A Novel Privacy Protection Scheme for Iris Identification

被引:4
|
作者
Zhang Lei [1 ,3 ]
Yu Lili [1 ]
Wang Bin [1 ,3 ]
Bian Xingchao [2 ]
机构
[1] Jiamusi Univ, Coll Informat Sci & Elect Technol, Jiamusi 154007, Peoples R China
[2] Suihua Univ, Coll Informat Engn, Suihua 152000, Peoples R China
[3] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin 150001, Heilongjiang, Peoples R China
关键词
Iris identification; Random projection; epsilon-differential privacy; Privacy protection;
D O I
10.1007/s11277-019-06688-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the development of iris technology, iris identification has been widely used in various domains, as an efficient security authentication pattern. However, as more and more people have been involved in this authentication, they have begun to realize that this pattern may also lead to privacy leakage during the procedure of security authentication. For one thing, the adversary can reverse the iris information of the user with the unauthorized iris template and gets the privacy. For another, the adversary can also get the iris template from other poorly managed application and utilizes this template to access the user's information in a special application to get the privacy of him. These two types of attack have seriously affected the promotion of iris identification. Thus, in order to cope with above attacks, and based on the conception of random projection and differential privacy protection, this paper proposes a novel privacy protection scheme short for RPDPP to protect the privacy of the user during the procedure of iris identification. In this scheme, a random projection is used in the phase of iris collection and template production, so that the iris template cannot be reversed into the iris information. Then before conserving the real template, several dummy templates that similar with the real iris template have been produced, and these dummies have disturbed the real template to comply with the restriction of -differential privacy. Thus, the real template of the user is difficult to be identified with other similar dummies, and the adversary cannot get the privacy of the user through multiple queries, even though he had obtained the iris template from other applications. At last, several experiments have been given with different parameters, and the protection ability has been compared with some similar algorithms, and then results of these experiments had further demonstrate the superiority of our proposed scheme.
引用
收藏
页码:2411 / 2425
页数:15
相关论文
共 50 条
  • [41] A Small-Size FHE Scheme for Better Privacy Protection of IoT
    Song, Wei-Tao
    Zhang, Wenzheng
    Tang, Dianhua
    Hu, Bin
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12909 - 12917
  • [42] A Location-Based Path Privacy Protection Scheme in Internet of Vehicles
    Yu, Haili
    Li, Guangshun
    Wu, JunHua
    Ren, Xinrong
    Cao, Jiabin
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 665 - 670
  • [43] A Markov Prediction-Based Privacy Protection Scheme for Continuous Query
    Zhang, Lei
    Li, Jing
    Yang, Songtao
    Liu, Yi
    Zhang, Xu
    Sun, Yue
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2019, 28 (09)
  • [44] A Trajectory Substitution Privacy Protection Scheme in location-based services
    Song, Cheng
    Zhang, Yadong
    Gu, Xinan
    Wang, Lei
    Liu, Zhizhong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (09) : 4771 - 4787
  • [45] Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives
    Zhang, Junsong
    He, Lei
    Zhang, Qikun
    Gan, Yong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (11): : 5654 - 5673
  • [46] Anonymous Identity-Based Key Scheme in Application of Privacy Protection
    Shen, Changjiang
    Yang, Lan
    Zhou, Chuansheng
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SPORTS, ARTS AND MANAGEMENT ENGINEERING (ICESAME 2017), 2017, 123 : 1529 - 1535
  • [47] The security of a strong proxy signature scheme with proxy signer privacy protection
    Lee, NY
    Lee, MF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 161 (03) : 807 - 812
  • [48] A Privacy Protection Scheme Based on Attribute Encryption in Mobile Social Networks
    Niu, Shufen
    Ge, Peng
    Mi, Song
    Su, Yun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (03) : 847 - 855
  • [49] A Blockchain-based Trustworthy Federated Learning Privacy Protection Scheme
    Liu, Xiaowei
    Li, Xiaohui
    Gu, Ai
    Lv, Siting
    Su, Jianan
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [50] Privacy Protection Scheme Combining Edge Intelligent Computing and Federated Learning
    Liu D.
    Pei X.
    Lai J.
    Wang R.
    Zhang F.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2023, 52 (01): : 95 - 101