A cancellable iris template protection scheme based on inverse merger and Bloom filter

IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Information Security and Applications Pub Date : 2024-07-30 DOI:10.1016/j.jisa.2024.103849
Qianrong Zheng , Jianwen Xiang , Rui Hao , Xuemin Zhang , Songsong Liao , Dongdong Zhao
{"title":"A cancellable iris template protection scheme based on inverse merger and Bloom filter","authors":"Qianrong Zheng ,&nbsp;Jianwen Xiang ,&nbsp;Rui Hao ,&nbsp;Xuemin Zhang ,&nbsp;Songsong Liao ,&nbsp;Dongdong Zhao","doi":"10.1016/j.jisa.2024.103849","DOIUrl":null,"url":null,"abstract":"<div><p>Iris recognition has found extensive applications in real-world situations and financial contexts. However, Iris template protection schemes are highly vulnerable to well-planned attacks that can lead to the leakage of personal information. Once biological information is compromised, this loss is irreversible for the individual. Cancelable protection schemes for iris templates based on the Bloom filter have substantial attention in the field of iris biometrics. Nevertheless, Bloom filter-based template protection schemes face specific security challenges. Therefore, it is crucial to propose a method to protect iris templates that is both secure and efficient. To address irreversible limitations in security analysis, we propose a template protection scheme, a cancelable iris biometric protection scheme based on inverse merger and Bloom filter. The primary idea of the proposed scheme is to perform an inverse merger operation on the acquired codewords before mapping the iris templates to the Bloom filter specifically. Through a comparison of the sizes between the original templates and their inverted counterparts, the template with the smaller size is chosen as the definitive result, subsequently being mapped into the Bloom filter. Our proposed scheme exhibits significant advancements in accuracy across multiple datasets, as evidenced by empirical validations. In the optimal case, our model achieves an excellent performance of 98.04% in terms of GAR, while achieving a significant reduction of 0.51% in terms of EER. Furthermore, a comparative analysis with existing iris template protection methods is performed to evaluate its relative effectiveness in resisting the attack of averaging the columns of a block. The results demonstrate that the scheme exhibits robust resistance to such attacks. The experimental analysis demonstrated that the scheme provided a good balance between accuracy and safety.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103849"},"PeriodicalIF":3.8000,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212624001510","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Iris recognition has found extensive applications in real-world situations and financial contexts. However, Iris template protection schemes are highly vulnerable to well-planned attacks that can lead to the leakage of personal information. Once biological information is compromised, this loss is irreversible for the individual. Cancelable protection schemes for iris templates based on the Bloom filter have substantial attention in the field of iris biometrics. Nevertheless, Bloom filter-based template protection schemes face specific security challenges. Therefore, it is crucial to propose a method to protect iris templates that is both secure and efficient. To address irreversible limitations in security analysis, we propose a template protection scheme, a cancelable iris biometric protection scheme based on inverse merger and Bloom filter. The primary idea of the proposed scheme is to perform an inverse merger operation on the acquired codewords before mapping the iris templates to the Bloom filter specifically. Through a comparison of the sizes between the original templates and their inverted counterparts, the template with the smaller size is chosen as the definitive result, subsequently being mapped into the Bloom filter. Our proposed scheme exhibits significant advancements in accuracy across multiple datasets, as evidenced by empirical validations. In the optimal case, our model achieves an excellent performance of 98.04% in terms of GAR, while achieving a significant reduction of 0.51% in terms of EER. Furthermore, a comparative analysis with existing iris template protection methods is performed to evaluate its relative effectiveness in resisting the attack of averaging the columns of a block. The results demonstrate that the scheme exhibits robust resistance to such attacks. The experimental analysis demonstrated that the scheme provided a good balance between accuracy and safety.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于反向合并和布鲁姆滤波器的可取消虹膜模板保护方案
虹膜识别技术在现实世界和金融领域得到了广泛应用。然而,虹膜模板保护方案极易受到精心策划的攻击,从而导致个人信息泄露。一旦生物信息被泄露,这种损失对个人来说是不可逆转的。基于布鲁姆滤波器的虹膜模板可取消保护方案在虹膜生物识别领域备受关注。然而,基于布鲁姆滤波器的模板保护方案面临着特定的安全挑战。因此,提出一种既安全又高效的虹膜模板保护方法至关重要。为了解决安全分析中不可逆转的局限性,我们提出了一种模板保护方案,一种基于反合并和布鲁姆滤波器的可取消虹膜生物识别保护方案。该方案的主要思想是在将虹膜模板映射到布鲁姆滤波器之前,对获取的编码词进行反合并操作。通过比较原始模板和反合并模板的大小,选择较小的模板作为最终结果,然后映射到布鲁姆滤波器中。通过经验验证,我们提出的方案在多个数据集的准确性上都有显著提高。在最优情况下,我们的模型在 GAR 方面取得了 98.04% 的优异成绩,同时在 EER 方面显著降低了 0.51%。此外,我们还与现有的虹膜模板保护方法进行了对比分析,以评估其在抵御对区块列进行平均化处理的攻击方面的相对有效性。结果表明,该方案对此类攻击具有很强的抵御能力。实验分析表明,该方案在准确性和安全性之间取得了良好的平衡。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Information Security and Applications
Journal of Information Security and Applications Computer Science-Computer Networks and Communications
CiteScore
10.90
自引率
5.40%
发文量
206
审稿时长
56 days
期刊介绍: Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.
期刊最新文献
Fed-LSAE: Thwarting poisoning attacks against federated cyber threat detection system via Autoencoder-based latent space inspection Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones BCRS-DS: A Privacy-protected data sharing scheme for IoT based on blockchain and certificateless ring signature Privacy-preserving verifiable fuzzy phrase search over cloud-based data Robust coverless video steganography based on pose estimation and object tracking
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1