0708.2974.Google Scholar
- A. Nagar, K. Nandakumar, and A. K. Jain. 2008. Securing fingerprint template: fuzzy vault with minutiae descriptors. In Proceedings of the 19th International Conference on Pattern Recognition. 1–4. DOI:https://doi.org/10.1109/ICPR.2008.4761459Google Scholar
- Y. Lai, J. Y. Hwang, Z. Jin, S. Kim, S. Cho, and A. B. J. Teoh. 2018. Secure secret sharing enabled b-band mini vaults bio-cryptosystem for vectorial biometrics. IEEE Trans. Dependable Secure Comput. 1–1. DOI:https://doi.org/10.1109/TDSC.2018.2874245Google Scholar
- D. Nyang and K. Lee. 2007. Fuzzy face vault: How to implement fuzzy vault with weighted features. In Universal Acess in Human Computer Interaction. Coping with Diversity, C. Stephanidis (Ed.). Springer Berlin, 491–496. Google Scholar
Digital Library
- Y. Wang and K. N. Plataniotis. 2007. Fuzzy vault for face based cryptographic key generation. In Proceedings of the Biometrics Symposium. 1–6. DOI:https://doi.org/10.1109/BCC.2007.4430549Google Scholar
- L. Wu and S. Yuan. 2010. A face based fuzzy vault scheme for secure online authentication. In Proceedings of the International Symposium on Data, Privacy, and E-Commerce. 45–49. DOI:https://doi.org/10.1109/ISDPE.2010.13 Google Scholar
Digital Library
- T. Frassen, X. Zhou, and C. Busch. 2008. Fuzzy vault for 3D face recognition systems. In Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing. 1069–1074. DOI:https://doi.org/10.1109/IIH-MSP.2008.315 Google Scholar
Digital Library
- D.-J. Lee, C.-K. Song, S.-M. Park, and M.-G. Chun. 2013. Real fuzzy vault for protecting face template. J. Korean Inst. Intell. Syst. 23 (2013), 113–119. DOI:https://doi.org/10.5391/JKIIS.2013.23.2.113Google Scholar
Cross Ref
- Y.-L. Lai, J. Y. Hwang, Z. Jin, S. Kim, S. Cho, and A. B. J. Teoh. 2019. Symmetric keyring encryption scheme for biometric cryptosystem. Inf. Sci. 502 (2019), 492–509. DOI:https://doi.org/10.1016/j.ins.2019.05.064Google Scholar
Digital Library
- W. J. Scheirer and T. E. Boult. 2007. Cracking fuzzy vaults and biometric encryption. In Proceedings of the Biometrics Symposium. 1–6. DOI:https://doi.org/10.1109/BCC.2007.4430534Google Scholar
- M. Khalil-Hani, M. N. Marsono, and R. Bakhteri. 2013. Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Fut. Gen. Comput. Syst. 29 (2013), 800–810. DOI:https://doi.org/10.1016/j.future.2012.02.002 Google Scholar
Digital Library
- I. De Oliveira Nunes, K. Eldefrawy, and T. Lepoint. 2019. SNUSE: A secure computation approach for large-scale user re-enrollment in biometric authentication systems. Fut. Gen. Comput. Syst. 98 (2019), 259–273. DOI:https://doi.org/10.1016/j.future.2019.03.051Google Scholar
Cross Ref
- Z. Jin, J. Y. Hwang, Y. Lai, S. Kim, and A. B. J. Teoh. 2018. Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Trans. Inf. Forens. Secur. 13 (2018), 393–407. DOI:https://doi.org/10.1109/TIFS.2017.2753172Google Scholar
Digital Library
- F. Schroff, D. Kalenichenko, and J. Philbin. 2015. FaceNet: a unified embedding for face recognition and clustering. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 815–823. DOI:https://doi.org/10.1109/CVPR.2015.7298682Google Scholar
- J. Deng, J. Guo, N. Xue, and S. Zafeiriou. 2019. Arcface: Additive angular margin loss for deep face recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 4690–4699.Google Scholar
- K. Zhang, Z. Zhang, Z. Li, and Y. Qiao. 2016. Joint face detection and alignment using multi-task cascaded convolutional networks. IEEE Sig. Proc. Lett. 23 (2016), 1499–1503. DOI:https://doi.org/10.1109/LSP.2016.2603342Google Scholar
Cross Ref
- Y. Guo, L. Zhang, Y. Hu, X. He, and J. Gao. 2016. MS-Celeb-1M: A dataset and benchmark for large-scale face recognition. In Proceedings of the European Conference on Computer Vision. 87–102. Springer, Cham. DOI:https://doi.org/10.1007/978-3-319-46487-9_6Google Scholar
- C. Rathgeb and A. Uhl. 2011. Statistical attack against iris-biometric fuzzy commitment schemes. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshop. 23–30. DOI:https://doi.org/10.1109/CVPRW.2011.5981720Google Scholar
- H. S. G. Pussewalage, J. Hu, and J. Pieprzyk. 2014. A survey: Error control methods used in bio-cryptography. In Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery. 956–962. DOI:https://doi.org/10.1109/FSKD.2014.6980968Google Scholar
- G. B. Huang, M. Mattar, T. Berg, and E. Learned-Miller. 2008. Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. Technical Report 07-49, October 2007. University of Massachusetts, Amherst, MA.Google Scholar
- Q. Cao, L. Shen, W. Xie, O. M. Parkhi, and A. Zisserman. 2018. VGGFace2: A dataset for recognising faces across pose and age. In Proceedings of the 13th IEEE International Conference on Automatic Face & Gesture Recognition. 67–74. DOI:https://doi.org/10.1109/FG.2018.00020Google Scholar
- B. Maze, J. Adams, J. A. Duncan, N. Kalka, T. Miller, C. Otto, A. K. Jain, W. T. Niggel, J. Anderson, J. Cheney, and P. Grother. 2018. IARPA Janus benchmark—C: face dataset and protocol. In Proceedings of the IAPR International Conference on Biometrics. 158–165. DOI:https://doi.org/10.1109/ICB2018.2018.00033Google Scholar
- N. A. Macmillan and C. D. Creelman. 2004. Detection Theory: A User's Guide. Psychology Press.Google Scholar
Cross Ref
- S. Liao, Zhen Lei, Dong Yi, and S. Z. Li. 2014. A benchmark study of large-scale unconstrained face recognition. In Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and Systems. 1–8. DOI:https://doi.org/10.1109/BTAS.2014.6996301.Google Scholar
- D. Yi, Z. Lei, S. Liao, and S. Z. Li. 2014. Learning face representation from scratch. ArXiv Prepr. ArXiv14117923.Google Scholar
- D. Wang, C. Otto, and A. K. Jain. 2017. Face search at scale. IEEE Trans. Pattern Anal. Mach. Intell. 39 (2017), 1122–1136. DOI:https://doi.org/10.1109/TPAMI.2016.2582166 Google Scholar
Digital Library
- F. Wang, X. Xiang, J. Cheng, and A. L. Yuille. 2017. NormFace: l2 hypersphere embedding for face verification. In Proceedings of the25th ACM International Multimedia Conference. ACM, New York, NY, 1041–1049. DOI:https://doi.org/10.1145/3123266.3123359 Google Scholar
Digital Library
- L. Li, H. Luo, L. Zhang, Q. Xu, and H. Ning. 2018. TypicFace: dynamic margin cosine loss for deep face recognition. In PRICAI 2018 Trends in Artificial Intelligence, X. Geng, B.-H. Kang (Eds.). Springer International Publishing, 710–718.Google Scholar
Index Terms
Secure Chaff-less Fuzzy Vault for Face Identification Systems
Recommendations
Deep face fuzzy vault: Implementation and performance
AbstractBiometric technologies, especially face recognition, have become an essential part of identity management systems worldwide. In deployments of biometrics, secure storage of biometric information is necessary in order to protect the ...
A blind system identification approach to cancelable fingerprint templates
Cancelable biometrics is an important biometric template protection scheme. With no a priori image pre-alignment, alignment-free cancelable fingerprint templates do not suffer from inaccurate singular point detection. In this paper, we develop a blind ...
Enhance fuzzy vault security using nonrandom chaff point generator
Toward the combination of cryptographic and biometric systems, by performing specific binding technique on cryptographic key and biometric template, the fuzzy vault framework enhances security level of current biometric cryptographic systems in terms of ...






Comments