Scalable Secure Iris Recognition Combining Feature Generation and Replay
Author:
Affiliation:

Clc Number:

TP18

  • Article
  • | |
  • Metrics
  • |
  • Reference [49]
  • |
  • Related [20]
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    With the rapid development of information technology, security authentication technology has become a crucial safeguard for personal privacy and data security. Among them, iris recognition technology, with its outstanding accuracy and stability, is widely applied in fields such as system access control, healthcare, and judicial practices. However, once the iris feature data of a user is leaked, it means permanent loss, as it cannot be changed or revoked. Therefore, the privacy protection of iris feature data is particularly important. With the prominent performance of neural network technology in image processing, secure iris recognition schemes based on neural networks have been proposed, which maintain the high performance of recognition systems while protecting privacy data. However, in the face of constantly changing data and environments, secure iris recognition schemes are required to have effective scalability, that is, the recognition scheme should be able to maintain performance with new user registrations. However, most of the existing research on neural network-based secure iris recognition schemes does not consider the scalability of the schemes. Aiming at the above problems, the generative feature replay-based secure incremental iris recognition (GFR-SIR) method and the privacy-preserving template replay-based secure incremental iris recognition (PTR-SIR) method are proposed in this study. Specifically, the GFR-SIR method uses generative feature replay and feature distillation techniques to alleviate the forgetting of previous task knowledge during the expansion of neural networks and adopts the improved TNCB method to protect the privacy of iris feature data. The PTR-SIR method preserves the privacy-protecting templates obtained through the TNCB method in previous tasks and replays these templates during the model training of the current task to achieve the scalability of the recognition scheme. Experimental results show that after completing 5 rounds of expansion tasks, the recognition accuracy of GFR-SIR and PTR-SIR on the CASIA-Iris-Lamp dataset reaches 68.32% and 98.49% respectively, which is an improvement of 58.49% and 88.66% compared with the fine-tuning method. The analysis indicates that the GFR-SIR method has significant advantages in terms of security and model training efficiency since the data of previous tasks is not saved; while the PTR-SIR method is more outstanding in maintaining recognition performance, but its security and efficiency are lower than those of GFR-SIR.

    Reference
    [1] 宋继伟, 程多福, 王文峰. 生物特征识别技术与标准化. 北京: 中国电子技术标准化研究院, 2023. 42–53.
    Song JW, Cheng DF, Wang WF. Biometrics and Standardization. Beijing: China Electronics Standardization Institute, 2023. 42–53 (in Chinese).
    [2] Al-Raisi AN, Al-Khouri AM. Iris recognition and the challenge of homeland and border control security in UAE. Telematics and Informatics, 2008, 25(2): 117–132.
    [3] ISO/IEC. ISO/IEC 24745: 2011 Information technology—Security techniques—Biometric information protection. Geneva: Int’l Organization for Standardization, 2011.
    [4] Hermans J, Mennink B, Peeters R. When a bloom filter is a doom filter: Security assessment of a novel iris biometric template protection system. In: Proc. of the 2014 Int’l Conf. of the Biometrics Special Interest Group. Darmstadt: IEEE, 2014. 1–6.
    [5] Ghammam L, Karabina K, Lacharme P, Thiry-Atighehchi K. A cryptanalysis of two cancelable biometric schemes based on index-of-max hashing. IEEE Trans. on Information Forensics and Security, 2020, 15: 2869–2880.
    [6] Dong XB, Jin Z, Jin ATB. A genetic algorithm enabled similarity-based attack on cancellable biometrics. In: Proc. of the 10th IEEE Int’l Conf. on Biometrics Theory, Applications and Systems. Tampa: IEEE, 2019. 1–8. [doi: 10.1109/BTAS46853.2019.9185997]
    [7] Ouda O, Chaoui S, Tsumura N. Security evaluation of negative iris recognition. IEICE Trans. on Information and Systems, 2020, E103.D(5): 1144–1152.
    [8] Ignatenko T, Willems FMJ. Information leakage in fuzzy commitment schemes. IEEE Trans. on Information Forensics and Security, 2010, 5(2): 337–348.
    [9] Simoens K, Tuyls P, Preneel B. Privacy weaknesses in biometric sketches. In: Proc. of the 30th IEEE Symp. on Security and Privacy. Oakland: IEEE, 2009. 188–203. [doi: 10.1109/SP.2009.24]
    [10] Rathgeb C, Uhl A. Statistical attack against iris-biometric fuzzy commitment schemes. In: Proc. of the 2011 CVPR WORKSHOPS. Colorado Springs: IEEE, 2021. 23–30. [doi: 10.1109/CVPRW.2011.5981720]
    [11] Blanton M, Aliasgari M. Analysis of reusability of secure sketches and fuzzy extractors. IEEE Trans. on Information Forensics and Security, 2013, 8(9): 1433–1445.
    [12] Cavoukian A, Stoianov A. Biometric encryption. Biometric Technology Today, 2007, 15(3): 11.
    [13] Rathgeb C, Uhl A. A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security, 2011, 2011(1): 3.
    [14] Juels A, Sudan M. A fuzzy vault scheme. Designs, Codes and Cryptography, 2006, 38(2): 237–257.
    [15] Juels A, Wattenberg M. A fuzzy commitment scheme. In: Proc. of the 6th ACM Conf. on Computer and Communications Security. Singapore: ACM, 1999. 28–36. [doi: 10.1145/319709.319714]
    [16] Dodis Y, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Proc. of the 2004 Int’l Conf. on the Theory and Applications of Cryptographic Techniques. Interlaken: Springer, 2004. 523–540. [doi: 10.1007/978-3-540-24676-3_31]
    [17] Chang EC, Shen R, Teo FW. Finding the original point set hidden among chaff. In: Proc. of the 2006 ACM Symp. on Information, Computer and Communications Security. Taipei: ACM, 2006. 182–188. [doi: 10.1145/1128817.1128845]
    [18] Poon HT, Miri A. A collusion attack on the fuzzy vault scheme. The ISC Int’l Journal of Information Security, 2009, 1(1): 27–34.
    [19] Scheirer WJ, Boult TE. Cracking fuzzy vaults and biometric encryption. In: Proc. of the 2007 Biometrics Symp. Baltimore: IEEE, 2007. 1–6. [doi: 10.1109/BCC.2007.4430534]
    [20] Kelkboom EJC, Breebaart J, Kevenaar TAM, Buhan I, Veldhuis RNJ. Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. IEEE Trans. on Information Forensics and Security, 2011, 6(1): 107–121.
    [21] Rathgeb C, Breitinger F, Busch C. Alignment-free cancelable iris biometric templates based on adaptive bloom filters. In: Proc. of the 2013 Int’l Conf. on Biometrics. Madrid: IEEE, 2013. 1–8. [doi: 10.1109/ICB.2013.6612976]
    [22] Jin Z, Hwang JY, Lai YL, Kim S, Teoh ABJ. Ranking-based locality sensitive hashing-enabled cancelable biometrics: Index-of-max hashing. IEEE Trans. on Information Forensics and Security, 2018, 13(2): 393–407.
    [23] Sadhya D, Raman B. Generation of cancelable iris templates via randomized bit sampling. IEEE Trans. on Information Forensics and Security, 2019, 14(11): 2972–2986.
    [24] Lai YL, Jin Z, Teoh ABJ, Goi BM, Yap WS, Chai TY, Rathgeb C. Cancellable iris template generation based on indexing-first-one hashing. Pattern Recognition, 2017, 64: 105–117.
    [25] Zhao DD, Luo WJ, Liu R, Yue LH. Negative iris recognition. IEEE Trans. on Dependable and Secure Computing, 2018, 15(1): 112–125.
    [26] Abdellatef E, Soliman RF, Omran EM, Ismail NA, Elrahman SESA, Ismail KN, Rihan M, Amin M, Eisa AA, El-Samie FEA. Cancelable face and iris recognition system based on deep learning. Optical and Quantum Electronics, 2022, 54(11): 702.
    [27] Kim J, Jung YG, Teoh ABJ. Multimodal biometric template protection based on a cancelable SoftmaxOut fusion network. Applied Sciences, 2022, 12(4): 2023.
    [28] Pandey RK, Zhou YB, Kota BU, Govindaraju V. Deep secure encoding for face template protection. In: Proc. of the 2016 IEEE Conf. on Computer Vision and Pattern Recognition Workshops. Las Vegas: IEEE, 2016. 77–83. [doi: 10.1109/CVPRW.2016.17]
    [29] Chen LY, Zhao GH, Zhou JW, Ho ATS, Cheng LM. Face template protection using deep LDPC codes learning. IET Biometrics, 2019, 8(3): 190–197.
    [30] Johnson J, Alahi A, Fei-Fei L. Perceptual losses for real-time style transfer and super-resolution. In: Proc. of the 14th European Conf. Amsterdam: Springer, 2016. 694–711. [doi: 10.1007/978-3-319-46475-6_43]
    [31] Zhao DD, Liao HC, Liao SS, Li HH, Xiang JW. Cancelable iris biometrics based on transformation network. In: Proc. of the 23rd Int’l Conf. on Software Quality, Reliability, and Security. Chiang Mai: IEEE, 2023. 507–516. [doi: 10.1109/QRS60937.2023.00056]
    [32] Zhao DD, Cheng WT, Zhou J, Wang HM, Li HH. Cancellable iris recognition scheme based on inversion fusion and local ranking. In: Proc. of the 30th Int’l Conf. on Neural Information Processing. Changsha: Springer, 2023. 340–356. [doi: 10.1007/978-981-99-8067-3_26]
    [33] Liu XL, Wu CS, Menta M, Herranz L, Raducanu B, Bagdanov AD, Jui S, van de Weijer J. Generative feature replay for class-incremental learning. In: Proc. of the 2020 IEEE/CVF Conf. on Computer Vision and Pattern Recognition Workshops. Seattle: IEEE, 2020. 915–924. [doi: 10.1109/CVPRW50498.2020.00121]
    [34] CASIA. CASIA iris image database. 2016. http://biometrics.idealtest.org/
    [35] Othman N, Dorizzi B, Garcia-Salicetti S. OSIRIS: An open source iris recognition software. Pattern Recognition Letters, 2016, 82: 124–131.
    [36] Ronneberger O, Fischer P, Brox T. U-net: Convolutional networks for biomedical image segmentation. In: Proc. of the 18th Int’l Conf. Munich: Springer, 2015. 234–241. [doi: 10.1007/978-3-319-24574-4_28]
    [37] Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition. In: Proc. of the 3rd Int’l Conf. on Learning Representations. San Diego: ICLR, 2015. 1–14.
    [38] Gangwar A, Joshi A. DeepIrisNet: Deep iris representation with applications in iris recognition and cross-sensor iris recognition. In: Proc. of the 2016 IEEE Int’l Conf. on Image Processing. Phoenix: IEEE, 2016. 2301–2305. [doi: 10.1109/ICIP.2016.7532769]
    [39] Chaudhry A, Dokania PK, Ajanthan T, Torr PHS. Riemannian walk for incremental learning: Understanding forgetting and intransigence. In: Proc. of the 15th European Conf. on Computer Vision. Munich: Springer, 2018. 556–572. [doi: 10.1007/978-3-030-01252-6_33]
    [40] Li ZZ, Hoiem D. Learning without forgetting. IEEE Trans. on Pattern Analysis and Machine Intelligence, 2018, 40(12): 2935–2947.
    [41] Rebuffi SA, Kolesnikov A, Sperl G, Lampert CH. iCaRL: Incremental classifier and representation learning. In: Proc. of the 2017 IEEE Conf. on Computer Vision and Pattern Recognition. Honolulu: IEEE, 2017. 5533–5542. [doi: 10.1109/CVPR.2017.587]
    [42] Kirkpatrick J, Pascanu R, Rabinowitz N, Veness J, Desjardins G, Rusu AA, Milan K, Quan J, Ramalho T, Grabska-Barwinska A, Hassabis D, Clopath C, Kumaran D, Hadsell R. Overcoming catastrophic forgetting in neural networks. Proc. of the National Academy of Sciences of the United States of America, 2017, 114(13): 3521–3526.
    [43] Douillard A, Cord M, Ollion C, Robert T, Valle E. PODNet: Pooled outputs distillation for small-tasks incremental learning. In: Proc. of the 16th European Conf. on Computer Vision. Glasgow: Springer, 2020. 86–102. [doi: 10.1007/978-3-030-58565-5_6]
    [44] Zhao BW, Xiao X, Gan GJ, Zhang B, Xia ST. Maintaining discrimination and fairness in class incremental learning. In: Proc. of the 2020 IEEE/CVF Conf. on Computer Vision and Pattern Recognition. Seattle: IEEE, 2023. 13205–13214. [doi: 10.1109/CVPR42600.2020.01322]
    [45] Yan SP, Xie JW, He XM. DER: Dynamically expandable representation for class incremental learning. In: Proc. of the 2021 IEEE/CVF Conf. on Computer Vision and Pattern Recognition. Nashville: IEEE, 2021. 3013–3022. [doi: 10.1109/CVPR46437.2021.00303]
    [46] Wang FY, Zhou DW, Ye HJ, Zhan DC. FOSTER: Feature boosting and compression for class-incremental learning. In: Proc. of the 2022 European Conf. on Computer Vision. Tel Aviv: Springer, 2022. 398–414. [doi: 10.1007/978-3-031-19806-9_23]
    [47] Petit G, Popescu A, Schindler H, Picard D, Delezoide B. FeTrIL: Feature translation for exemplar-free class-incremental learning. In: Proc. of the 2023 IEEE/CVF Winter Conf. on Applications of Computer Vision. Waikoloa: IEEE, 2023. 3900–3909. [doi: 10.1109/WACV56688.2023.00390]
    [48] Zhou DW, Wang FY, Ye HJ, Zhan DC. PyCIL: A python toolbox for class-incremental learning. Science China Information Sciences, 2023, 66(9): 197101.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

赵冬冬,宋宝刚,廖虎成,闫江,向剑文.结合特征生成与重放的可扩展安全虹膜识别.软件学报,2025,36(7):1-22

Copy
Share
Article Metrics
  • Abstract:89
  • PDF: 172
  • HTML: 0
  • Cited by: 0
History
  • Received:August 26,2024
  • Revised:October 15,2024
  • Online: December 10,2024
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063