Privacy-preserving cancelable multi-biometrics for identity information management

被引:1
|
作者
Zhou, Zhiyong [1 ,2 ,3 ,4 ]
Liu, Yuanning [1 ,2 ]
Zhu, Xiaodong [1 ,2 ]
Zhang, Shaoqiang [1 ,2 ]
Liu, Zhen [5 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, Changchun 130012, Peoples R China
[3] Kyushu Univ, Grad Sch, Fukuoka 8190395, Japan
[4] Kyushu Univ, Fac Informat Sci & Elect Engn, Fukuoka 8190395, Japan
[5] Nagasaki Inst Appl Sci, Grad Sch Engn, Nagasaki 8510193, Japan
基金
中国国家自然科学基金;
关键词
Cloud-based identity information management; Multi-biometric system; Cancelable template; Deep learning; GENERATE STRONG KEYS; FUZZY EXTRACTORS; MECHANISM; NETWORK; SCHEME;
D O I
10.1016/j.ipm.2024.103869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometrics have copious merits over traditional authentication schemes and promote information management. The demand for large-scale biometric identification and certification booms. In spite of enhanced efficiency and scalability in cloud-based biometrics, they suffer from compromised privacy during the transmission and storage of irrevocable biometric information. Existing biometric protection strategies fatally degrade the recognition performance, due to two folds: inherent drawbacks of uni-biometrics and inevitable information loss caused by over-protection. Hence, how to make a trade-off between performance and protection is an alluring challenge. To settle these issues, we are the first to present a cancelable multi-biometric system combining iris and periocular traits with recognition performance improved and privacy protection emphasized. Our proposed binary mask-based cross-folding integrates multi-instance and multi-modal fusion tactics. Further, the steganography based on a low-bit strategy conceals sensitive biometric fusion into QR code with transmission imperceptible. Subsequently, a finegrained hybrid attention dual-path network through stage-wise training models inter-class separability and intra-class compactness to extract more discriminative templates for biometric fusion. Afterward, the random graph neural network transforms the template into the protection domain to generate the cancelable template versus the malicious. Experimental results on two benchmark datasets, namely IITDv1 and MMUv1, show the proposed algorithm attains promising performance against state-of-the-art approaches in terms of equal error rate. What is more, extensive privacy analysis demonstrates prospective irreversibility, unlinkability, and revocability, respectively.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System
    Wang, Min
    Wang, Song
    Hu, Jiankun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4258 - 4272
  • [2] Privacy-Preserving Cancelable Biometric Authentication Based on RDM and ECC
    Wu, Lei
    Meng, Lingzhen
    Zhao, Shengnan
    Wei, Xia
    Wang, Hao
    IEEE ACCESS, 2021, 9 : 90989 - 91000
  • [3] Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing
    Kaur, Harkeerat
    Khanna, Pritee
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 30 - 41
  • [4] Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication
    Abidin, Aysajan
    Rua, Enrique Argones
    Peeters, Roel
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 21 - 29
  • [5] Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication
    Qiu, Jian
    Li, Hengjian
    Zhao, Chuan
    COMPUTERS & SECURITY, 2019, 82 : 1 - 14
  • [6] Information-theoretic privacy-preserving user authentication
    Kazempour, Narges
    Mirmohseni, Mahtab
    Aref, Mohammad Reza
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [7] Privacy-preserving blockchain-based authentication and trust management in VANETs
    Ahmed, Waheeb
    Di, Wu
    Mukathe, Daniel
    IET NETWORKS, 2022, 11 (3-4) : 89 - 111
  • [8] Multi-Access Filtering for Privacy-Preserving Fog Computing
    Gai, Keke
    Zhu, Liehuang
    Qiu, Meikang
    Xu, Kai
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 539 - 552
  • [9] Multi-Source Decentralized Transfer for Privacy-Preserving BCIs
    Zhang, Wen
    Wang, Ziwei
    Wu, Dongrui
    IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING, 2022, 30 : 2710 - 2720
  • [10] Trajectory as an Identity: Privacy-Preserving and Sybil-Resistant Authentication for Internet of Vehicles
    Li, Jiangtao
    Song, Zhaoheng
    Li, Yufeng
    Cao, Chenhong
    He, Yuanhang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021