A Novel Privacy Protection Scheme for Iris Identification

被引:4
|
作者
Zhang Lei [1 ,3 ]
Yu Lili [1 ]
Wang Bin [1 ,3 ]
Bian Xingchao [2 ]
机构
[1] Jiamusi Univ, Coll Informat Sci & Elect Technol, Jiamusi 154007, Peoples R China
[2] Suihua Univ, Coll Informat Engn, Suihua 152000, Peoples R China
[3] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin 150001, Heilongjiang, Peoples R China
关键词
Iris identification; Random projection; epsilon-differential privacy; Privacy protection;
D O I
10.1007/s11277-019-06688-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the development of iris technology, iris identification has been widely used in various domains, as an efficient security authentication pattern. However, as more and more people have been involved in this authentication, they have begun to realize that this pattern may also lead to privacy leakage during the procedure of security authentication. For one thing, the adversary can reverse the iris information of the user with the unauthorized iris template and gets the privacy. For another, the adversary can also get the iris template from other poorly managed application and utilizes this template to access the user's information in a special application to get the privacy of him. These two types of attack have seriously affected the promotion of iris identification. Thus, in order to cope with above attacks, and based on the conception of random projection and differential privacy protection, this paper proposes a novel privacy protection scheme short for RPDPP to protect the privacy of the user during the procedure of iris identification. In this scheme, a random projection is used in the phase of iris collection and template production, so that the iris template cannot be reversed into the iris information. Then before conserving the real template, several dummy templates that similar with the real iris template have been produced, and these dummies have disturbed the real template to comply with the restriction of -differential privacy. Thus, the real template of the user is difficult to be identified with other similar dummies, and the adversary cannot get the privacy of the user through multiple queries, even though he had obtained the iris template from other applications. At last, several experiments have been given with different parameters, and the protection ability has been compared with some similar algorithms, and then results of these experiments had further demonstrate the superiority of our proposed scheme.
引用
收藏
页码:2411 / 2425
页数:15
相关论文
共 50 条
  • [1] A Novel Privacy Protection Scheme for Iris Identification
    Zhang Lei
    Yu Lili
    Wang Bin
    Bian Xingchao
    Wireless Personal Communications, 2019, 109 : 2411 - 2425
  • [2] An effective iris biometric privacy protection scheme with renewability
    Wickramaarachchi, Wiraj Udara
    Zhao, Dongdong
    Zhou, Junwei
    Xiang, Jianwen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 80
  • [3] A NOVEL EYE REGION BASED PRIVACY PROTECTION SCHEME
    Lee, Dohyoung
    Plataniotis, Konstantinos N.
    2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2012, : 1845 - 1848
  • [4] A NOVEL PRIVACY PROTECTION SCHEME FOR PARTICIPATORY SENSING WITH INCENTIVES
    Zhang, Junsong
    Ma, Jian
    Wang, Wendong
    Liu, Yazhi
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1017 - 1021
  • [5] A Novel Biometric-based Authentication Scheme with Privacy Protection
    Li Huixian
    Pang Liaojun
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 295 - +
  • [6] Data Hiding in Iris Image for Privacy Protection
    Li, Sheng
    Chen, Xin
    Wang, Zichi
    Qian, Zhenxing
    Zhang, Xinpeng
    IETE TECHNICAL REVIEW, 2018, 35 : 34 - 41
  • [7] A New Scheme of LBS Privacy Protection
    Ming, Tang
    Wu, Qianhong
    Zhang Guoping
    He Lili
    Huan-guo, Zhang
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5219 - +
  • [8] Supervised Identity Privacy Protection Scheme in Blockchain
    Song J.-W.
    Zhang D.-W.
    Han X.
    Du Y.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (07): : 3292 - 3312
  • [9] A novel collaborative privacy protection scheme based on verifiable secret sharing and trust mechanism
    Zhang, Lei
    Cao, Mingzeng
    Li, Jing
    Zhang, Chenglin
    He, Lili
    COMPUTING, 2025, 107 (01)
  • [10] Data Aggregation Scheme for WSN with Privacy Protection
    Zhong, ZhiChu
    Guo, JiangHong
    Zhang, HaiFeng
    MATERIALS, MECHANICAL ENGINEERING AND MANUFACTURE, PTS 1-3, 2013, 268-270 : 1671 - 1674