Secure Face Authentication Framework in Open Networks

被引:1
作者
Lee, Yongjin [1 ]
Lee, Yongki [2 ]
Chung, Yunsu [1 ]
Moon, Kiyoung [1 ]
机构
[1] ETRI, Software Res Lab, Taejon, South Korea
[2] Samsung Elect, Digital IP Dev Team, Yongin, South Korea
关键词
Face authentication; cancelable biometrics; one-time template; PRIVACY; EIGENFACES; BIOMETRICS;
D O I
10.4218/etrij.10.1510.0103
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In response to increased security concerns, biometrics is becoming more focused on overcoming or complementing conventional knowledge and possession-based authentication However, biometric authentication requires special care since the loss of biometric data is irrecoverable In this paper, we present a biometric authentication framework, where several novel techniques are applied to provide security and privacy First, a biometric template is saved in a transformed form This makes it possible for a template to be canceled upon its loss while the original biometric information is not revealed Second, when a user is registered with a server, a biometric template is stored m a special form, named a 'soft vault' This technique prevents impersonation attacks even if data m a server is disclosed to an attacker Finally, a one-time template technique is applied in order to prevent replay attacks against templates transmitted over networks In addition, the whole scheme keeps decision equivalence with conventional face authentication, and thus it does not decrease biometric recognition performance As a result, the proposed techniques construct a secure face authentication framework in open networks
引用
收藏
页码:950 / 960
页数:11
相关论文
共 24 条
[1]  
Ang R, 2005, LECT NOTES COMPUT SC, V3574, P242
[2]   Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection [J].
Belhumeur, PN ;
Hespanha, JP ;
Kriegman, DJ .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1997, 19 (07) :711-720
[3]   PalmHashing: a novel approach for cancelable biometrics [J].
Connie, T ;
Teoh, A ;
Goh, M ;
Ngo, D .
INFORMATION PROCESSING LETTERS, 2005, 93 (01) :1-5
[4]   On enabling secure applications through off-line biometric identification [J].
Davida, GI ;
Frankel, Y ;
Matt, BJ .
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, :148-157
[5]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[6]   Biohashing: two factor authentication featuring fingerprint data and tokenised random number [J].
Jin, ATB ;
Ling, DNC ;
Goh, A .
PATTERN RECOGNITION, 2004, 37 (11) :2245-2255
[7]  
Juels A, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P28, DOI 10.1145/319709.319714
[8]   A fuzzy vault scheme [J].
Juels, A ;
Sudan, M .
ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, :408-408
[9]   Face recognition with renewable and privacy preserving binary templates [J].
Kevenaar, TAM ;
Schrijen, GJ ;
van der Veen, M ;
Akkermans, AHM ;
Zuo, F .
FOURTH IEEE WORKSHOP ON AUTOMATIC IDENTIFICATION ADVANCED TECHNOLOGIES, PROCEEDINGS, 2005, :21-26
[10]   An analysis of BioHashing and its variants [J].
Kong, Adams ;
Cheung, King-Hong ;
Zhang, David ;
Kamel, Mohamed ;
You, Jane .
PATTERN RECOGNITION, 2006, 39 (07) :1359-1368