Skip to main content

A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation

  • Conference paper
  • First Online:
Information Security Applications (WISA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10144))

Included in the following conference series:

  • 1262 Accesses

Abstract

Biometric authentication is the use of unique human features to provide secure, reliable, friendly and convenient access to an environment or a computer installation. However, the use of biometrics as a means of authentication exposes legitimate users to security threats, privacy attacks and loss of identity. This paper proposes and implements a novel non-invertible transformation technique known as matrix transformation. Matrix transformation is a simple but powerful and effective method to achieve template revocability and prevent the recovery of original biometric data from secured templates. The approach provides a high level template security and user privacy. It is also robust against replay attack, cross matching and loss of identity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ANSI: Biometrics. http://www.iso.org/iso/iso_technical_committee.html?commid=313770

  2. Adler, A.: Images can be regenerated from quantized match score data. In: Proceedings of Canadian Conference on Electrical and Computer Engineering, pp. 469–472. IEEE, New York (2004)

    Google Scholar 

  3. Benvenuto, C.J.: Galois field in cryptography. https://www.math.washinghton.edu/~morrow/333_12/papers/juan.pdf

  4. Boult, T.: Robust distance measure for face recognition supporting revocable biometric tokens. In: Proceedings of 7th International Conference on Automatic Face and Gesture Recognition, pp. 560–566. IEEE, New York (2006)

    Google Scholar 

  5. Boult, T., Scheirer, W., Woodworth, R.: Revocable fingerprint biotokens: accuracy and security analysis. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. IEEE, New York (2007)

    Google Scholar 

  6. Bowler, K., Hollingsworth, K., Flynn, P.: Image understanding for iris: a survey. Comput. Vis. Image Underst. 110(2), 281–307 (2007)

    Google Scholar 

  7. Campisi, P., Egiazarian, K.: Blind Image Deconvolution: Theory and Applications. CRC Press, Boca Raton (2007)

    Book  Google Scholar 

  8. Cappelli, R., Lumini, A., Maio, D., Maltoni, D.: Can fingerprints be reconstructed from ISO templates? In: 9th International Conference on Control, Automation, Robotics and Vision. IEEE, New York (2006)

    Google Scholar 

  9. CASIA-IrisV1. http://biometrics.idealtest.org/

  10. Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)

    Article  Google Scholar 

  11. Daugman, J., Downing, C.: Epigenetic randomness, complexity and singularity of human iris patterns. In: Proceedings of the Royal Society (London) Biological Sciences, vol. 268, pp. 1737–1740. The Royal Society, London (2001)

    Google Scholar 

  12. Färberböck, P., Hämmerle-Uhl, J., Kaaser, D., Pschernig, E., Uhl, A.: Transforming rectangular and polar iris images to enable cancelable biometrics. In: Campilho, A., Kamel, M. (eds.) ICIAR 2010. LNCS, vol. 6112, pp. 276–286. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13775-4_28

    Chapter  Google Scholar 

  13. Feng, Y.C., Yuen, P.C.: Vulnerabilities in binary face template. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshop, pp. 105–110. IEEE, New York (2012)

    Google Scholar 

  14. Fenker, S.P., Bowyer, K.W.: Experimental evidence of a template aging effect in iris biometrics. In: Proceedings of IEEE Workshop on Applications of Computer Vision, pp. 232–239. IEEE, New York (2011)

    Google Scholar 

  15. Field, D.J.: Relations between the statistics of natural images and the response properties of cortical cells. J. Opt. Soc. Am. 4(12), 2379–2394 (1987)

    Article  Google Scholar 

  16. Fuzhen, Z.: Matrix Theory. Springer, New York (2011)

    MATH  Google Scholar 

  17. Grassi, M., Faundez-Zanuy, M.: Protecting DCT templates for a face verification system by means of pseudo-random permutations. In: Cabestany, J., Sandoval, F., Prieto, A., Corchado, J.M. (eds.) IWANN 2009. LNCS, vol. 5517, pp. 1216–1223. Springer, Heidelberg (2009). doi:10.1007/978-3-642-02478-8_152

    Chapter  Google Scholar 

  18. Goel, N., Bebis, G., Nefian, A.: Face recognition experiments with random projection. In: Proceedings of the SPIE, vol. 5779, pp. 426–437 (2005)

    Google Scholar 

  19. Grinshpan, A.: Linear Algebra: Permutation Matrices. http://www.math.drexel.edu/~tolya/permutations.pdf

  20. Hämmerle-Uhl, J., Pschernig, E., Uhl, A.: Cancelable iris biometrics using block re-mapping and image warping. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 135–142. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04474-8_11

    Chapter  Google Scholar 

  21. Hao, F., Anderson, R., Daugman, J.: Combining cryptography with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)

    Article  Google Scholar 

  22. He, Y., Yap, K.H., Chen, L., Chau, L.P.: A novel hybrid model framework to blind color image deconvolution. IEEE Trans. Syst. Man Cybern. Part A Syst. Humans 38(4), 867–880 (2008)

    Article  Google Scholar 

  23. Jain, A.K., Flynn, P.J., Ross, A.A.: Handbook of Biometrics. Springer, Heidelberg (2008)

    Book  Google Scholar 

  24. Jain, A.K., Nandakumar K., Nagar A.: Biometric template security. EURASIP J. Adv. Sig. Process. Spec Issue Biometrics (2008). Springer-Verlag, Berlin Heidelberg

    Google Scholar 

  25. Jeong, M., Teoh, A.B.J.: Cancellable face biometrics system by combining independent component analysis coefficients. In: Sako, H., Franke, K.Y., Saitoh, S. (eds.) IWCF 2010. LNCS, vol. 6540, pp. 78–87. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19376-7_7

    Chapter  Google Scholar 

  26. Li, S., Cot, A.C.: Attacks using reconstructed fingerprint. In: 2011 IEEE International Workshop on Information Forensics and Security. IEEE, New York (2011)

    Google Scholar 

  27. Masek, L.: Recognition of Human Iris for Biometric Identification. Upublished MSc Thesis. University of Western Australia (2003)

    Google Scholar 

  28. Moujahdi, C., Ghouzali, S., Mikram, M., Rziza, M., Bebis, G.: Spiral cube for biometric template protection. In: Elmoataz, A., Mammass, D., Lezoray, O., Nouboud, F., Aboutajdine, D. (eds.) ICISP 2012. LNCS, vol. 7340, pp. 235–244. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31254-0_27

    Chapter  Google Scholar 

  29. Ouda, O., Tusamura, N., Nakaguchi, T.: Securing BioEncoded IrisCodes against correlation attacks. In: 2011 IEEE International Conference on Communications. IEEE, New York (2011)

    Google Scholar 

  30. Plesca, C., Morogan, L.: Efficient and robust perceptual hashing using log-polar image representation. In: 2014 10th International Conference on Communications. IEEE, New York (2014)

    Google Scholar 

  31. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    Article  Google Scholar 

  32. Ratha, N.K, Connell, J.H., Bolle, R.M., Chikkerur, S.: Cancellable biometrics: a case study in fingerprints. In: Proceedings of 18th International Conference on Pattern Recognition, pp. 370–373. IEEE, New York (2006)

    Google Scholar 

  33. Ratha, N.K., Connell, J.H., Bolle, R.M., Chikkerur, S.: Generating cancellable fingerprints templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)

    Article  Google Scholar 

  34. Rathgeb, C., Uhl, A.: Secure iris recognition based on local intensity variations. In: Campilho, A., Kamel, M. (eds.) ICIAR 2010. LNCS, vol. 6112, pp. 266–275. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13775-4_27

    Chapter  Google Scholar 

  35. Rathgeb, C., Uhl, A., Wild, P.: Iris-Biometrics: From Segmentation to Template Security. In: Jajodia, S. (ed.) Advances in Information Security. Springer, New York (2013)

    Google Scholar 

  36. Rathgeb, C., Breitinger, F., Busch, C., Baier, H.: On the application of bloom filters to iris biometrics. IET Biometrics 3(4), 207–218 (2014)

    Article  Google Scholar 

  37. Ross, A.: Iris recognition: the path forward. Computer 43, 30–35 (2010)

    Article  Google Scholar 

  38. Safie, S.I., Nurfazira, H., Azavitra, Z., Soraghan, J.J., Petropoulakis, L.: Pulse active transformation: a non-invertible transformation with application to ECG biometric authentication. In: 2014 IEEE Region 10 Symposium. IEEE, New York (2014)

    Google Scholar 

  39. Shannon, C.E.: A Mathematical Theory of Communication. Bell Syst. Tech. J. 27(3), 379–423 (1948)

    Article  MathSciNet  MATH  Google Scholar 

  40. Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit. 37(11), 2245–2253 (2004)

    Article  Google Scholar 

  41. Teoh, A.B.J., Yip, W.K., Toh, K.A.: Cancellable biometrics and user-dependent discretization in biohash. Pattern Anal. Appl. 13, 301–307 (2010)

    Article  MathSciNet  Google Scholar 

  42. Wang, S., Hu, J.: A Hadamard Transformed-based method for the design of cancellable fingerprint templates. In: 2013 6th International Congress on Image and Signal Processing. IEEE, New York (2013)

    Google Scholar 

  43. Zuo, J., Ratha, K., Connell, J.H.: Cancelable iris biometric. In: Proceedings of 19th International Conference on Pattern Recognition. IEEE, New York (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abayomi Jegede .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Jegede, A., Udzir, N.I., Abdullah, A., Mahmod, R. (2017). A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation. In: Choi, D., Guilley, S. (eds) Information Security Applications. WISA 2016. Lecture Notes in Computer Science(), vol 10144. Springer, Cham. https://doi.org/10.1007/978-3-319-56549-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-56549-1_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-56548-4

  • Online ISBN: 978-3-319-56549-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics