Palm vein template protection scheme for resisting similarity attack

IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Computers & Security Pub Date : 2024-11-24 DOI:10.1016/j.cose.2024.104227
Yunpeng Li, Wei Wu, Yuan Zhang, Chuanyang Li
{"title":"Palm vein template protection scheme for resisting similarity attack","authors":"Yunpeng Li,&nbsp;Wei Wu,&nbsp;Yuan Zhang,&nbsp;Chuanyang Li","doi":"10.1016/j.cose.2024.104227","DOIUrl":null,"url":null,"abstract":"<div><div>Palm vein recognition technology has rapidly developed due to its high confidentiality and the advantages of liveness detection. Various palm vein template protection methods have emerged to safeguard palm vein data from theft and attack. To fulfill the performance loss requirement of the ideal biometric template protection scheme, these methods make the distribution of the original palm vein data and the palm vein protection templates have a strong distance preserving property (similarity preserving), making it difficult to defend against similarity attack (SA). To address these risks and prevent palm vein data leakage, we propose a Nonlinear Spectral Hashing (NSH) method for palm vein template protection. To obtain palm vein templates with both performance and security, the method first performs random projection on palm vein data to obtain revocable and unlinkable palm vein features. Subsequently, through spectral graph partitioning, it achieves mapping with a preserved similarity structure for palm veins, avoiding excessive performance loss. The method then employs a nonlinear activation function to alter the distribution of palm vein templates with large post-mapping differences, resulting in a uniform distribution of inter-class distances for palm vein data. By reducing the distance-preserving properties, the method enhances protection against similarity attacks. Finally, a sign function is applied to obtain non-invertible binary palm vein templates. Experimental evaluations on the public Tongji University palm vein database assess the method's non-invertibility, revocability, unlinkability, resistance to similarity attack, and recognition performance. The results indicate an Equal Error Rate (EER) of 0.50 %, demonstrating the method's ability to maintain good recognition performance while ensuring high security.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"150 ","pages":"Article 104227"},"PeriodicalIF":4.8000,"publicationDate":"2024-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404824005339","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Palm vein recognition technology has rapidly developed due to its high confidentiality and the advantages of liveness detection. Various palm vein template protection methods have emerged to safeguard palm vein data from theft and attack. To fulfill the performance loss requirement of the ideal biometric template protection scheme, these methods make the distribution of the original palm vein data and the palm vein protection templates have a strong distance preserving property (similarity preserving), making it difficult to defend against similarity attack (SA). To address these risks and prevent palm vein data leakage, we propose a Nonlinear Spectral Hashing (NSH) method for palm vein template protection. To obtain palm vein templates with both performance and security, the method first performs random projection on palm vein data to obtain revocable and unlinkable palm vein features. Subsequently, through spectral graph partitioning, it achieves mapping with a preserved similarity structure for palm veins, avoiding excessive performance loss. The method then employs a nonlinear activation function to alter the distribution of palm vein templates with large post-mapping differences, resulting in a uniform distribution of inter-class distances for palm vein data. By reducing the distance-preserving properties, the method enhances protection against similarity attacks. Finally, a sign function is applied to obtain non-invertible binary palm vein templates. Experimental evaluations on the public Tongji University palm vein database assess the method's non-invertibility, revocability, unlinkability, resistance to similarity attack, and recognition performance. The results indicate an Equal Error Rate (EER) of 0.50 %, demonstrating the method's ability to maintain good recognition performance while ensuring high security.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
抵御相似性攻击的掌静脉模板保护方案
手掌静脉识别技术因其高度保密性和活体检测的优势而得到迅速发展。为了保护掌静脉数据不被窃取和攻击,各种掌静脉模板保护方法层出不穷。为了满足理想生物特征模板保护方案的性能损失要求,这些方法使得原始掌静脉数据和掌静脉保护模板的分布具有很强的距离保持特性(相似性保持),从而难以抵御相似性攻击(SA)。为了解决这些风险并防止掌静脉数据泄露,我们提出了一种非线性频谱散列(NSH)方法来保护掌静脉模板。为了获得兼具性能和安全性的掌静脉模板,该方法首先对掌静脉数据进行随机投影,以获得可撤销且不可链接的掌静脉特征。随后,通过谱图分割,该方法实现了保留相似性结构的手掌静脉映射,避免了过多的性能损失。然后,该方法采用非线性激活函数来改变映射后差异较大的手掌静脉模板的分布,从而使手掌静脉数据的类间距离分布均匀。通过降低距离保留属性,该方法增强了对相似性攻击的防护能力。最后,应用符号函数获得不可逆转的二进制手掌静脉模板。在同济大学公共手掌静脉数据库上进行的实验评估评估了该方法的不可逆性、可撤销性、不可链接性、抗相似性攻击能力和识别性能。结果表明,等效错误率(EER)为 0.50%,表明该方法在确保高安全性的同时,还能保持良好的识别性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computers & Security
Computers & Security 工程技术-计算机:信息系统
CiteScore
12.40
自引率
7.10%
发文量
365
审稿时长
10.7 months
期刊介绍: Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world. Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.
期刊最新文献
Palm vein template protection scheme for resisting similarity attack A reliability anomaly detection method based on enhanced GRU-Autoencoder for Vehicular Fog Computing services A cyber-resilient open architecture for drone control AECR: Automatic attack technique intelligence extraction based on fine-tuned large language model CD-Net: Robust mobile traffic classification against apps updating
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1