Advertisement

A Non-deterministic Approach to Mitigate Replay Attack and Database Attack Simultaneously on Iris Recognition System

  • Richa GuptaEmail author
  • Priti Sehgal
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11278)

Abstract

Biometric authentication is associated with prevalent security related issues. They compromise with user identity and also make that user characteristic feeble for any further use. Several attack points have been identified in literature and research has been widely carried out on each of them independently. In this paper, we combine two attack points – replay attack and template-based attack. We extend our previous work on robust iris regions to mitigate both these attacks simultaneously. The proposed approach uses cancelable biometrics generation technique. The technique is based on non-invertible transform of the selected robust iris regions. This transformed or cancelable template is used for user authentication. The system attains the EER of 1.75% which is comparable to other state-of-art approaches.

Keywords

Cancelable biometrics Iris recognition Non-Deterministic approach Replay attack Template attack 

Notes

Acknowledgement

Thanks to Dr. Arpana Sharma, Mathematics Department from Delhi University who assisted to understand the concept of linear transformations.

References

  1. 1.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)CrossRefGoogle Scholar
  2. 2.
    Gupta, R., Sehgal, P.: A survey of attacks on iris biometric systems. Int. J. Biometrics 8, 145–178 (2016)CrossRefGoogle Scholar
  3. 3.
    Gupta, R., Sehgal, P.: Mitigating iris based replay attack using cuckoo optimized reversible watermarking. In: Seventh International Conference on Advances in Computing, Control, and Telecommunication Technologies - ACT 2016 (2016)Google Scholar
  4. 4.
    Gupta, R., Sehgal, P.: Non-deterministic approach to allay replay attack on iris biometric. Pattern Anal. Appl. 1–13 (2018)Google Scholar
  5. 5.
    Gomez-Barrero, M., Rathgeb, C., Galbally, J., Busch, C., Fierrez, J.: Unlinkable and irreversible biometric template protection based on bloom filters. Inf. Sci. (Ny) 370, 18–32 (2016)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Dwivedi, R., Dey, S., Singh, R., Prasad, A.: A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping. Comput. Secur. 65, 373–386 (2017)CrossRefGoogle Scholar
  7. 7.
    Rathgeb, C., Breitinger, F., Busch, C.: Alignment free cancelable iris biometric templates based on adaptive bloom filters. In: International Conference on Biometrics (ICB) 2013, pp. 1–8. IEEE (2013)Google Scholar
  8. 8.
    Shelton, J., Roy, K., O’Connor, B., Dozier, G.V.: Mitigating iris-based replay attacks. Int. J. Mach. Learn. Comput. 4, 204–209 (2014)CrossRefGoogle Scholar
  9. 9.
    Hämmerle-Uhl, J., Raab, K., Uhl, A.: Robust watermarking in iris recognition: application scenarios and impact on recognition performance. ACM SIGAPP Appl. Comput. Rev. 11, 6–18 (2011)CrossRefGoogle Scholar
  10. 10.
    Smith, D.F., Wiliem, A., Lovell, B.C.: Face Recognition on consumer devices: reflections on replay attack. IEEE Trans. Inf. Forensics Secur. 10, 736–745 (2015)CrossRefGoogle Scholar
  11. 11.
    Gomez-Barrero, M., Rathgeb, C., Galbally, J., Fierrez, J., Busch, C.: Protected facial biometric templates based on local gabor patterns and adaptive bloom filters. In: 22nd International Conference on Pattern Recognition (ICPR) 2014, pp. 4483–4488 (2014)Google Scholar
  12. 12.
    Syarif, M.A., Leslie Ching Ow Tiong, A.G., Nen, L.M., Lee, K.W.: Cancelability for LBP biometric authentication. In: 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), pp. 612–618 (2015)Google Scholar
  13. 13.
    Sutra, G., Dorizzi, B., Garcia-Salicetti, S., Othman, N.: A biometric reference system for iris, OSIRIS version 4.1. Telecom Sud Paris, Fr. Technical report (2012)Google Scholar
  14. 14.
    Lang, S.: Introduction to Linear Algebra. Springer, New York (2012).  https://doi.org/10.1007/978-1-4612-1070-2CrossRefzbMATHGoogle Scholar
  15. 15.
    Sun, Z., Tan, T., Qiu, X.: Graph matching iris image blocks with local binary pattern. In: Zhang, D., Jain, Anil K. (eds.) ICB 2006. LNCS, vol. 3832, pp. 366–372. Springer, Heidelberg (2005).  https://doi.org/10.1007/11608288_49CrossRefGoogle Scholar
  16. 16.
    CASIA-Iris version 3 interval database. http://biometrics.idealtest.org/dbDetailForUser.do?id=3. Accessed 20 June 2018
  17. 17.
    Man-in-the-middle-attack. https://en.wikipedia.org/wiki/Man-in-the-middle_attack. Accessed 20 June 2018

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.University of DelhiNew DelhiIndia

Personalised recommendations