Secure Verifiable Scheme for Biometric System based on Secret Sharing and CSK
Keywords:verification, biometric, template security, CSK, secret sharing, chaotic map
Biometric templates stored in a database introduce a number of security and privacy risks. The requirements for an architecture that does not suffer from these risks are needed. Therefore, the reference information that is stored in the database must not give sufficient information to make successful impersonation possible. Also, the reference information must be retrieved as little as possible about the original biometrics; in particular it reveals no sensitive information. The proposed system introduces a novel method for template protection and a verification using the merging techniques of chaotic shift keying (CSK) and secret image sharing (SIS). The proposed architecture assures a complete protection framework for the biometric templates, which involves two phases: the first phase is to protect the ID image; a watermark ID image that includes the personal information embedded in the template using a novel watermarking algorithm to generate two shares, and then it is utilized to verify the accuracy of the revealed template. The second phase is for template protection, where the generated shares are encoded separately using CSK and then one share is stored in the database and the other kept with the user. The experimental and comparative results demonstrate that the proposed framework retains the protection of the template and preserves robustness to malicious attacks, while it does not have a discernible effect on the quality of the template.
K. Dharavath, F. A. Talukdar, R. H. Laskar, “Study on biometric authentication systems, challenges and future trends: A review,” Proceedings of the IEEE International Conference on Computational Intelligence and Computing Research, India, December 26-28, 2013, pp. 1-7. https://doi.org/10.1109/ICCIC.2013.6724278.
S. L. Nita, M. I. Mihailescu, V. C. Pau, “Security and cryptographic challenges for authentication based on biometrics data,” Cryptography, vol. 2, issue 4, 39, pp. 1-12, 2018. https://doi.org/10.3390/cryptography2040039.
M. Gomez-Barrero, E. Maiorana, J. Galbally, P. Campisi, J. Fierrez, “Multi-biometric template protection based on homomorphic encryption”, Pattern Recognition, vol. 67, pp. 149-163, 2017. https://doi.org/10.1016/j.patcog.2017.01.024.
K. Nandakumar, A. K. Jain, “Biometric template protection: Bridging the performance gap between theory and practice,” IEEE Signal Processing Magazine, vol. 32, issue 5, pp. 88-100, 2015. https://doi.org/10.1109/MSP.2015.2427849.
M. Gomez-Barrero, J. Galbally, A. Morales, J. Fierrez, “Privacy preserving comparison of variable-length data with application to biometric template protection,” IEEE Access, vol. 5, pp. 8606-8619, 2017. https://doi.org/10.1109/ACCESS.2017.2691578.
A. K. Jain, K. Nandakumar, A. Ross, “50 years of biometric research,” Pattern Recogn. Lett., vol. 79, pp. 80-105, 2016. https://doi.org/10.1016/j.patrec.2015.12.013
D. James, M. Philip, “A novel security architecture for biometric templates using visual cryptography and chaotic image encryption,” Proceedings of the International Conference on Eco-friendly Computing and Communication Systems ICECCS’2012, 2012, pp. 239-246. https://doi.org/10.1007/978-3-642-32112-2_29.
M. A. M. Abdullah, S. S. Dlay, W. L. Woo and J. A. Chambers, “A framework for iris biometrics protection: A marriage between watermarking and visual cryptography,” IEEE Access, vol. 4, pp. 10180-10193, 2016, https://doi.org/10.1109/ACCESS.2016.2623905.
U. Verma, C. Kant, “Secure biometric template protection approach using chaotic maps,” International Journal of Advanced Research in Computer Science, vol. 7, issue 3, pp. 121-124, 2016.
S. Jacob, M. Baby, “Visual cryptography with chaotic encryption for biometric templates,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 5, issue 4, pp. 125-130, 2017.
M. R. Nithyakalyani, V. Palanisamy, R. Anandhajothi, “Fingerprint template encryption scheme based on chaotic map and DNA sequence,” International Journal of Pure and Applied Mathematics, vol. 118, issue 7, pp. 297-305, 2018.
W. Yang, S. Wang, J. Hu, G. Zheng and C. Valli, “Security and accuracy of fingerprint-based biometrics: A review,” Symmetry, vol. 11, issue 141, pp. 1-19, 2019. https://doi.org/10.3390/sym11020141.
D. Kang, J. Jung, H. Kim, Y. Lee, and D. Won, “Efficient and secure biometric-based user authenticated key agreement scheme with anonymity,” Security and Communication Networks, vol. 2018, pp. 1-14, 2018. https://doi.org/10.1155/2018/9046064.
A. Joshy, M. J. Jalaja, “Design and implementation of an IoT based secure biometric authentication system,” Proceedings of the 2017 IEEE International Conference on Signal Processing Informatics Communication and Energy Systems (SPICES), 2017, pp. 1-13. https://doi.org/10.1109/SPICES.2017.8091360.
N. Riaz, A. Riaz, and S. Khan, “Biometric template security: An overview,” Sensor Review, vol. 38, issue 1, pp. 120-127, 2018. https://doi.org/10.1108/SR-07-2017-0131.
R. Arjona, M. A. Prada-Delgado, I. Baturone, A. Ross, “Securing minutia cylinder codes for ﬁngerprints through physically unclonable functions: An exploratory study,” Proceedings of the 2018 International Conference on Biometrics (ICB), Gold Coast, Australia, February 20-23, 2018, pp. 54-60. https://doi.org/10.1109/ICB2018.2018.00019
W. Yang, S. Wang, J. Hu, Z. Guanglou, C. Valli, “Security and accuracy of fingerprint-based biometrics: A review,” Symmetry, vol. 11, issue 141, pp. 1-19, 2019. https://doi.org/10.3390/sym11020141.
Y. Seng Lau, Techniques in Secure Chaos Communication, Ph. D Thesis, RMIT University, School of Electrical and Computer Engineering Science, Melbourne, Victoria, Australia, February 2006.
D. J. Driebe, “Fully chaotic maps and broken time symmetry,” Springer Science & Busines, Media: Berlin/Heidelberg, Germany, 1999. https://doi.org/10.1007/978-94-017-1628-4.
J. G. Daugman, “High confidence visual recognition of persons by a test of statistical independence,” IEEE Transactions on Pattern Analysis a nd Machine Intelligence, vol. 25, issue 11, pp. 1148-1161, 1993. https://doi.org/10.1109/34.244676.
R. P. Wildes, “Iris recognition: An emerging biometric technology,” Proceedings of the IEEE, vol. 85, issue 9, pp. 1348-1363, 1999. https://doi.org/10.1109/5.628669.
Multimedia University, Iris database. [Onine]. Available on: (http://www.persona.mmu.edu.my/~).
A. Binti-Idris, R. F. Bin-Rahim, D. Ali, “The effect of additive white gaussian noise and multipath rayleigh fading on ber statistic in digital cellular network,” Proceedings of the International RF and Microwave Conference, Putrajaya, Malaysia, September 12-14, 2006, pp. 97-100, https://doi.org/10.1109/RFM.2006.331046.
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, “A statistical test suite for random and pseudorandom number generators for cryptographic applications,” 2001. https://doi.org/10.6028/NIST.SP.800-22.
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.