Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 4519548, 9 pages
https://doi.org/10.1155/2018/4519548
Research Article

Iris Template Protection Based on Local Ranking

Hubei Key Laboratory of Transportation Internet of Things, School of Computer Science and Technology, Wuhan University of Technology, Wuhan, Hubei, China

Correspondence should be addressed to Jianwen Xiang; nc.ude.tuhw@gnaixwj

Received 29 September 2017; Accepted 21 January 2018; Published 18 February 2018

Academic Editor: Kai Cao

Copyright © 2018 Dongdong Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Information Technology-Security Techniques-Biometric Information Protection. ISO/IEC JTC1 SC27 IS 24745, 2011, http://www.iso.org/iso/catalogue_detail?csnumber=52946.
  2. C. Rathgeb and A. Uhl, “A survey on biometric cryptosystems and cancelable biometrics,” EURASIP Journal on Information Security, vol. 2011, article no. 3, pp. 1–25, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. K. Nandakumar and A. K. Jain, “Biometric template protection: Bridging the performance gap between theory and practice,” IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 88–100, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. I. Natgunanathan, A. Mehmood, Y. Xiang, G. Beliakov, and J. Yearwood, “Protection of Privacy in Biometric Data,” IEEE Access, vol. 4, pp. 880–892, 2016. View at Publisher · View at Google Scholar · View at Scopus
  5. CASIA-IrisV3 and CASIA-IrisV4, Institute of Automation (IA, Chinese Academy of Sciences (CAS), 2017, http://biometrics.idealtest.org/.
  6. H. Proenca and L. A. Alexandre, “UBIRIS: A Noisy Iris Image Database,” in Proceedings of the 13th International Conference on Image Analysis and Processing - ICIAP 2005, vol. LNCS 3617, pp. 970–977, Springer, Cagliari, Italy, 2005. View at Publisher · View at Google Scholar
  7. “MMU Iris Image Database,” http://pesona.mmu.edu.my/~ccteo/.
  8. A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in Proceedings of the 1999 6th ACM Conference on Computer and Communications Security (ACM CCS), pp. 28–36, November 1999. View at Scopus
  9. A. Juels and M. Sudan, “A fuzzy vault scheme,” Designs, Codes and Cryptography. An International Journal, vol. 38, no. 2, pp. 237–257, 2006. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy extractors: how to generate strong keys from biometrics and other noisy data,” in Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, pp. 523–540, Springer, Berlin. View at Publisher · View at Google Scholar · View at MathSciNet
  11. J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zémor, “Optimal iris fuzzy sketches,” in Proceedings of the 1st IEEE International Conference on Biometrics: Theory, Applications, and Systems, BTAS '07, pp. 1–6, USA, September 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. A. T. B. Jin, D. N. C. Ling, and A. Goh, “Biohashing: Two factor authentication featuring fingerprint data and tokenised random number,” Pattern Recognition, vol. 37, no. 11, pp. 2245–2255, 2004. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Lumini and L. Nanni, “An improved BioHashing for human authentication,” Pattern Recognition, vol. 40, no. 3, pp. 1057–1065, 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. A. B. J. Teoh, Y. W. Kuan, and S. Lee, “Cancellable biometrics and annotations on BioHash,” Pattern Recognition, vol. 41, no. 6, pp. 2034–2044, 2008. View at Publisher · View at Google Scholar · View at Scopus
  15. C. Rathgeb, F. Breitinger, and C. Busch, “Alignment-free cancelable iris biometric templates based on adaptive bloom filters,” in Proceedings of the 6th IAPR International Conference on Biometrics, ICB 2013, pp. 1–8, Spain, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. J. Zuo, N. K. Ratha, and J. H. Connell, “Cancelable iris biometric,” in Proceedings of the 2008 19th International Conference on Pattern Recognition (ICPR), pp. 1–4, Tampa, FL, USA, December 2008. View at Publisher · View at Google Scholar
  17. J. Hämmerle-Uhl, E. Pschernig, and A. Uhl, “Cancelable iris biometrics using block re-mapping and image warping,” in Proceedings of the the 12th International Conference on Information Security (ISC), pp. 135–142, Springer. View at Publisher · View at Google Scholar · View at Scopus
  18. J. K. Pillai, V. M. Patel, R. Chellappa, and N. K. Ratha, “Secure and robust iris recognition using random projections and sparse representations,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, no. 9, pp. 1877–1893, 2011. View at Publisher · View at Google Scholar · View at Scopus
  19. D. Zhao, W. Luo, R. Liu, and L. Yue, “Negative iris recognition,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 1, pp. 112–125, 2015. View at Publisher · View at Google Scholar · View at Scopus
  20. F. Hao, R. Anderson, and J. Daugman, “Combining crypto with biometrics effectively,” IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081–1088, 2006. View at Publisher · View at Google Scholar · View at Scopus
  21. T. Ignatenko and F. M. J. Willems, “Information leakage in fuzzy commitment schemes,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 337–348, 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. E. J. C. Kelkboom, J. Breebaart, T. A. M. Kevenaar, I. Buhan, and R. N. J. Veldhuis, “Preventing the decodability attack based cross-matching in a fuzzy commitment scheme,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 107–121, 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. K. Simoens, P. Tuyls, and B. Preneel, “Privacy weaknesses in biometric sketches,” in Proceedings of the 30th IEEE Symposium on Security and Privacy, pp. 188–203, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  24. C. Rathgeb and A. Uhl, “Statistical attack against iris-biometric fuzzy commitment schemes,” in Proceedings of the 2011 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2011, USA, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. Y. J. Lee, K. Bae, S. J. Lee, K. R. Park, and J. Kim, “Biometric key binding: Fuzzy vault based on iris images,” in Proceedings of the International Conference on Biometrics (ICB 2007), pp. 800–808, Springer, Berlin, Germany. View at Scopus
  26. E.-C. Chang, R. Shen, and F. W. Teo, “Finding the original point set hidden among chaff,” in Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06, pp. 182–188, Taiwan, March 2007. View at Publisher · View at Google Scholar · View at Scopus
  27. W. J. Scheirer and T. E. Boult, “Cracking fuzzy vaults and biometric encryption,” in Proceedings of the 2007 Biometrics Symposium, BSYM, pp. 1–6, USA, September 2007. View at Publisher · View at Google Scholar · View at Scopus
  28. H. T. Poon and A. Miri, “A collusion attack on the fuzzy vault scheme,” International Journal of Information Security, vol. 1, pp. 27–34, 2009. View at Google Scholar
  29. F. H. Álvarez, H. E. Luis, and S.-A. Carmen, “Biometric fuzzy extractor scheme for iris templates,” in Proceedings of the 2009 World Congress in Computer Science, Computer Engineering, pp. 563–569, 2009.
  30. J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zémor, “Theoretical and practical boundaries of binary secure sketches,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 4, pp. 673–683, 2008. View at Publisher · View at Google Scholar · View at Scopus
  31. M. Blanton and M. Aliasgari, “Analysis of reusability of secure sketches and fuzzy extractors,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 9, pp. 1433–1445, 2013. View at Publisher · View at Google Scholar · View at Scopus
  32. A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, “An analysis of BioHashing and its variants,” Pattern Recognition, vol. 39, no. 7, pp. 1359–1368, 2006. View at Publisher · View at Google Scholar · View at Scopus
  33. Y. Lee, Y. Chung, and K. Moon, “Inverse operation and preimage attack on biohashing,” in Proceedings of the 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, CIB 2009, pp. 92–97, USA, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  34. P. Lacharme, E. Cherrier, and C. Rosenberger, “Preimage attack on biohashing,” in In 2013 International Conference on Security and Cryptography (SECRYPT), pp. 1–8, July 2013.
  35. O. Ouda, N. Tsumura, and T. Nakaguchi, “Tokenless cancelable biometrics scheme for protecting iriscodes,” in Proceedings of the 2010 20th International Conference on Pattern Recognition, ICPR 2010, pp. 882–885, Turkey, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  36. J. Hermans, B. Mennink, and R. Peeters, “When a bloom filter is a doom filter: security assessment of a novel iris biometric template protection system,” in Proceedings of the In 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–6, 2014.
  37. J. Bringer, C. Morel, and C. Rathgeb, “Security analysis of Bloom filter-based iris biometric template protection,” in Proceedings of the 8th IAPR International Conference on Biometrics, ICB 2015, pp. 527–534, Thailand, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  38. M. Gomez-Barrero, C. Rathgeb, J. Galbally, C. Busch, and J. Fierrez, “Unlinkable and irreversible biometric template protection based on bloom filters,” Information Sciences, vol. 370/371, pp. 18–32, 2016. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  39. Y.-L. Lai, Z. Jin, A. B. Jin Teoh et al., “Cancellable iris template generation based on Indexing-First-One hashing,” Pattern Recognition, vol. 64, pp. 105–117, 2017. View at Publisher · View at Google Scholar · View at Scopus
  40. L. Masek, Recognition of human iris patterns for biometric identification [Master, thesis], University of Western Australia, 2003.
  41. E. Krichen, A. Mellakh, P. V. Anh, S. Salicetti, and B. Dorizzi, “A biometric reference system for iris,” OSIRIS Version, vol. 4.1, 2013. View at Google Scholar
  42. N. Othman, B. Dorizzi, and S. Garcia-Salicetti, “OSIRIS: An open source iris recognition software,” Pattern Recognition Letters, vol. 82, pp. 124–131, 2016. View at Publisher · View at Google Scholar · View at Scopus