Abstract
In recent years, biometric authentication system (BAS) has become the most promising and popular authentication system in identity management. Due to its capability to solve the limitations of unimodal systems, multi-biometric systems (MBS) have been extensively accepted in various fields. The main step in MBS is information fusion. On the other hand, directly storing the fused templates into a centralized server leads to privacy concerns. Recently, many BAS based on homomorphic encryption has been introduced to provide confidentiality for the fused templates. However, most of the existing solutions rely on an implication of the assumption that the server is “Honest-but-Curious”. As a result, the compromise of such server results into entire system vulnerability. To address this, we propose a novel P rivacy P reserving (PP) multi-instance iris remote authentication system to accord with attacks at the malicious server and over the transmission channel. Our scheme uses F ully H omomorphic E ncryption (FHE) to achieve the confidentiality of the fused iris templates and polynomial factorization algorithm to achieve the integrity of the matching result. We propose a PP iris authentication system using P rivate M ulti-C lass P erceptron (PMCP) by using the properties of FHE. Moreover, we propose C ontradistinguish S imilarity A nalysis (CSA), a feature level fusion technique that minimizes the between-class correlations and maximizes the pair-wise correlations. Our method has experimented on IITD and CASIA-V3-Interval iris databases to check the effectiveness and robustness. Experimental results show that our method provides improved accuracy, and eliminates the need to trust the cloud server when compared to the state-of-the-art approaches.
Similar content being viewed by others
Notes
https://www.reuters.com/article/us-usa-cybersecurity-fingerprints/5-6-million-fingerprints-stolen-in-u-s-personnel//-data-hackgovernment-idUSKCN0RN1V820150923https://www.reuters.com/article/us-usa-cybersecurity-fingerprints/5-6-million-fingerprints-stolen-in-u-s-personnel//-data-hackgovernment-idUSKCN0RN1V820150923http://www.tribuneindia.com/news/nation/rs-500-10-minutes-and-you-have//-access-to-billion-aadhaar-details/523361.html
References
Daugman J (2004) How iris recognition works. IEEE Trans Cir and Sys for Video Technol 14(1):21–30. https://doi.org/10.1109/TCSVT.2003.818350
Thakkar D (2019) Applications of iris recognition system. https://www.bayometric.com/biometric-iris-recognition-application/, Accessed: 10-04-2019
Ross A, Jain A (2004) Multimodal biometrics: an overview. In: Proceedings of 12th European signal processing conference, pp 1221–1224
Ross AA, Nandakumar K, Jain AK (2006) Handbook of multibiometrics, vol 6. Springer
Daugman J, Downing C (2001) Epigenetic randomness, complexity and singularity of human iris patterns. Proc Biol Sci/ R Soc 268(1477):1737–40
Snoek CGM, Worring M, Smeulders AWM (2005) Early versus late fusion in semantic video analysis. In: Proceedings of the 13th annual ACM international conference on multimedia, MULTIMEDIA ’05. ACM, New York, pp 399–402, DOI https://doi.org/10.1145/1101149.1101236, (to appear in print)
Liu C, Wechsler H (2001) A shape- and texture-based enhanced fisher classifier for face recognition. IEEE Trans Image Proc: Publ IEEE Signal Process Soc 10(4):598–608. https://doi.org/10.1109/83.913594
Yang J, Jy Yang, Zhang D, Jf L u (2003) Feature fusion: parallel strategy vs. serial strategy. Pattern Recogn 36(6):1369– 1381
Sun QS, Zeng SG, Liu Y, Heng PA, Xia DS (2005) A new method of feature fusion and its application in image recognition. Pattern Recogn 38(12):2437–2448
Haghighat M, Abdel-Mottaleb M, Alhalabi W (2016) Discriminant correlation analysis: real-time feature level fusion for multimodal biometric recognition. IEEE Trans Inform Forens Secur 11(9):1984–1996
Bharadi V, Shah D, Thapa N, Pandya BH, Cosma G (2018) Multi-instance iris recognition. In: 2018 Fourth international conference on computing communication control and automation (ICCUBEA). IEEE, pp 1–6
Al-Waisy AS, Qahwaji R, Ipson S, Al-Fahdawi S, Nagem TA (2018) A multi-biometric iris recognition system based on a deep learning approach. Pattern Anal Applic 21(3):783–802
Rathgeb C, Tams B, Wagner J, Busch C (2016) Unlinkable improved multi-biometric iris fuzzy vault. EURASIP J Inf Secur 2016(1):26
Barpanda SS, Sa PK, Marques O, Majhi B, Bakshi S (2018) Iris recognition with tunable filter bank based feature. Multimed Tools Appl 77(6):7637–7674
Sardar M, Mitra S, Shankar BU (2018) Iris localization using rough entropy and csa: a soft computing approach. Appl Soft Comput 67:61–69
Arsalan M, Kim DS, Lee MB, Owais M, Park KR (2019) Fred-net: fully residual encoder–decoder network for accurate iris segmentation. Expert Syst Appl 122:217–241
Zhao Z, Kumar A (2019) A deep learning based unified framework to detect, segment and recognize irises using spatially corresponding features. Pattern Recogn 93:546–557
Noruzi A, Mahlouji M, Shahidinejad A (2019) Iris recognition in unconstrained environment on graphic processing units with cuda. Artif Intell Rev, 1–25
Venugopalan S, Savvides M (2011) How to generate spoofed irises from an iris code template. IEEE Trans Inform Forens Secur 6(2):385–395
Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Signal Process 2008:113
Maiorana E, Hine GE, Campisi P (2014) Hill-climbing attacks on multibiometrics recognition systems. IEEE Trans Inform Forens Secur 10(5):900–915
Prabhakar S, Pankanti S, Jain AK (2003) Biometric recognition: security and privacy concerns. IEEE Secur Privac 2:33–42
Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 2011(1):3
Patel VM, Ratha NK, Chellappa R (2015) Cancelable biometrics: a review. IEEE Signal Process Mag 32(5):54–65
Fontaine C, Galand F (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007:15
Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: European symposium on research in computer security. Springer, pp 190–209
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 223–238
Gomez-Barrero M, Maiorana E, Galbally J, Campisi P, Fierrez J (2017) Multi-biometric template protection based on homomorphic encryption. Pattern Recogn 67:149–163
Alberto Torres WA, Bhattacharjee N, Srinivasan B (2015) Privacy-preserving biometrics authentication systems using fully homomorphic encryption. Int J Pervasive Comput Commun 11(2):151–168
Yasuda M, Shimoyama T, Kogure J, Yokoyama K, Koshiba T (2015) New packing method in somewhat homomorphic encryption and its applications. Secur Commun Netw 8(13):2194– 2213
Sun X, Zhang P, Liu JK, Yu J, Xie W (2019) Private machine learning classification based on fully homomorphic encryption. IEEE Trans Emerg Topics Comput, 1–1. https://doi.org/10.1109/TETC.2018.2794611
Liu J, Huang K, Rong H, Wang H, Xian M (2015) Privacy-preserving public auditing for regenerating-code-based cloud storage. IEEE Trans Inform Forens Secur 10(7):1513–1528
Graepel T, Lauter K, Naehrig M (2012) Ml confidential: machine learning on encrypted data. In: International conference on information security and cryptology. Springer, pp 1–21
Setty ST, McPherson R, Blumberg AJ, Walfish M (2012) Making argument systems for outsourced computation practical (sometimes). NDSS 1:17
Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Annual cryptology conference. Springer, pp 465–482
Gennaro R, Wichs D (2013) Fully homomorphic message authenticators. In: International conference on the theory and application of cryptology and information security. Springer, pp 301–320
Libert B, Peters T, Joye M, Yung M (2015) Linearly homomorphic structure-preserving signatures and their applications. Des Codes Crypt 77(2-3):441–477
Fan J, Vercauteren F (2012) Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive 2012: 144
Rathgeb C, Uhl A, Wild P, Hofbauer H (2016) Design decisions for an iris recognition sdk. In: Handbook of iris recognition. Springer, pp 359–396
Smart NP, Vercauteren F (2014) Fully homomorphic simd operations. Des Codes Cryptogr 71(1):57–81
Brakerski Z, Gentry C, Halevi S (2013) Packed ciphertexts in lwe-based homomorphic encryption. In: International workshop on public key cryptography. Springer, pp 1–13
Barni M, Failla P, Lazzeretti R, Sadeghi AR, Schneider T (2011) Privacy-preserving ecg classification with branching programs and neural networks. IEEE Trans Inform Forens Secur 6(2): 452–468
Orlandi C, Piva A, Barni M (2007) Oblivious neural network computing via homomorphic encryption. EURASIP J Inform Secur 2007(1):037343
Gentry C, Halevi S, Smart NP (2012) Fully homomorphic encryption with polylog overhead. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 465–482
Anderson DP, Cobb J, Korpela E, Lebofsky M, Werthimer D (2002) Seti@ home: an experiment in public-resource computing. Commun ACM 45(11):56–61
24745:2011 I (2018) Iso/iec 24745:2011 - information technology – security techniques – biometric information protection. https://www.iso.org/standard/52946.html
Kumar A, Passi A (2010) Comparison and combination of iris matchers for reliable personal authentication. Pattern Recogn 43(3):1016–1026
Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 1–23
Mosca M (2018) Cybersecurity in an era with quantum computers: will we be ready? IEEE Secur Privacy 16 (5):38–41
Regev O (2010) The learning with errors problem. Invited survey in CCC, 7
Martínez Díaz M, Fiérrez J, Alonso Fernández F, Ortega-García J, Sigüenza JA (2006) Hill-climbing and brute-force attacks on biometric systems: a case study in match-on-card fingerprint verification. In: Proceedings-international Carnahan conference on security technology. IEEE, pp 151–159
Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process Mag 32(5):20–30
Acknowledgements
The authors would like to thank Kim Laine, Senior Researcher, Microsoft for providing SEAL. We also thank Vishnu Naresh Boddeti, Assistant Professor, Michigan State University, for his valuable suggestions. We also thank Indian Institute of Technology Delhi (IITD), Centre for Biometrics and Security Research for providing access to their iris databases.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Morampudi, M.K., Veldandi, S., Prasad, M.V.N.K. et al. Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server. Appl Intell 50, 2848–2866 (2020). https://doi.org/10.1007/s10489-020-01681-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10489-020-01681-9