Skip to main content
Top

2024 | OriginalPaper | Chapter

Cancellable Iris Recognition Scheme Based on Inversion Fusion and Local Ranking

Authors : Dongdong Zhao, Wentao Cheng, Jing Zhou, Hongmin Wang, Huanhuan Li

Published in: Neural Information Processing

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Iris recognition has gained significant attention and application in real-life and financial scenarios in recent years due to its importance as a biometric data source. While many proposed solutions boast high recognition accuracy, one major concern remains the effective protection of users’ iris data and prevention of privacy breaches. To address this issue, we propose an improved cancellable biometrics scheme based on the inversion fusion and local ranking strategy (IFCB), specifically targeting the vulnerability of the local ranking-based cancellable biometrics scheme (LRCB) to the ranking-inversion attack when recognition accuracy is high. The proposed method disrupts the original iris data by applying a random substitution string and rearranging blocks within each iris string. For every rearranged block, it is either inverted or kept unchanged. This combination of inversed and unchanged blocks, referred as inversion fusion, is then sorted to obtain rank values that are stored for subsequent matching. It is important to note that the inversion fusion step may lead to a loss of accuracy, which can be compensated by amplifying the iris data to improve accuracy. By utilizing a set of different random substitution strings, the rearranged iris strings are employed in both the inversion fusion and local ranking steps. A long iris template is generated and stored as the final protected iris template, forming the basis of the proposed IFCB method. Theoretical and experimental analyses demonstrate that the IFCB scheme effectively withstands rank-inversion attacks and achieves a favorable balance of accuracy, irreversibility, unlinkability, and revocability.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Secretary, I.: Information technology-security techniques-biometric information protection. International Organization for Standardization, Standard ISO/IEC 24745, 2011 (2011) Secretary, I.: Information technology-security techniques-biometric information protection. International Organization for Standardization, Standard ISO/IEC 24745, 2011 (2011)
2.
go back to reference Patel, V.M., Ratha, N.K., Chellappa, R.: Cancelable biometrics: a review. IEEE Signal Process. Mag. 32(5), 54–65 (2015)CrossRef Patel, V.M., Ratha, N.K., Chellappa, R.: Cancelable biometrics: a review. IEEE Signal Process. Mag. 32(5), 54–65 (2015)CrossRef
3.
go back to reference Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011(1), 1–25 (2011) Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011(1), 1–25 (2011)
4.
go back to reference Nandakumar, K., Jain, A.K.: Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process. Mag. 32(5), 88–100 (2015)CrossRef Nandakumar, K., Jain, A.K.: Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process. Mag. 32(5), 88–100 (2015)CrossRef
5.
go back to reference Natgunanathan, I., Mehmood, A., Xiang, Y., Beliakov, G., Yearwood, J.: Protection of privacy in biometric data. IEEE Access 4, 880–892 (2016)CrossRef Natgunanathan, I., Mehmood, A., Xiang, Y., Beliakov, G., Yearwood, J.: Protection of privacy in biometric data. IEEE Access 4, 880–892 (2016)CrossRef
6.
go back to reference Lee, M.J., Jin, Z., Liang, S.N., Tistarelli, M.: Alignment-robust cancelable biometric scheme for iris verification. IEEE Trans. Inf. Forensics Secur. 17, 3449–3464 (2022)CrossRef Lee, M.J., Jin, Z., Liang, S.N., Tistarelli, M.: Alignment-robust cancelable biometric scheme for iris verification. IEEE Trans. Inf. Forensics Secur. 17, 3449–3464 (2022)CrossRef
7.
go back to reference Zhao, D., Fang, S., Xiang, J., Tian, J., Xiong, S.: Iris template protection based on local ranking. Secur. Commun. Netw. 2018, 1–9 (2018) Zhao, D., Fang, S., Xiang, J., Tian, J., Xiong, S.: Iris template protection based on local ranking. Secur. Commun. Netw. 2018, 1–9 (2018)
8.
go back to reference Ouda, O.: On the practicality of local ranking-based cancelable iris recognition. IEEE Access 9, 86392–86403 (2021)CrossRef Ouda, O.: On the practicality of local ranking-based cancelable iris recognition. IEEE Access 9, 86392–86403 (2021)CrossRef
9.
go back to reference Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36 (1999) Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36 (1999)
12.
go back to reference Rathgeb, C., Breitinger, F., Busch, C.: Alignment-free cancelable iris biometric templates based on adaptive bloom filters. In: 2013 international Conference on Biometrics (ICB), pp. 1–8. IEEE (2013) Rathgeb, C., Breitinger, F., Busch, C.: Alignment-free cancelable iris biometric templates based on adaptive bloom filters. In: 2013 international Conference on Biometrics (ICB), pp. 1–8. IEEE (2013)
13.
go back to reference Jin, Z., Hwang, J.Y., Lai, Y.L., Kim, S., Teoh, A.B.J.: Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Trans. Inf. Forensics Secur. 13(2), 393–407 (2017)CrossRef Jin, Z., Hwang, J.Y., Lai, Y.L., Kim, S., Teoh, A.B.J.: Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Trans. Inf. Forensics Secur. 13(2), 393–407 (2017)CrossRef
14.
go back to reference Lai, Y.L., et al.: Cancellable iris template generation based on indexing-first-one hashing. Pattern Recogn. 64, 105–117 (2017)CrossRef Lai, Y.L., et al.: Cancellable iris template generation based on indexing-first-one hashing. Pattern Recogn. 64, 105–117 (2017)CrossRef
15.
go back to reference Sadhya, D., Raman, B.: Generation of cancelable iris templates via randomized bit sampling. IEEE Trans. Inf. Forensics Secur. 14(11), 2972–2986 (2019)CrossRef Sadhya, D., Raman, B.: Generation of cancelable iris templates via randomized bit sampling. IEEE Trans. Inf. Forensics Secur. 14(11), 2972–2986 (2019)CrossRef
16.
go back to reference Ouda, O., Tsumura, N., Nakaguchi, T.: Tokenless cancelable biometrics scheme for protecting iris codes. In: 2010 20th International Conference on Pattern Recognition, pp. 882–885. IEEE (2010) Ouda, O., Tsumura, N., Nakaguchi, T.: Tokenless cancelable biometrics scheme for protecting iris codes. In: 2010 20th International Conference on Pattern Recognition, pp. 882–885. IEEE (2010)
17.
go back to reference Ouda, O., Tsumura, N., Nakaguchi, T.: Bioencoding: a reliable tokenless cancelable biometrics scheme for protecting iriscodes. IEICE Trans. Inf. Syst. 93(7), 1878–1888 (2010)CrossRef Ouda, O., Tsumura, N., Nakaguchi, T.: Bioencoding: a reliable tokenless cancelable biometrics scheme for protecting iriscodes. IEICE Trans. Inf. Syst. 93(7), 1878–1888 (2010)CrossRef
18.
go back to reference Dwivedi, R., Dey, S., Singh, R., Prasad, A.: A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping. Comput. Secur. 65, 373–386 (2017)CrossRef Dwivedi, R., Dey, S., Singh, R., Prasad, A.: A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping. Comput. Secur. 65, 373–386 (2017)CrossRef
19.
go back to reference Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)CrossRef Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)CrossRef
20.
go back to reference Kanade, S., Petrovska-Delacr’etaz, D., Dorizzi, B.: Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 120–127. IEEE (2009) Kanade, S., Petrovska-Delacr’etaz, D., Dorizzi, B.: Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 120–127. IEEE (2009)
21.
go back to reference Kelkboom, E.J., Breebaart, J., Kevenaar, T.A., Buhan, I., Veldhuis, R.N.: Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. IEEE Trans. Inf. Forensics Secur. 6(1), 107–121 (2010)CrossRef Kelkboom, E.J., Breebaart, J., Kevenaar, T.A., Buhan, I., Veldhuis, R.N.: Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. IEEE Trans. Inf. Forensics Secur. 6(1), 107–121 (2010)CrossRef
22.
go back to reference Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In: 2007 Biometrics Symposium, pp. 1–6. IEEE (2007) Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In: 2007 Biometrics Symposium, pp. 1–6. IEEE (2007)
23.
go back to reference Poon, H.T., Miri, A.: A collusion attack on the fuzzy vault scheme. ISC Int. J. Inf. Secur. 1(1), 27–34 (2009) Poon, H.T., Miri, A.: A collusion attack on the fuzzy vault scheme. ISC Int. J. Inf. Secur. 1(1), 27–34 (2009)
24.
go back to reference Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Zemor, G.: Theoretical and practical boundaries of binary secure sketches. IEEE Trans. Inf. Forensics Secur. 3(4), 673–683 (2008)CrossRef Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Zemor, G.: Theoretical and practical boundaries of binary secure sketches. IEEE Trans. Inf. Forensics Secur. 3(4), 673–683 (2008)CrossRef
25.
go back to reference Blanton, M., Aliasgari, M.: Analysis of reusability of secure sketches and fuzzy extractors. IEEE Trans. Inf. Forensics Secur. 8(9), 1433–1445 (2013)CrossRef Blanton, M., Aliasgari, M.: Analysis of reusability of secure sketches and fuzzy extractors. IEEE Trans. Inf. Forensics Secur. 8(9), 1433–1445 (2013)CrossRef
26.
go back to reference Hermans, J., Mennink, B., Peeters, R.: When a bloom filter is a doom filter: security assessment of a novel iris biometric template protection system. In: 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–6. IEEE (2014) Hermans, J., Mennink, B., Peeters, R.: When a bloom filter is a doom filter: security assessment of a novel iris biometric template protection system. In: 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–6. IEEE (2014)
27.
go back to reference Yang, W., Wang, S., Shahzad, M., Zhou, W.: A cancelable biometric authentication system based on feature-adaptive random projection. J. Inf. Secur. Appl. 58, 102704 (2021) Yang, W., Wang, S., Shahzad, M., Zhou, W.: A cancelable biometric authentication system based on feature-adaptive random projection. J. Inf. Secur. Appl. 58, 102704 (2021)
28.
go back to reference Zuo, J., Ratha, N.K., Connell, J.H.: Cancelable iris biometric. In: 2008 19th International Conference on Pattern Recognition, pp. 1–4. IEEE (2008) Zuo, J., Ratha, N.K., Connell, J.H.: Cancelable iris biometric. In: 2008 19th International Conference on Pattern Recognition, pp. 1–4. IEEE (2008)
29.
go back to reference Lacharme, P.: Analysis of the iriscodes bioencoding scheme. Int. J. Comput. Sci. Softw. Eng. (IJCSSE 2012) 6(5), 315–321 (2012) Lacharme, P.: Analysis of the iriscodes bioencoding scheme. Int. J. Comput. Sci. Softw. Eng. (IJCSSE 2012) 6(5), 315–321 (2012)
30.
go back to reference Evans, D.L., Leemis, L.M., Drew, J.H.: The distribution of order statistics for discrete random variables with applications to bootstrapping. INFORMS J. Comput. 18(1), 19–30 (2006)MathSciNetCrossRefMATH Evans, D.L., Leemis, L.M., Drew, J.H.: The distribution of order statistics for discrete random variables with applications to bootstrapping. INFORMS J. Comput. 18(1), 19–30 (2006)MathSciNetCrossRefMATH
31.
go back to reference Gomez-Barrero, M., Galbally, J., Rathgeb, C., Busch, C.: General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1406–1420 (2017)CrossRef Gomez-Barrero, M., Galbally, J., Rathgeb, C., Busch, C.: General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1406–1420 (2017)CrossRef
32.
go back to reference Institute of Automation, C.A.o.S.: CASIA iris image database (2017) Institute of Automation, C.A.o.S.: CASIA iris image database (2017)
34.
go back to reference Ma, L., Tan, T., Wang, Y., Zhang, D.: Efficient iris recognition by characterizing key local variations. IEEE Trans. Image Process. 13(6), 739–750 (2004)CrossRef Ma, L., Tan, T., Wang, Y., Zhang, D.: Efficient iris recognition by characterizing key local variations. IEEE Trans. Image Process. 13(6), 739–750 (2004)CrossRef
35.
go back to reference Ajish, S., AnilKumar, K.: Iris template protection using double bloom filter based feature transformation. Comput. Secur. 97, 101985 (2020)CrossRef Ajish, S., AnilKumar, K.: Iris template protection using double bloom filter based feature transformation. Comput. Secur. 97, 101985 (2020)CrossRef
Metadata
Title
Cancellable Iris Recognition Scheme Based on Inversion Fusion and Local Ranking
Authors
Dongdong Zhao
Wentao Cheng
Jing Zhou
Hongmin Wang
Huanhuan Li
Copyright Year
2024
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-8067-3_26

Premium Partner