Privacy-preserving cancelable multi-biometrics for identity information management

被引:1
|
作者
Zhou, Zhiyong [1 ,2 ,3 ,4 ]
Liu, Yuanning [1 ,2 ]
Zhu, Xiaodong [1 ,2 ]
Zhang, Shaoqiang [1 ,2 ]
Liu, Zhen [5 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, Changchun 130012, Peoples R China
[3] Kyushu Univ, Grad Sch, Fukuoka 8190395, Japan
[4] Kyushu Univ, Fac Informat Sci & Elect Engn, Fukuoka 8190395, Japan
[5] Nagasaki Inst Appl Sci, Grad Sch Engn, Nagasaki 8510193, Japan
基金
中国国家自然科学基金;
关键词
Cloud-based identity information management; Multi-biometric system; Cancelable template; Deep learning; GENERATE STRONG KEYS; FUZZY EXTRACTORS; MECHANISM; NETWORK; SCHEME;
D O I
10.1016/j.ipm.2024.103869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometrics have copious merits over traditional authentication schemes and promote information management. The demand for large-scale biometric identification and certification booms. In spite of enhanced efficiency and scalability in cloud-based biometrics, they suffer from compromised privacy during the transmission and storage of irrevocable biometric information. Existing biometric protection strategies fatally degrade the recognition performance, due to two folds: inherent drawbacks of uni-biometrics and inevitable information loss caused by over-protection. Hence, how to make a trade-off between performance and protection is an alluring challenge. To settle these issues, we are the first to present a cancelable multi-biometric system combining iris and periocular traits with recognition performance improved and privacy protection emphasized. Our proposed binary mask-based cross-folding integrates multi-instance and multi-modal fusion tactics. Further, the steganography based on a low-bit strategy conceals sensitive biometric fusion into QR code with transmission imperceptible. Subsequently, a finegrained hybrid attention dual-path network through stage-wise training models inter-class separability and intra-class compactness to extract more discriminative templates for biometric fusion. Afterward, the random graph neural network transforms the template into the protection domain to generate the cancelable template versus the malicious. Experimental results on two benchmark datasets, namely IITDv1 and MMUv1, show the proposed algorithm attains promising performance against state-of-the-art approaches in terms of equal error rate. What is more, extensive privacy analysis demonstrates prospective irreversibility, unlinkability, and revocability, respectively.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare
    Zhang, Xinzhe
    Wu, Lei
    Xu, Lijuan
    Liu, Zhien
    Su, Ye
    Wang, Hao
    Meng, Weizhi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [42] Fog-Enabled Privacy-Preserving Multi-Task Data Aggregation for Mobile Crowdsensing
    Yan, Xingfu
    Ng, Wing W. Y.
    Zhao, Bowen
    Liu, Yuxian
    Gao, Ying
    Wang, Xiumin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (03) : 1301 - 1316
  • [43] Privacy-preserving federated learning for collaborative medical data mining in multi-institutional settings
    Rahul Haripriya
    Nilay Khare
    Manish Pandey
    Scientific Reports, 15 (1)
  • [44] Privacy-Preserving Aggregation and Authentication of Multi-Source Smart Meters in a Smart Grid System
    Koo, Dongyoung
    Shin, Youngjoo
    Hur, Junbeom
    APPLIED SCIENCES-BASEL, 2017, 7 (10):
  • [45] CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors
    Zhang, Xiaojun
    Zhao, Jie
    Xu, Chunxiang
    Li, Hongwei
    Wang, Huaxiong
    Zhang, Yuan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1362 - 1375
  • [46] Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis
    Ma, Sha
    Ye, Zhiqing
    Huang, Qiong
    Jiang, Chengyu
    INFORMATION SCIENCES, 2024, 660
  • [47] Privacy-preserving trust management method based on blockchain for cross-domain industrial IoT
    Wu, Xu
    Liu, Yang
    Tian, Jie
    Li, Yuanpeng
    KNOWLEDGE-BASED SYSTEMS, 2024, 283
  • [48] Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum
    Morampudi, Mahesh Kumar
    Gonthina, Nagamani
    Bojjagani, Sriramulu
    Sharma, Neeraj Kumar
    Veeraiah, Duggineni
    SIGNAL IMAGE AND VIDEO PROCESSING, 2024, 18 (04) : 3915 - 3924
  • [49] Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT
    Chen, Yange
    Ping, Yuan
    Zhang, Zhili
    Wang, Baocang
    He, SuYu
    NEURAL COMPUTING & APPLICATIONS, 2021, 33 (10) : 4677 - 4694
  • [50] HealthDID: An efficient and authorizable multi-party privacy-preserving EMR sharing system based on DID
    Wu, Zuodong
    Zhang, Dawei
    COMPUTER STANDARDS & INTERFACES, 2025, 93