Abstract
To provide the necessary security and privacy privileges for registered users of biometric systems, a novel template protection method for generating cancelable palmprint features based on randomized cuckoo hashing and minHash is proposed in this paper. Firstly, the orthogonal features of palmprint are extracted using the anisotropic filter. Then, a novel randomized cuckoo hashing is applied on the binary palmprint feature as a means of first layer security. Randomized cuckoo hashing composes of two hash tables; before hashing, each column of original biometric template is filtered with a random matrix to improve discriminative ability. For the randomized cuckoo hashing with the same positions, we use different Gray coding methods instead, which improves irreversibility. Furthermore, to improve the efficiency and resist unlinkability attacks, another layer of privacy protection, MinHash is adopted. Experimental results on PolyU database show that our method can nearly preserve the original verification performance. The irreversibility, unlinkability and revocability properties are examined experimentally. Also, the privacy of palmprint protection scheme is analyzed under the Brute-force Attack, False Accept Attack and Birthday attack.
Similar content being viewed by others
References
Bloom B (1970) Space/time tradeoffs in hash coding with allowable errors. Commun ACM 13(7):422–426
Bringer J, Morel C, Rathgeb C (2015) Security analysis of bloom filter based iris biometric template protection. In: Proceedings of international conference on biometrics, pp 527–534
Bringer J, Morel C, Rathgeb C (2017) Security analysis and improvement of some biometric protected templates based on Bloom filters. Image Vis Comput 58:239–253
Broder A, (1997) On the resemblance and containment of documents. In: Proceedings of the compression and complexity of Sequences, proceedings of compression and complexity of SEQUENCES 1997, IEEE Computer Society, Los Alamitos, pp 21–29
Broder A, Mitzenmacher M (2005) Network applications of bloom filters: a survey. Internet Math 1(4):485–509
Charikar MS (2002) Similarity estimation techniques from rounding algorithms. In: Proceedings of 34th annual ACM symposium on theory of computing, pp 380–388
Debanjan S, Balasubramanian R (2019) Generation of cancelable Iris templates via randomized bit sampling. IEEE Trans Inf Forensic Secur 14(11):2972–2986
Debanjan S, SanjayK S (2017) Providing robust security measures to Bloom filter based biometric template protection schemes. Comput Secur 67:59–72
Drozdowski P, Garg S, Rathgeb C et al (2018) Privacy-preserving indexing of Iris-codes with cancelable Bloom filter-based search structures. In: Proceedings of European Signal Processing Conference (EUSIPCO), Rome, Italy, September
Fan B, Andersen DG, Kaminsky M et al (2014) Cuckoo hash: practically better than Bloom. Proceedings of the 10th ACM international on conference on emerging networking experiments and technologies. ACM, 2014
Feng YC, Yuen PC, Jain AK (2010) A hybrid approach for generating secure and discriminating face template. IEEE Trans Inf Forensic Secur 5(1):103–117
Gomez-Barrero M, Galbally J, Rathgeb C, Busch C (2018) General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans Inf Forensics Secur 13(6):1406–1420
Hermans J, Mennink B, Peeters R (2014) When a Bloom filter is a doom filter: security assessment of a novel Iris biometric template protection system. Proceedings of the BIOSIG 2014, pp 1–12
Indyk P (1999) A small approximately min-wise independent family of hash functions. In: Proceedings of the 10th annual ACM-SIAM symposium on discrete algorithms (SODA 1999)
Jain AK, Nandakumar K, Abhishek N (2008) Biometric template security. EURASIP J Adv Signal Process, Article 113, 17 pages
Jin Z, Hwang J, LaiY KS, Teoh ABJ (2018) Ranking based locality sensitive hashing enabled cancelable biometrics: index-of-max hashing. IEEE Trans Inf Forensic Secur 13(2):393–407
Kong A, Zhang D, Kamel M (2008) Three measures for secure palmprint identification. Pattern Recogn 41(4):1329–1337
Lee MJ, Jin Z, Teoh ABJ (2018) One-factor cancellable scheme for fingerprint template protection: Extended Feature Vector (EFV) Hashing. In: 2018 IEEE international Workshop on Information Forensics and Security (WIFS), pp 1–7
Leng L, Zhang JS (2013) PalmHash code vs palmphasor code. Neurocomputing 108:1–12
Leng L, Zhang JS, Khan MK, Chen X, Ji M, Alghathbar K (2011) Cancelable PalmCode generated from randomized Gabor filters for palmprint template protection. Sci Res Essays 6(4):784–792
Leng L, Li M, Teoh ABJ (2013) Conjugate 2DPalmHash code for secure palm-print-vein verification. In: Proceedings of the 6th international congress on image and signal processing, pp 1694–1699
Leng L, Teoh ABJ, LiM KMK (2014) A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion. Secur Commun Net 7(11):1860–1871
Leng L, Andrew BJ, Teoh ML (2017) Simplified 2DPalmHash code for secure Palmprint verification. Multimed Tools Appl 76(6):8373–8398
Li HJ, Zhang JS, Zhang ZT (2010) Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes. Inf Sci 180(20):3876–3893
Li H, Zhang J, Wang L (2014) Robust palmprint identification based on directional representations and compressed sensing. Multimed Tools Appl 70(3):32331–32345
Liu HL, Sun DM, Xiong K, Qiu ZD (2014) A hybrid approach to protect palmprint templates. Sci World J 2014:686754
Marta G, Christian R, Javier G et al (2016) Unlinkable and irreversible biometric template protection based on bloom filters. Inf Sci 370:18–32
Mckinney EH (1996) Generalized birthday problem. Am Math Mon 73(4):385–387
Nandakumar K, Jain AK (2015) Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process Mag 32(5):88–100
Pagh R, Rodler F (2004) Cuckoo hashing. J Algorithms 51(2):122–144
Patel VM, Ratha NK, Chellappa R (2015) Cancelable biometrics: a review. IEEE Signal Process Mag 32(5):54–65
PolyU Palmprint database. http://www.comp.polyu.edu.hk/~biometrics/
Ratha N, Connell J, Bolle R (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634
Rathgeb C, Breitinger F, Bush C (2013) Alignment-free cancelable iris biometric templates based on adaptive bloom filters. International conference on biometrics, pp 1–8.
Sun Z, Tan T, Wang Y, Li S (2005) Ordinal palmprint representation for personal identification. Proc IEEE Conf Comput Vis Pattern Recognit 1:279–284
Sun Z, Wang L, Tan T (2014) Ordinal feature selection for Iris and Palmprint recognition. IEEE Trans Image Process 23(9):3922–3934
Tams B, Mihailescu P, Munk A (2015) Security considerations in minutiae-based fuzzy vaults. IEEE Trans Inf Forensics Secur 10(5):985–998
Teoh ABJ, Goh A, Ngo DCL (2006) Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28(12):1892–1901
Zhang D, Kong WK, You J, Wong M (2003) Online palmprint identification. IEEE Trans Pattern Anal Mach Intel 25:1041–1050
Qiu, J, Li, H, Dong J (2018) Generating cancelable palmprint templates based on Bloom filters,“In Proceedings of the 2018 6th International Conference on Bioinformatics and Computational Biology (ICBCB 2018). ACM, New York, pp 78–82.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, H., Qiu, J. & Teoh, A.B.J. Palmprint template protection scheme based on randomized cuckoo hashing and MinHash. Multimed Tools Appl 79, 11947–11971 (2020). https://doi.org/10.1007/s11042-019-08446-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08446-8