Full Paper View Go Back

Privacy Enhancement in Biometric Systems by Template Protection using Deep Learning

Harshita Kukreja1 , Soumya Jain2 , Shefali Arora3 , M.P.S. Bhatia4

Section:Research Paper, Product Type: Journal-Paper
Vol.9 , Issue.1 , pp.14-24, Feb-2021


Online published on Feb 28, 2021


Copyright © Harshita Kukreja, Soumya Jain, Shefali Arora, M.P.S. Bhatia . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Harshita Kukreja, Soumya Jain, Shefali Arora, M.P.S. Bhatia, “Privacy Enhancement in Biometric Systems by Template Protection using Deep Learning,” International Journal of Scientific Research in Computer Science and Engineering, Vol.9, Issue.1, pp.14-24, 2021.

MLA Style Citation: Harshita Kukreja, Soumya Jain, Shefali Arora, M.P.S. Bhatia "Privacy Enhancement in Biometric Systems by Template Protection using Deep Learning." International Journal of Scientific Research in Computer Science and Engineering 9.1 (2021): 14-24.

APA Style Citation: Harshita Kukreja, Soumya Jain, Shefali Arora, M.P.S. Bhatia, (2021). Privacy Enhancement in Biometric Systems by Template Protection using Deep Learning. International Journal of Scientific Research in Computer Science and Engineering, 9(1), 14-24.

BibTex Style Citation:
@article{Kukreja_2021,
author = {Harshita Kukreja, Soumya Jain, Shefali Arora, M.P.S. Bhatia},
title = {Privacy Enhancement in Biometric Systems by Template Protection using Deep Learning},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2021},
volume = {9},
Issue = {1},
month = {2},
year = {2021},
issn = {2347-2693},
pages = {14-24},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2269},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2269
TI - Privacy Enhancement in Biometric Systems by Template Protection using Deep Learning
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Harshita Kukreja, Soumya Jain, Shefali Arora, M.P.S. Bhatia
PY - 2021
DA - 2021/02/28
PB - IJCSE, Indore, INDIA
SP - 14-24
IS - 1
VL - 9
SN - 2347-2693
ER -

226 Views    915 Downloads    73 Downloads
  
  

Abstract :
Biometric recognition is playing a vital role in various applications these days. Biometric traits like fingerprints, face, and iris are used for the identification of individuals. The matching is done by authenticating against a set of enrolled templates in the biometric system. These templates are vulnerable to attacks and any leakage of information or data can lead to a breach of privacy of individuals. In this paper, we review the existing techniques that have been used to secure biometric templates in a system. We also present a case study in which we propose a framework involving hashing of biometric templates using SHA-256 algorithm, which is followed by extraction of features and classification using deep convolutional neural networks.

Key-Words / Index Term :
Template Protection, Biometrics, Hashing, Deep Learning, Convolutional Neural Networks

References :
[1]A. Jain, K. Nandakumar, A. Nagar, "Biometric Template Security", EURASIP Journal on Advances in Signal Processing, Vol. 2008, No. 1, p. 579416, 2008.
[2]U. Uludag, S. Pankanti, S. Prabhakar, A. Jain, "Biometric cryptosystems: issues and challenges", Proceedings of the IEEE, Vol. 92, No. 6, pp. 948-960, 2004.
[3]A. Cavoukian, A. Stoianov, “Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy,” Office of the Information and Privacy Commissioner of Ontario, Technical Report, 2007.
[4]A. Vetro, N. Memon, “Biometric System Security,” Tutorial presented at Second International Conference on Biometrics, Seoul, South Korea, 2007.
[5]C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B. Vijaya Kumar, “Biometric encryption: enrollment and verification procedures”, in the Proceedings of SPIE: Optical Pattern Recognition, pp. 24–35, 1998.
[6]C. Soutar, D. Roberge, A. Stoianov, R. Gilroy and B. Vijaya Kumar, "Biometric Encryption using image processing", Optical Security and Counterfeit Deterrence Techniques II, 1998.
[7]C. Soutar, D. Roberge, A. Stoianov, R. Gilroy and B. Vijaya Kumar, “Biometric encryption”, ICSA Guide to Cryptography, 1999.
[8]C. Soutar, D. Roberge, A. Stoianov, R. Gilroy and B. Vijaya Kumar, "Biometric Encryption using image processing", Optical Security and Counterfeit Deterrence Techniques II, 1998.
[9]A. Juels and M. Wattenberg, "A fuzzy commitment scheme", Proceedings of the 6th ACM conference on Computer and communications security - CCS `99, 1999.
[10]A. Juels and M. Sudan, "A Fuzzy Vault Scheme", Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237-257, 2006.
[11]Y. Feng and P. Yuen, "Binary Discriminant Analysis for Generating Binary Face Template", IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 613-624, 2012.
[12]S. Adamovic, M. Milosavljevic, M. Veinovic, M. Sarac and A. Jevremovic, "Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics", IET Biometrics, vol. 6, no. 2, pp. 89-96, 2017.
[13]S. Sapkal and R. Deshmukh, "Biometric Template Protection with Fuzzy Vault and Fuzzy Commitment", Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies - ICTCS `16, 2016.
[14]L. You and T. Wang, "A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion", Soft Computing, vol. 23, no. 11, pp. 3843-3851, 2018.
[15]D. Chitra and V. Sujitha, "Security analysis of prealigned fingerprint template using fuzzy vault scheme", Cluster Computing, vol. 22, no. 5, pp. 12817-12825, 2018.
[16]V. Sujitha and D. Chitra, "Highly secure palmprint based biometric template using fuzzy vault", Concurrency and Computation: Practice and Experience, vol. 31, no. 12, 2018.
[17]B. Gilkalaye, A. Rattani and R. Derakhshani, "Euclidean-Distance Based Fuzzy Commitment Scheme for Biometric Template Security", 7th International Workshop on Biometrics and Forensics (IWBF), 2019.
[18]S. Chauhan and A. Sharma, "Improved fuzzy commitment scheme", International Journal of Information Technology, 2019.
[19]M. Sandhya, M. Dileep, A. Murthy and M. Misbahuddin, "Fingerprint Cryptosystem Using Variable Selection of Minutiae Points", Advances in Intelligent Systems and Computing, pp. 359-369, 2020.
[20]D. Mohan, N. Sankaran, S. Tulyakov, S. Setlur and V. Govindaraju, "Significant Feature Based Representation for Template Protection", IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2019.
[21]N. Riaz, A. Riaz and S. Khan, "Biometric template security: an overview", Sensor Review, vol. 38, no. 1, pp. 120-127, 2018.
[22]C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics", EURASIP Journal on Information Security, vol. 2011, no. 1, 2011.
[23]E. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers and B. Skoric, "Key Extraction From General Nondiscrete Signals", IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 269-279, 2010.
[24]Y. Dodis, L. Reyzin and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data", Advances in Cryptology - EUROCRYPT 2004, pp. 523-540, 2004.
[25]D. Ngo, A. Teoh and A. Goh, "Biometric hash: high-confidence face recognition", IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 6, pp. 771-775, 2006.
[26]Y. Sutcu, Q. Li and N. Memon, "Protecting Biometric Templates With Sketch: Theory and Practice", IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 503-512, 2007.
[27]W. Sheng, S. Chen, G. Xiao, J. Mao and Y. Zheng, "A Biometric Key Generation Method Based on Semisupervised Data Clustering", IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 45, no. 9, pp. 1205-1217, 2015.
[28]E. Zaghouani, A. Benzina and R. Attia, "ECG biometrie template protection based on secure sketch scheme", 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2017.
[29]A. Anees and Y. Chen, "Discriminative binary feature learning and quantization in biometric key generation", Pattern Recognition, vol. 77, pp. 289-305, 2018.
[30]A. Jindal, S. Chalamala and S. Jami, "Face Template Protection Using Deep Convolutional Neural Network", IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2018.
[31]A. Jindal, S. Rao Chalamala and S. Jami, "Securing Face Templates using Deep Convolutional Neural Network and Random Projection", IEEE International Conference on Consumer Electronics (ICCE), 2019.
[32]V. Talreja, M. Valenti and N. Nasrabadi, "Multibiometric secure system based on deep learning", IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2017.
[33]V. Talreja, S. Soleymani, M. Valenti and N. Nasrabadi, "Learning to Authenticate with Deep Multibiometric Hashing and Neural Network Decoding", 2019 IEEE International Conference on Communications (ICC), 2019.
[34]V. Talreja, M. Valenti and N. Nasrabadi, “Zero-Shot Deep Hashing and Neural Network Based Error Correction for Face Template Protection”, arXiv preprint arXiv: 1908.02706, 2019.
[35]G. Mai, K. Cao, X. Lan and P. Yuen, "SecureFace: Face Template Protection", IEEE Transactions on Information Forensics and Security, vol. 16, pp. 262-277, 2020.
[36]Z. Wu, B. Liang, L. You, Z. Jian, J. Li, "High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia", Soft Computing, vol. 20, no. 12, pp. 4907-4918, 2015.
[37]R. Belguechi, E. Cherrier, V. Alimi, P. Lacharme and C. Rosenberger, "An Overview on Privacy Preserving Biometrics", Recent Application in Biometrics, 2011.
[38]R. Bolle, J. Connell and N. Ratha, "Biometric perils and patches", Pattern Recognition, vol. 35, no. 12, pp. 2727-2738, 2002.
[39]A. Goh and D. Ngo, "Computation of Cryptographic Keys from Face Biometrics", Communications and Multimedia Security. Advanced Techniques for Network and Data Protection, pp. 1-13, 2003.
[40]T. Connie, A. Teoh, M. Goh and D. Ngo, "PalmHashing: a novel approach for cancelable biometrics", Information Processing Letters, vol. 93, no. 1, pp. 1-5, 2005.
[41]A. Teoh, Y. Kuan and S. Lee, "Cancellable biometrics and annotations on BioHash", Pattern Recognition, vol. 41, no. 6, pp. 2034-2044, 2008.
[42]Jinyu Zuo, N. Ratha and J. Connell, "Cancelable iris biometric", 19th International Conference on Pattern Recognition, 2008.
[43]L. Ghammam, M. Barbier and C. Rosenberger, "Enhancing the Security of Transformation Based Biometric Template Protection Schemes", International Conference on Cyberworlds (CW), 2018.
[44]C. Rosenberger, "Evaluation of Biometric Template Protection Schemes based on a Transformation", Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018.
[45]M. Hammad, G. Luo and K. Wang, "Cancelable biometric authentication system based on ECG", Multimedia Tools and Applications, vol. 78, no. 2, pp. 1857-1887, 2018.
[46]A. Teoh, S. Cho and J. Kim, "Random permutation Maxout transform for cancellable facial template protection", Multimedia Tools and Applications, vol. 77, no. 21, pp. 27733-27759, 2018.
[47]X. Dong, Z. Jin, A. Teoh, “A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics”, arXiv:1905.03021, 2019.
[48]Y. Chen, Y. Wo, R. Xie, C. Wu and G. Han, "Deep Secure Quantization: On secure biometric hashing against similarity-based attacks", Signal Processing, vol. 154, pp. 314-323, 2019.
[49]K. Atighehchi, L. Ghammam, M. Barbier and C. Rosenberger, "GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates", Future Generation Computer Systems, vol. 101, pp. 819-830, 2019.
[50]E. Abdellatef, N. Ismail, S. Abd Elrahman, K. Ismail, M. Rihan and F. Abd El-Samie, "Cancelable fusion-based face recognition", Multimedia Tools and Applications, vol. 78, no. 22, pp. 31557-31580, 2019.
[51]A. Singh, A. Arora, G. Jaswal and A. Nigam, "Comprehensive survey on cancelable biometrics with novel case study on finger dorsal template protection", Journal of Banking and Financial Technology, vol. 4, no. 1, pp. 37-52, 2020.
[52]]A. S and K. Anil Kumar, "Security and performance enhancement of fingerprint biometric template using symmetric hashing", Computers & Security, vol. 90, p. 101714, 2020.
[53]N. Ratha, J. Connell and R. Bolle, "Enhancing security and privacy in biometrics-based authentication systems", IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001.
[54]N. Ratha, S. Chikkerur, J. Connell and R. Bolle, "Generating Cancelable Fingerprint Templates", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561-572, 2007.
[55]Y. Sutcu, H. Sencar and N. Memon, "A secure biometric authentication scheme based on robust hashing", Proceedings of the 7th workshop on Multimedia and security, 2005.
[56]S. Khan, M. Ali Akbar, F. Shahzad, M. Farooq and Z. Khan, "Secure biometric template generation for multi-factor authentication", Pattern Recognition, vol. 48, no. 2, pp. 458-472, 2015.
[57]Y. Liu, J. Ling, Z. Liu, J. Shen and C. Gao, "Finger vein secure biometric template generation based on deep learning", Soft Computing, vol. 22, no. 7, pp. 2257-2265, 2017.
[58]Z. Jin, J. Hwang, Y. Lai, S. Kim and A. Teoh, "Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing", IEEE Transactions on Information Forensics and Security, vol. 13, no. 2, pp. 393-407, 2018.
[59]X. Dong, K. Wong, Z. Jin and J. Dugelay, "A Secure Visual-thermal Fused Face Recognition System Based on Non-Linear Hashing", IEEE 21st International Workshop on Multimedia Signal Processing (MMSP), 2019.
[60]X. Dong, K. Wong, Z. Jin and J. Dugelay, "A Cancellable Face Template Scheme Based on Nonlinear Multi-Dimension Spectral Hashing", 7th International Workshop on Biometrics and Forensics (IWBF), 2019.
[61]L. Debiasi, S. Kirchgasser, B. Prommegger, A. Uhl, A. Grudzien and M. Kowalski, "Biometric Template Protection in the Image Domain Using Non-invertible Grey-scale Transforms", IEEE International Workshop on Information Forensics and Security (WIFS), 2019.
[62]H. Kaur and P. Khanna, "Random Distance Method for Generating Unimodal and Multimodal Cancelable Biometric Features", IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, pp. 709-719, 2019.
[63]H. Kaur and P. Khanna, "PolyCodes: generating cancelable biometric features using polynomial transformation", Multimedia Tools and Applications, vol. 79, no. 29-30, pp. 20729-20752, 2020.
[64]H. Kaur and P. Khanna, "Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing", Future Generation Computer Systems, vol. 102, pp. 30-41, 2020.
[65]A. Sardar, S. Umer, C. Pero and M. Nappi, "A Novel Cancelable FaceHashing Technique Based on Non-Invertible Transformation With Encryption and Decryption Template", IEEE Access, vol. 8, pp. 105263-105277, 2020.
[66]T. Boult, W. Scheirer and R. Woodworth, "Revocable fingerprint biotokens: accuracy and security analysis", 2007 IEEE Conference on Computer Vision and Pattern Recognition, 2007.
[67]K. Nandakumar, A. Nagar and A. Jain, "Hardening Fingerprint Fuzzy Vault Using Password", Advances in Biometrics, pp. 927-937.
[68]O. T. Song, A. B. J. Teoh, and D. C. L. Ngo, “Application-Specific Key Release Scheme from Biometrics,” International Specific Key Release Scheme from Biometrics,” International Journal of Network Security, vol. 6, no. 2, pp. 127–133, March 2008
[69]Y. Feng, P. Yuen and A. Jain, "A Hybrid Approach for Generating Secure and Discriminating Face Template", IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 103-117, 2010.
[70]A. Nagar, K. Nandakumar and A. Jain, "A hybrid biometric cryptosystem for securing fingerprint minutiae templates", Pattern Recognition Letters, vol. 31, no. 8, pp. 733-741, 2010.
[71]H. Kaur and P. Khanna, "Biometric template protection using cancelable biometrics and visual cryptography techniques", Multimedia Tools and Applications, vol. 75, no. 23, pp. 16333-16361, 2015.
[72]Y. A. Alahmadi, S. N. Alassali, "An Improved Key Distribution Protocol Using Symmetric Key Cryptography," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.21-26, 2020.
[73]J. Thomas, J. M. Roy, M. M., V. Vijayan, A. S., "Image Steganography And Cryptography Using Three Level Password Security," International Journal of Computer Sciences and Engineering, Vol.8, Issue.7, pp.32-35, 2020.
[74]H. Kaur and P. Khanna, "Cancelable features using log-Gabor filters for biometric authentication", Multimedia Tools and Applications, vol. 76, no. 4, pp. 4673-4694, 2016.
[75]A. Jegede, N. Udzir, A. Abdullah and R. Mahmod, "A Hybrid Scheme for Face Template Protection", Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016.
[76]T. Dang, Q. Truong, T. Le and H. Truong, "Cancellable fuzzy vault with periodic transformation for biometric template protection", IET Biometrics, vol. 5, no. 3, pp. 229-235, 2016.
[77]M. Sandhya and M. Prasad, "Cancelable Fingerprint Cryptosystem Based on Convolution Coding", Advances in Intelligent Systems and Computing, pp. 145-157, 2015.
[78]D. Sadhya and S. Singh, "Design of a cancelable biometric template protection scheme for fingerprints based on cryptographic hash functions", Multimedia Tools and Applications, vol. 77, no. 12, pp. 15113-15137, 2017.
[79]W. Nakamura, Y. Kaga, M. Fujio and K. Takahashi, "Security and Efficiency of Biometric Template Protection for Identification", Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019.
[80]S. Jami, S. Chalamala and A. Jindal, "Biometric Template Protection Through Adversarial Learning", IEEE International Conference on Consumer Electronics (ICCE), 2019.
[81]S. Ye, Y. Luo, J. Zhao, S.C.S. Cheung, “Anonymous biometric access control”, EURASIP Journal on Information Security, Vol. 9, No. 1, 2009.
[82]C. Karabat, M. Kiraz, H. Erdogan and E. Savas, "THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system", EURASIP Journal on Advances in Signal Processing, vol. 2015, no. 1, 2015.
[83]M. Gomez-Barrero, J. Fierrez and J. Galbally, "Variable-length template protection based on homomorphic encryption with application to signature biometrics", 4th International Conference on Biometrics and Forensics (IWBF), 2016.
[84]M. Gomez-Barrero, E. Maiorana, J. Galbally, P. Campisi and J. Fierrez, "Multi-biometric template protection based on Homomorphic Encryption", Pattern Recognition, vol. 67, pp. 149-163, 2017.
[85]Y. Ma, L. Wu, X. Gu, J. He and Z. Yang, "A Secure Face-Verification Scheme Based on Homomorphic Encryption and Deep Neural Networks", IEEE Access, vol. 5, pp. 16532-16538, 2017.
[86]H. Wang, Y. Ding, S. Tang and J. Wang, "An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption", Cyberspace Safety and Security, pp. 503-512, 2017.
[87]X. Li, Q. Han and X. Jin, "A Secure and Efficient Face-Recognition Scheme Based on Deep Neural Network and Homomorphic Encryption", International Conference on Virtual Reality and Visualization (ICVRV), 2018.
[88]H. K. Shukla, S. Dubey, "Security in Internet of Things (IoT) Hashing Cryptographic Functions," International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.3, pp.7-11, 2019.
[89]M. Arora, S. Sharma, "Synthesis of Cryptography and Security Attacks," International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.5, pp.1-5, 2017.
[90]M. Sandhya and M. Prasad, "Biometric Template Protection: A Systematic Literature Review of Approaches and Modalities", Signal Processing for Security Technologies, pp. 323-370, 2016.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation