Abstract
Biometric authentication, with its unique and convenient features, is gaining popularity as a secure access control method for diverse systems and services. However, the inherent ambiguity of biometric data poses challenges when integrating it with cryptographic systems that require 100% accuracy, such as personal information number generation. To address this, we propose SP\(^2\)IN, a face bio-cryptosystem that utilizes a Low-Density Parity-Check Sum-Product decoder and fuzzy commitment. In our innovative face biometric cryptosystem, we employ fuzzy commitment for secure key extraction from biometric input, ensuring the protection of sensitive facial information without compromising the privacy of the raw data. To tackle facial biometric noise, we use a Low-Density Parity-Check Sum-Product decoder for error correction against variations. Our system was rigorously tested on public face datasets (LFW, AgeDB, CALFW), showcasing outstanding recognition rates: 99.43% (LFW), 90.43% (CALFW), 92.63% (AgeDB30).
Y. Liu and Y. Zhou—These authors contributed equally to this work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Paired corresponds to intra-user, unpaired corresponds to inter-user, these terms are used interchangeably.
References
Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25–31 (2004)
Spafford, E.H.: OPUS: preventing weak password choices. Comput. Secur. 11(3), 273–278 (1992)
Sandhya, M., Prasad, M.V.N.K.: Biometric template protection: a systematic literature review of approaches and modalities. In: Jiang, R., Al-maadeed, S., Bouridane, A., Crookes, D., Beghdadi, A. (eds.) Biometric Security and Privacy. SPST, pp. 323–370. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-47301-7_14
EuropeanParliament, General Data Protection Regulation (GDPR). https://gdpr-info.eu/
Lei, J., Pei, Q., Wang, Y., Sun, W., Liu, X.: PRIVFACE: fast privacy-preserving face authentication with revocable and reusable biometric credentials. IEEE Trans. Dependable Secur. Comput. 19, 3101–3112 (2021)
Walia, G.S., Aggarwal, K., Singh, K., Singh, K.: Design and analysis of adaptive graph based cancelable multi-biometrics approach. IEEE Trans. Dependable Secur. Comput. 19, 54–66 (2020)
Xi, K., Hu, J.: Bio-cryptography. In: Stavroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security, pp. 129–157. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-04117-4_7
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, ser. CCS 1999, ACM. New York, NY, USA, pp. 28–36. ACM (1999)
Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)
Kelkboom, E.J.C., Gökberk, B., Kevenaar, T.A.M., Akkermans, A.H.M., van der Veen, M.: “3D face’’: biometric template protection for 3D face recognition. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 566–573. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74549-5_60
Li, P., Yang, X., Qiao, H., Cao, K., Liu, E., Tian, J.: An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Syst. Appl. 39(7), 6562–6574 (2012)
Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011(1), 3 (2011)
Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Zémor, G.: Optimal iris fuzzy sketches. In: 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp. 1–6. IEEE (2007)
Chen, B., Chandran, V.: Biometric based cryptographic key generation from faces. In: 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp. 394–401. IEEE (2007)
Yang, W., et al.: Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem. IEEE Access 6, 36939–36947 (2018)
Gilkalaye, B.P., Rattani, A., Derakhshani, R.: Euclidean-distance based fuzzy commitment scheme for biometric template security. In: 2019 7th International Workshop on Biometrics and Forensics (IWBF), pp. 1–6 (2019)
Dong, X., Jin, Z., Zhao, L., Guo, Z.: Bio can crypto: an LDPC coded bio-cryptosystem on fingerprint cancellable template. In: 2021 IEEE International Joint Conference on Biometrics, pp. 1–8. IEEE (2021)
Adamovic, S., Milosavljevic, M., Veinovic, M., Sarac, M., Jevremovic, A.: Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics. IET Biometrics 6(2), 89–96 (2017)
Chen, L., Zhao, G., Zhou, J., Ho, A.T., Cheng, L.-M.: Face template protection using deep LDPC codes learning. IET Biometrics 8(3), 190–197 (2019)
Phillips, P.J., et al.: Overview of the face recognition grand challenge. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), vol. 1. pp, 947–954. IEEE (2005)
Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The FERET evaluation methodology for face-recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 1090–1104 (2000)
Sim, T., Baker, S., Bsat, M.: The CMU pose, illumination, and expression (PIE) database. In: Proceedings of fifth IEEE International Conference on Automatic Face Gesture Recognition, pp. 53–58. IEEE (2002)
Georghiades, A.S., Belhumeur, P.N., Kriegman, D.J.: From few to many: illumination cone models for face recognition under variable lighting and pose. IEEE Trans. Pattern Anal. Mach. Intell. 23(6), 643–660 (2001)
Rathgeb, C., Merkle, J., Scholz, J., Tams, B., Nesterowicz, V.: Deep face fuzzy vault: implementation and performance. Comput. Secur. 113, 102539 (2022)
Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690–4699 (2019)
Multiplexing and Channel Coding, Release 16. 3GPP Standard TS 38.212, V16.0.0 (2019)
Drozdowski, P., Struck, F., Rathgeb, C., Busch, C.: Benchmarking binarisation schemes for deep face templates. In:2018 25th IEEE International Conference on Image Processing, pp. 191–195. IEEE (2018)
Lim, M.-H., Teoh, A.B.J.: A novel encoding scheme for effective biometric discretization: linearly separable subcode. IEEE Trans. Pattern Anal. Mach. Intell. 35(2), 300–313 (2012)
Dang, T.K., Truong, Q.C., Le, T.T.B., Truong, H.: Cancellable fuzzy vault with periodic transformation for biometric template protection. IET Biometrics 5(3), 229–235 (2016)
He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)
Deng, J., Guo, J., Zhang, D., Deng, Y., Lu, X., Shi, S.: Lightweight face recognition challenge. In: Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops (2019)
Huang, G.B., Mattar, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. In: Workshop on Faces in Real-Life Images: Detection, Alignment, and Recognition (2008)
Zheng, T., Deng, W., Hu, J.: Cross-age LFW: a database for studying cross-age face recognition in unconstrained environments. arXiv preprint arXiv:1708.08197 (2017)
Moschoglou, S., Papaioannou, A., Sagonas, C., Deng, J., Kotsia, I., Zafeiriou, S.: AgeDB: the first manually collected, in-the-wild age database. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 51–59 (2017)
Daugman, J.: Biometric decision landscapes. University of Cambridge, Computer Laboratory, Technical report (2000)
Boddeti, V.N.: Secure face matching using fully homomorphic encryption. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–10. IEEE (2018)
Dong, X., Kim, S., Jin, Z., Hwang, J.Y., Cho, S., Teoh, A.B.J.: A secure chaff-less fuzzy vault for face identification system. ACM Trans. Multimedia Comput. Commun. Appl. 17, 1–22 (2021)
Zhang, K., Cui, H., Yu, Y.: Facial template protection via lattice-based fuzzy extractors. Cryptology ePrint Archive (2021)
Kumar Jindal, A., Chalamala, S., Kumar Jami, S.: Face template protection using deep convolutional neural network. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 462–470 (2018)
Gomez-Barrero, M., Galbally, J., Rathgeb, C., Busch, C.: General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1406–1420 (2017)
Acknowledgments
This work was supported by the National Natural Science Foundation of China (Nos. 62376003, 62306003) and the Anhui Provincial Natural Science Foundation (No. 2308085MF200).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, Y. et al. (2023). SP\(^2\)IN: Leveraging Fuzzy Commitment and LDPC Sum-Product Decoder for Key Generation from Face. In: Jia, W., et al. Biometric Recognition. CCBR 2023. Lecture Notes in Computer Science, vol 14463. Springer, Singapore. https://doi.org/10.1007/978-981-99-8565-4_33
Download citation
DOI: https://doi.org/10.1007/978-981-99-8565-4_33
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-8564-7
Online ISBN: 978-981-99-8565-4
eBook Packages: Computer ScienceComputer Science (R0)