Privacy-preserving cancelable multi-biometrics for identity information management

被引:1
|
作者
Zhou, Zhiyong [1 ,2 ,3 ,4 ]
Liu, Yuanning [1 ,2 ]
Zhu, Xiaodong [1 ,2 ]
Zhang, Shaoqiang [1 ,2 ]
Liu, Zhen [5 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, Changchun 130012, Peoples R China
[3] Kyushu Univ, Grad Sch, Fukuoka 8190395, Japan
[4] Kyushu Univ, Fac Informat Sci & Elect Engn, Fukuoka 8190395, Japan
[5] Nagasaki Inst Appl Sci, Grad Sch Engn, Nagasaki 8510193, Japan
基金
中国国家自然科学基金;
关键词
Cloud-based identity information management; Multi-biometric system; Cancelable template; Deep learning; GENERATE STRONG KEYS; FUZZY EXTRACTORS; MECHANISM; NETWORK; SCHEME;
D O I
10.1016/j.ipm.2024.103869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometrics have copious merits over traditional authentication schemes and promote information management. The demand for large-scale biometric identification and certification booms. In spite of enhanced efficiency and scalability in cloud-based biometrics, they suffer from compromised privacy during the transmission and storage of irrevocable biometric information. Existing biometric protection strategies fatally degrade the recognition performance, due to two folds: inherent drawbacks of uni-biometrics and inevitable information loss caused by over-protection. Hence, how to make a trade-off between performance and protection is an alluring challenge. To settle these issues, we are the first to present a cancelable multi-biometric system combining iris and periocular traits with recognition performance improved and privacy protection emphasized. Our proposed binary mask-based cross-folding integrates multi-instance and multi-modal fusion tactics. Further, the steganography based on a low-bit strategy conceals sensitive biometric fusion into QR code with transmission imperceptible. Subsequently, a finegrained hybrid attention dual-path network through stage-wise training models inter-class separability and intra-class compactness to extract more discriminative templates for biometric fusion. Afterward, the random graph neural network transforms the template into the protection domain to generate the cancelable template versus the malicious. Experimental results on two benchmark datasets, namely IITDv1 and MMUv1, show the proposed algorithm attains promising performance against state-of-the-art approaches in terms of equal error rate. What is more, extensive privacy analysis demonstrates prospective irreversibility, unlinkability, and revocability, respectively.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] A Blockchain-Based Privacy-Preserving Trust and Reputation Management for Internet of Vehicles
    Wang, Hongyu
    Yang, Haitao
    Zhong, Wei
    Deng, Linfang
    Tong, Fei
    BLOCKCHAIN TECHNOLOGY AND APPLICATION, CBCS 2023, 2024, 2098 : 198 - 222
  • [22] Privacy-Preserving Public Auditing for Shared Cloud Data With Secure Group Management
    Kim, Dongmin
    Kim, Kee Sung
    IEEE ACCESS, 2022, 10 : 44212 - 44223
  • [23] Verifiable and Privacy-Preserving Traffic Flow Statistics for Advanced Traffic Management Systems
    Zhang, Chuan
    Zhu, Liehuang
    Ni, Jianbing
    Huang, Cheng
    Shen, Xuemin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (09) : 10336 - 10347
  • [24] AttrLeaks on the Edge: Exploiting Information Leakage from Privacy-Preserving Co-inference
    Wang, Zhibo
    Liu, Kaixin
    Hu, Jiahui
    Ren, Ju
    Guo, Hengchang
    Yuan, Wei
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (01) : 1 - 12
  • [25] Consent-based access control for secure and privacy-preserving health information exchange
    Zhang, Aiqing
    Bacchus, Abel
    Lin, Xiaodong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3496 - 3508
  • [26] Optimal Privacy-Preserving Policy Using Constrained Additive Noise to Minimize the Fisher Information
    Farokhi, Farhad
    Sandberg, Henrik
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [27] PPMCK: Privacy-preserving multi-party computing for K-means clustering
    Fan, Yongkai
    Bai, Jianrong
    Lei, Xia
    Lin, Weiguo
    Hu, Qian
    Wu, Guodong
    Guo, Jiaming
    Tan, Gang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 154 (154) : 54 - 63
  • [28] Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids
    Zhang, Xiaojun
    Huang, Chao
    Zhang, Yuan
    Cao, Sheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 4225 - 4239
  • [29] PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting
    Ma, Zhuoran
    Ma, Jianfeng
    Miao, Yinbin
    Choo, Kim-Kwang Raymond
    Liu, Ximeng
    Wang, Xiangyu
    Yang, Tengfei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 106 (106): : 545 - 558
  • [30] A privacy-preserving recommendation method based on multi-objective optimisation for mobile users
    Xu, Chonghuan
    Ding, Austin Shijun
    Liao, Stephen Shaoyi
    INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION, 2020, 16 (01) : 23 - 32