ABSTRACT
Biometric Facial Authentication has become a pervasive mode of authentication in recent years. With this surge in popularity, concerns over the security and privacy of biometrics-based systems have grown. Therefore, there is a need for a system that can address security and privacy issues while remaining user-friendly and practical. The BioCapsule scheme is a flexible solution that can be embedded in existing biometrics systems in order to provide robust security and privacy protections. While BioCapsules have been evaluated for their static face authentication capabilities, this paper extends the scheme to Active Authentication, where a user is continuously authenticated throughout a session. We use the MOBIO dataset, which contains video recordings of 150 individuals using mobile devices over several sessions, in order to evaluate the BioCapsule scheme within the domain of Active Authentication. We find that the BioCapsule scheme not only performs comparably to baseline, unsecured system performance, but in some cases exceeds baseline performance in terms of False Acceptance Rate, False Rejection Rate, and Equal Error Rate. Through our experiments, we demonstrate that the BioCapsule scheme is a powerful and practical addition to existing biometrics-based Active Authentication systems to provide robust security and privacy protections.
- Qiong Cao, Li Shen, Weidi Xie, Omkar M. Parkhi, and Andrew Zisserman. 2017. VGGFace2: A dataset for recognising faces across pose and age. CoRR abs/1710.08092 (2017). arXiv:1710.08092 http://arxiv.org/abs/1710.08092Google Scholar
- JV Chamary. 2017. No, Apple's face ID is not a "secure password". https://www.forbes.com/sites/jvchamary/2017/09/18/security-apple-face-id-iphone-x/Google Scholar
- David Crouse, Hu Han, Deepak Chandra, Brandon Barbello, and Anil K. Jain. 2015. Continuous authentication of mobile user: Fusion of face image and inertial Measurement Unit data. In 2015 International Conference on Biometrics (ICB). 135--142. Google ScholarCross Ref
- Jiankang Deng, Jia Guo, Niannan Xue, and Stefanos Zafeiriou. 2019. ArcFace: Additive Angular Margin Loss for Deep Face Recognition. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).Google ScholarCross Ref
- T. Phillips E. Sanchez. [n. d.]. BioCapsule Active Authentication Github Repository. https://github.com/Edwin-Sanchez2003/BioCapsule ([n. d.]).Google Scholar
- Gary B. Huang, Manu Ramesh, Tamara Berg, and Erik Learned-Miller. 2007. Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. Technical Report. University of Massachusetts, Amherst.Google Scholar
- Deep Insight. 2019. Face Analysis Project using MXNET Repository. Available at: https://github.com/deepinsight/insightface.Google Scholar
- A.K. Jain, A. Ross, and S. Prabhakar. 2004. An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology (2004), 4--20. Google ScholarDigital Library
- Ganiyev Salim Karimovich and Khudoykulov Zarif Turakulovich. 2016. Biometric cryptosystems: Open issues and challenges. In ICISCT. 1--3. Google ScholarCross Ref
- Sepehr Keykhaie and Samuel Pierre. 2021. Lightweight and secure face-based active authentication for mobile users. IEEE Transactions on Mobile Computing (2021).Google ScholarCross Ref
- Elie Khoury, Laurent El Shafey, Christopher McCool, Manuel Günther, and Sébastien Marcel. 2014. Bi-modal biometric authentication on mobile phones in challenging conditions. Image and Vision Computing (2014), 1147--1160. Google ScholarDigital Library
- Haiping Lu, Karl Martin, Francis Bui, K. N. Plataniotis, and Dimitris Hatzinakos. 2009. Face recognition with biometric encryption for privacy-enhancing self-exclusion. In 2009 16th International Conference on Digital Signal Processing. 1--8. Google ScholarCross Ref
- Paul Mozur. 2018. Inside China's dystopian dreams: A.I., shame and lots of cameras. https://www.nytimes.com/2018/07/08/business/china-surveillance-technology.htmlGoogle Scholar
- Tyler Phillips, Xiaoyuan Yu, Brandon Haakenson, Shreya Goyal, Xukai Zou, Saptarshi Purkayastha, and Huanmei Wu. 2020. AuthN-AuthZ: Integrated, User-Friendly and Privacy-Preserving Authentication and Authorization. In 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). 189--198. Google ScholarCross Ref
- Tyler Phillips, Xukai Zou, Feng Li, and Ninghui Li. 2019. Enhancing Biometric-Capsule-Based Authentication and Facial Recognition via Deep Learning. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (Toronto ON, Canada) (SACMAT '19). Association for Computing Machinery, New York, NY, USA, 141--146. Google ScholarDigital Library
- S. Prabhakar, S. Pankanti, and A.K. Jain. 2003. Biometric recognition: security and privacy concerns. IEEE Security Privacy (2003), 33--42. Google ScholarDigital Library
- D. Sandberg. 2015. FaceNet and MTCNN Github Repository. Available at: https://github.com/davidsandberg/facenet.Google Scholar
- M. Savvides, B.V.K. Vijaya Kumar, and P.K. Khosla. 2004. Cancelable biometric filters for face recognition. In Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004. 922--925 Vol.3. Google ScholarCross Ref
- Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. FaceNet: A Unified Embedding for Face Recognition and Clustering. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).Google ScholarCross Ref
- Yan Sui, Xukai Zou, Eliza Y. Du, and Feng Li. 2014. Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method. IEEE Trans. Comput. (2014), 902--916. Google ScholarDigital Library
- U. Uludag, S. Pankanti, S. Prabhakar, and A.K. Jain. 2004. Biometric cryptosystems: issues and challenges. Proc. IEEE (2004), 948--960. Google ScholarCross Ref
- Kaipeng Zhang, Zhanpeng Zhang, Zhifeng Li, and Yu Qiao. 2016. Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks. IEEE Signal Processing Letters (2016), 1499--1503. Google ScholarCross Ref
Index Terms
- Advancing Active Authentication for User Privacy and Revocability with BioCapsules
Recommendations
Continuous user authentication using multi-modal biometrics
As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security - particularly authentication. With the widely documented poor use of PINs, Active Authentication is designed to overcome the ...
Design, implementation, and assessment of a usable multi-biometric continuous authentication system
Authentication mechanisms typically verify the user identity only at login, or with tedious explicit authentication requests that improve security at the expense of usability. However, especially for critical systems, workstations have to be tightly and ...
An Efficient Biometric Based Remote User Authentication Technique for Multi-server Environment
With the increasing demand of remote user authentication process for accessing many Internet based applications, biometrics based authentication mechanisms are highly being adopted. But using biometrics for these authentication mechanisms the features ...
Comments