Abstract
Biometric authentication is the use of unique human features to provide secure, reliable, friendly and convenient access to an environment or a computer installation. However, the use of biometrics as a means of authentication exposes legitimate users to security threats, privacy attacks and loss of identity. This paper proposes and implements a novel non-invertible transformation technique known as matrix transformation. Matrix transformation is a simple but powerful and effective method to achieve template revocability and prevent the recovery of original biometric data from secured templates. The approach provides a high level template security and user privacy. It is also robust against replay attack, cross matching and loss of identity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ANSI: Biometrics. http://www.iso.org/iso/iso_technical_committee.html?commid=313770
Adler, A.: Images can be regenerated from quantized match score data. In: Proceedings of Canadian Conference on Electrical and Computer Engineering, pp. 469–472. IEEE, New York (2004)
Benvenuto, C.J.: Galois field in cryptography. https://www.math.washinghton.edu/~morrow/333_12/papers/juan.pdf
Boult, T.: Robust distance measure for face recognition supporting revocable biometric tokens. In: Proceedings of 7th International Conference on Automatic Face and Gesture Recognition, pp. 560–566. IEEE, New York (2006)
Boult, T., Scheirer, W., Woodworth, R.: Revocable fingerprint biotokens: accuracy and security analysis. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. IEEE, New York (2007)
Bowler, K., Hollingsworth, K., Flynn, P.: Image understanding for iris: a survey. Comput. Vis. Image Underst. 110(2), 281–307 (2007)
Campisi, P., Egiazarian, K.: Blind Image Deconvolution: Theory and Applications. CRC Press, Boca Raton (2007)
Cappelli, R., Lumini, A., Maio, D., Maltoni, D.: Can fingerprints be reconstructed from ISO templates? In: 9th International Conference on Control, Automation, Robotics and Vision. IEEE, New York (2006)
CASIA-IrisV1. http://biometrics.idealtest.org/
Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)
Daugman, J., Downing, C.: Epigenetic randomness, complexity and singularity of human iris patterns. In: Proceedings of the Royal Society (London) Biological Sciences, vol. 268, pp. 1737–1740. The Royal Society, London (2001)
Färberböck, P., Hämmerle-Uhl, J., Kaaser, D., Pschernig, E., Uhl, A.: Transforming rectangular and polar iris images to enable cancelable biometrics. In: Campilho, A., Kamel, M. (eds.) ICIAR 2010. LNCS, vol. 6112, pp. 276–286. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13775-4_28
Feng, Y.C., Yuen, P.C.: Vulnerabilities in binary face template. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshop, pp. 105–110. IEEE, New York (2012)
Fenker, S.P., Bowyer, K.W.: Experimental evidence of a template aging effect in iris biometrics. In: Proceedings of IEEE Workshop on Applications of Computer Vision, pp. 232–239. IEEE, New York (2011)
Field, D.J.: Relations between the statistics of natural images and the response properties of cortical cells. J. Opt. Soc. Am. 4(12), 2379–2394 (1987)
Fuzhen, Z.: Matrix Theory. Springer, New York (2011)
Grassi, M., Faundez-Zanuy, M.: Protecting DCT templates for a face verification system by means of pseudo-random permutations. In: Cabestany, J., Sandoval, F., Prieto, A., Corchado, J.M. (eds.) IWANN 2009. LNCS, vol. 5517, pp. 1216–1223. Springer, Heidelberg (2009). doi:10.1007/978-3-642-02478-8_152
Goel, N., Bebis, G., Nefian, A.: Face recognition experiments with random projection. In: Proceedings of the SPIE, vol. 5779, pp. 426–437 (2005)
Grinshpan, A.: Linear Algebra: Permutation Matrices. http://www.math.drexel.edu/~tolya/permutations.pdf
Hämmerle-Uhl, J., Pschernig, E., Uhl, A.: Cancelable iris biometrics using block re-mapping and image warping. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 135–142. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04474-8_11
Hao, F., Anderson, R., Daugman, J.: Combining cryptography with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)
He, Y., Yap, K.H., Chen, L., Chau, L.P.: A novel hybrid model framework to blind color image deconvolution. IEEE Trans. Syst. Man Cybern. Part A Syst. Humans 38(4), 867–880 (2008)
Jain, A.K., Flynn, P.J., Ross, A.A.: Handbook of Biometrics. Springer, Heidelberg (2008)
Jain, A.K., Nandakumar K., Nagar A.: Biometric template security. EURASIP J. Adv. Sig. Process. Spec Issue Biometrics (2008). Springer-Verlag, Berlin Heidelberg
Jeong, M., Teoh, A.B.J.: Cancellable face biometrics system by combining independent component analysis coefficients. In: Sako, H., Franke, K.Y., Saitoh, S. (eds.) IWCF 2010. LNCS, vol. 6540, pp. 78–87. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19376-7_7
Li, S., Cot, A.C.: Attacks using reconstructed fingerprint. In: 2011 IEEE International Workshop on Information Forensics and Security. IEEE, New York (2011)
Masek, L.: Recognition of Human Iris for Biometric Identification. Upublished MSc Thesis. University of Western Australia (2003)
Moujahdi, C., Ghouzali, S., Mikram, M., Rziza, M., Bebis, G.: Spiral cube for biometric template protection. In: Elmoataz, A., Mammass, D., Lezoray, O., Nouboud, F., Aboutajdine, D. (eds.) ICISP 2012. LNCS, vol. 7340, pp. 235–244. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31254-0_27
Ouda, O., Tusamura, N., Nakaguchi, T.: Securing BioEncoded IrisCodes against correlation attacks. In: 2011 IEEE International Conference on Communications. IEEE, New York (2011)
Plesca, C., Morogan, L.: Efficient and robust perceptual hashing using log-polar image representation. In: 2014 10th International Conference on Communications. IEEE, New York (2014)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)
Ratha, N.K, Connell, J.H., Bolle, R.M., Chikkerur, S.: Cancellable biometrics: a case study in fingerprints. In: Proceedings of 18th International Conference on Pattern Recognition, pp. 370–373. IEEE, New York (2006)
Ratha, N.K., Connell, J.H., Bolle, R.M., Chikkerur, S.: Generating cancellable fingerprints templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)
Rathgeb, C., Uhl, A.: Secure iris recognition based on local intensity variations. In: Campilho, A., Kamel, M. (eds.) ICIAR 2010. LNCS, vol. 6112, pp. 266–275. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13775-4_27
Rathgeb, C., Uhl, A., Wild, P.: Iris-Biometrics: From Segmentation to Template Security. In: Jajodia, S. (ed.) Advances in Information Security. Springer, New York (2013)
Rathgeb, C., Breitinger, F., Busch, C., Baier, H.: On the application of bloom filters to iris biometrics. IET Biometrics 3(4), 207–218 (2014)
Ross, A.: Iris recognition: the path forward. Computer 43, 30–35 (2010)
Safie, S.I., Nurfazira, H., Azavitra, Z., Soraghan, J.J., Petropoulakis, L.: Pulse active transformation: a non-invertible transformation with application to ECG biometric authentication. In: 2014 IEEE Region 10 Symposium. IEEE, New York (2014)
Shannon, C.E.: A Mathematical Theory of Communication. Bell Syst. Tech. J. 27(3), 379–423 (1948)
Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit. 37(11), 2245–2253 (2004)
Teoh, A.B.J., Yip, W.K., Toh, K.A.: Cancellable biometrics and user-dependent discretization in biohash. Pattern Anal. Appl. 13, 301–307 (2010)
Wang, S., Hu, J.: A Hadamard Transformed-based method for the design of cancellable fingerprint templates. In: 2013 6th International Congress on Image and Signal Processing. IEEE, New York (2013)
Zuo, J., Ratha, K., Connell, J.H.: Cancelable iris biometric. In: Proceedings of 19th International Conference on Pattern Recognition. IEEE, New York (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Jegede, A., Udzir, N.I., Abdullah, A., Mahmod, R. (2017). A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation. In: Choi, D., Guilley, S. (eds) Information Security Applications. WISA 2016. Lecture Notes in Computer Science(), vol 10144. Springer, Cham. https://doi.org/10.1007/978-3-319-56549-1_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-56549-1_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-56548-4
Online ISBN: 978-3-319-56549-1
eBook Packages: Computer ScienceComputer Science (R0)