toplogo
Sign In

Generating Cancelable Biometric Templates using Reverse Boolean XOR


Core Concepts
A novel scheme for generating cancelable biometric templates using visual secret sharing and reverse Boolean XOR operation.
Abstract

The paper proposes three different methods (M1, M2, M3) for generating cancelable biometric templates using visual secret sharing.

M1 uses one original biometric image as the secret and n-1 randomly chosen gray images as cover images. M2 uses one original biometric image as the secret and n-1 randomly permuted versions of the original image as cover images. M3 uses both the secret image and the cover images as randomly permuted versions of the original biometric image.

The proposed methods involve the following steps:

  1. Generation of temporary shares by XORing the secret image with the cover images.
  2. Generation of noisy shares by XORing the temporary shares.
  3. Generation of the final secret shares by performing left bitwise reversal on the noisy shares.

The performance of the proposed methods is evaluated using various metrics like correlation coefficient, mean square error, mean absolute error, PSNR, SSIM, NPCR, and UACI. The results show that M3 generates the best quality cancelable templates, with the secret shares not revealing any information about the original biometric.

edit_icon

Customize Summary

edit_icon

Rewrite with AI

edit_icon

Generate Citations

translate_icon

Translate Source

visual_icon

Generate MindMap

visit_icon

Visit Source

Stats
The original biometric image has a dimension of 112x94 for the ORL face database and 320x240 for the IIT Delhi iris database.
Quotes
"The major advantage of this technique over other two methods are (i) its Secret Shares do not reveal any partial and full information about the original Biometric image (ii) If anyhow an intruder accessed all Secret Shares, after applying reverse engineering process if Secret image S1 and n-1 Cover images are retrieved, which are again randomly permuted version of original Secret image (distorted). Hence it proofs the non-invertible property of Cancelable Biometric based application."

Deeper Inquiries

How can the proposed methods be extended to work with other biometric modalities beyond face and iris?

The proposed methods for generating cancelable biometric templates using Visual Secret Sharing can be extended to work with other biometric modalities by adapting the techniques to suit the specific characteristics of each modality. For instance, for fingerprint biometrics, the original biometric image could be the fingerprint image, and the cover images could be variations of the fingerprint pattern. The process of generating temporary shares, noisy shares, and secret shares can be modified to accommodate the unique features of fingerprint data. Similarly, for modalities like voice or gait recognition, the original biometric data can be processed in a way that preserves the individual's identity while introducing distortion for security purposes. By customizing the algorithms and procedures to the requirements of different biometric modalities, the proposed methods can be effectively applied beyond face and iris recognition.

What are the potential limitations or drawbacks of using visual secret sharing for cancelable biometric template generation?

While visual secret sharing is a promising technique for generating cancelable biometric templates, there are some potential limitations and drawbacks to consider: Storage and Transmission Overhead: Visual secret sharing involves storing and transmitting multiple shares, which can increase the storage requirements and communication overhead. This may not be practical in scenarios where resources are limited or bandwidth is constrained. Vulnerability to Collusion Attacks: Visual secret sharing schemes can be vulnerable to collusion attacks, where multiple shares are combined to reveal the original biometric data. This poses a security risk if an attacker gains access to multiple shares and can reconstruct the original template. Limited Scalability: Visual secret sharing may face challenges in scalability when dealing with a large number of users or templates. Managing and distributing shares for a large biometric database can become complex and resource-intensive. Quality Degradation: The process of generating noisy shares and secret shares in visual secret sharing can introduce quality degradation in the reconstructed biometric template. This degradation may impact the performance of biometric recognition systems. Complexity of Implementation: Implementing visual secret sharing schemes for cancelable biometric templates may require specialized knowledge and expertise in cryptography and image processing. This complexity could be a barrier to adoption in practical applications.

How can the security and privacy of the proposed methods be further enhanced, especially against advanced attacks like machine learning-based reconstruction?

To enhance the security and privacy of the proposed methods for generating cancelable biometric templates, especially against advanced attacks like machine learning-based reconstruction, the following strategies can be considered: Advanced Encryption Techniques: Incorporating advanced encryption techniques such as homomorphic encryption or secure multiparty computation can add an extra layer of security to the sharing and reconstruction process. These techniques ensure that the biometric data remains encrypted throughout the operations. Randomization and Salting: Introducing randomization and salting mechanisms in the generation of shares can make it harder for attackers to predict or reconstruct the original biometric template. Randomizing the process of share generation adds an element of unpredictability to the scheme. Dynamic Key Management: Implementing dynamic key management strategies can help in regularly updating encryption keys and share generation parameters. This prevents long-term exposure of sensitive information and reduces the risk of unauthorized access. Adversarial Training: Incorporating adversarial training techniques in the generation of cancelable biometric templates can help in making the templates robust against machine learning-based attacks. By training the system to withstand adversarial attempts at reconstruction, the security of the templates can be enhanced. Continuous Monitoring and Evaluation: Regularly monitoring the performance and security of the cancelable biometric template generation process is essential. Conducting security audits, vulnerability assessments, and penetration testing can help in identifying and addressing potential weaknesses in the system. By implementing these strategies and continuously improving the security measures, the proposed methods can be made more resilient against advanced attacks, ensuring the privacy and integrity of biometric data.
0
star