WiFaKey: Generating Cryptographic Keys From Face in the Wild

被引:0
|
作者
Dong, Xingbo [1 ,2 ]
Zhang, Hui [2 ]
Lai, Yen Lung [2 ]
Jin, Zhe [2 ]
Huang, Junduan [3 ]
Kang, Wenxiong [4 ,5 ,6 ]
Teoh, Andrew Beng Jin [1 ]
机构
[1] Yonsei Univ, Coll Engn, Sch Elect & Elect Engn, Seoul 120749, South Korea
[2] Anhui Univ, Anhui Prov Int Joint Res Ctr Adv Technol Med Imagi, Anhui Prov Key Lab Secure Artificial Intelligence, Hefei 230093, Peoples R China
[3] South China Normal Univ, Sch Artificial Intelligence, Foshan 528225, Peoples R China
[4] South China Univ Technol, Sch Automat Sci & Engn, Guangzhou 510641, Peoples R China
[5] South China Univ Technol, Sch Future Technol, Guangzhou 510641, Peoples R China
[6] Pazhou Lab, Guangzhou 510335, Peoples R China
基金
新加坡国家研究基金会;
关键词
Authentication; bio-cryptosystem; biometric measurements; biometric technology; unconstrained face bio-cryptosystem; BIOMETRIC TEMPLATE PROTECTION; RECOGNITION;
D O I
10.1109/TIM.2024.3485436
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Deriving a unique cryptographic key from biometric measurements is a challenging task due to the existing noise gap between the biometric measurements and error correction coding. Additionally, privacy and security concerns arise as biometric measurements are inherently linked to the user. Bio-cryptosystems represent a key branch of solutions aimed at addressing these issues. However, many existing bio-cryptosystems rely on handcrafted feature extractors and error correction codes (ECC), often leading to performance degradation. To address these challenges and improve the reliability of biometric measurements, we propose a novel biometric cryptosystem (BC) named WiFaKey, for generating cryptographic keys from face in unconstrained settings. Specifically, WiFaKey first introduces an adaptive random masking-driven feature transformation pipeline, AdaMTrans. AdaMTrans effectively quantizes and binarizes real-valued features and incorporates an adaptive random masking scheme to align the bit error rate (BER) with error correction requirements, thereby mitigating the noise gap. Besides, WiFaKey incorporates a supervised learning-based neural decoding scheme called neural-MS decoder, which delivers a more robust error correction performance with less iteration than nonlearning decoders, thereby alleviating the performance degradation. We evaluated WiFaKey using widely adopted face feature extractors on six large unconstrained and two constrained datasets. On the labeled faces in the wild database (LFW) dataset, WiFaKey achieved an average genuine match rate (GMR) of 85.45% and 85.20% at a 0% false match rate (FMR) for MagFace and AdaFace features, respectively. Our comprehensive comparative analysis shows a significant performance improvement of WiFaKey.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Computation of cryptographic keys from face biometrics
    Goh, A
    Ngo, DCL
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2003, 2828 : 1 - 13
  • [2] An Efficient Approach to Generating Cryptographic Keys from Face and Iris Biometrics Fused at the Feature Level
    Abuguba, Saad
    Milosavljevic, Milan M.
    Macek, Nemanja
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (06): : 6 - 11
  • [3] You are the Key: Generating Cryptographic Keys from Voice Biometrics
    Carrara, Brent
    Adams, Carlisle
    PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 213 - 222
  • [4] Generating user-based cryptographic keys and random numbers
    Peyravian, M
    Matyas, SM
    Roginsky, A
    Zunic, N
    COMPUTERS & SECURITY, 1999, 18 (07) : 619 - 626
  • [5] Cryptographic Keys Generating and Renewing System for IoT Network Nodes-A Concept
    Furtak, Janusz
    SENSORS, 2020, 20 (17) : 1 - 30
  • [6] Deriving cryptographic keys from physiological signals
    Altop, Duygu Karaoglan
    Levi, Albert
    Tuzcu, Volkan
    PERVASIVE AND MOBILE COMPUTING, 2017, 39 : 65 - 79
  • [7] On Compression of Cryptographic Keys
    Chan, Aldar C-F.
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 1853 - 1857
  • [8] On the feasibility of deriving cryptographic keys from MEMS sensors
    Willers, Oliver
    Huth, Christopher
    Guajardo, Jorge
    Seidel, Helmut
    Deutsch, Peter
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (01) : 67 - 83
  • [9] Protecting cryptographic keys from memory disclosure attacks
    Harrison, Keith
    Xu, Shouhuai
    37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2007, : 137 - +
  • [10] On the feasibility of deriving cryptographic keys from MEMS sensors
    Oliver Willers
    Christopher Huth
    Jorge Guajardo
    Helmut Seidel
    Peter Deutsch
    Journal of Cryptographic Engineering, 2020, 10 : 67 - 83