A Novel Privacy Protection Scheme for Iris Identification

被引:4
|
作者
Zhang Lei [1 ,3 ]
Yu Lili [1 ]
Wang Bin [1 ,3 ]
Bian Xingchao [2 ]
机构
[1] Jiamusi Univ, Coll Informat Sci & Elect Technol, Jiamusi 154007, Peoples R China
[2] Suihua Univ, Coll Informat Engn, Suihua 152000, Peoples R China
[3] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin 150001, Heilongjiang, Peoples R China
关键词
Iris identification; Random projection; epsilon-differential privacy; Privacy protection;
D O I
10.1007/s11277-019-06688-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the development of iris technology, iris identification has been widely used in various domains, as an efficient security authentication pattern. However, as more and more people have been involved in this authentication, they have begun to realize that this pattern may also lead to privacy leakage during the procedure of security authentication. For one thing, the adversary can reverse the iris information of the user with the unauthorized iris template and gets the privacy. For another, the adversary can also get the iris template from other poorly managed application and utilizes this template to access the user's information in a special application to get the privacy of him. These two types of attack have seriously affected the promotion of iris identification. Thus, in order to cope with above attacks, and based on the conception of random projection and differential privacy protection, this paper proposes a novel privacy protection scheme short for RPDPP to protect the privacy of the user during the procedure of iris identification. In this scheme, a random projection is used in the phase of iris collection and template production, so that the iris template cannot be reversed into the iris information. Then before conserving the real template, several dummy templates that similar with the real iris template have been produced, and these dummies have disturbed the real template to comply with the restriction of -differential privacy. Thus, the real template of the user is difficult to be identified with other similar dummies, and the adversary cannot get the privacy of the user through multiple queries, even though he had obtained the iris template from other applications. At last, several experiments have been given with different parameters, and the protection ability has been compared with some similar algorithms, and then results of these experiments had further demonstrate the superiority of our proposed scheme.
引用
收藏
页码:2411 / 2425
页数:15
相关论文
共 50 条
  • [21] A Patient Privacy Protection Scheme for Medical Information System
    Lu, Chenglang
    Wu, Zongda
    Liu, Mingyong
    Chen, Wei
    Guo, Junfang
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (06)
  • [22] Medicaldata privacy protection scheme supporting controlled sharing
    Guo Q.
    Tian Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (01): : 165 - 177
  • [23] Privacy Protection Smartcard Authentication Scheme in Cloud Computing
    FAN Kai
    DENG Hai
    LI Hui
    YANG Yintang
    Chinese Journal of Electronics, 2018, 27 (01) : 41 - 45
  • [24] A privacy protection scheme for telemedicine diagnosis based on double blockchain
    Wang, Wei
    Wang, Lianhai
    Zhang, Peijun
    Xu, Shujiang
    Fu, Kunlun
    Song, Lianxin
    Hu, Shanshan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [25] An efficient privacy protection scheme for data security in video surveillance
    Du, Ling
    Zhang, Wei
    Fu, Huazhu
    Ren, Wenqi
    Zhang, Xinpeng
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2019, 59 : 347 - 362
  • [26] A Novel Technique of Iris Identification for Biometric Systems
    Garagad, Vishwanath G.
    Iyer, Nalini C.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 973 - 978
  • [27] Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection
    Zhang, Xiaorui
    Sun, Xun
    Sun, Xingming
    Sun, Wei
    Jha, Sunil Kumar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02): : 3035 - 3050
  • [28] Privacy Protection Smartcard. Authentication Scheme in Cloud Computing
    Fan Kai
    Deng Hai
    Li Hui
    Yang Yintang
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (01) : 41 - 45
  • [29] A Traceable and Anonymous Authentication Ring Signature Scheme with Privacy Protection
    Zhao, Xiao
    Cao, Suzhen
    Wang, Zheng
    Xing, Dandan
    Zhou, Dawei
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 570 - 575
  • [30] Data Integrity Verification Scheme for Privacy Protection and Fair Payment
    Fu Y.
    Li Q.
    Zhang Z.
    Gao T.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (06): : 1343 - 1355