WiFaKey: Generating Cryptographic Keys From Face in the Wild

被引:0
|
作者
Dong, Xingbo [1 ,2 ]
Zhang, Hui [2 ]
Lai, Yen Lung [2 ]
Jin, Zhe [2 ]
Huang, Junduan [3 ]
Kang, Wenxiong [4 ,5 ,6 ]
Teoh, Andrew Beng Jin [1 ]
机构
[1] Yonsei Univ, Coll Engn, Sch Elect & Elect Engn, Seoul 120749, South Korea
[2] Anhui Univ, Anhui Prov Int Joint Res Ctr Adv Technol Med Imagi, Anhui Prov Key Lab Secure Artificial Intelligence, Hefei 230093, Peoples R China
[3] South China Normal Univ, Sch Artificial Intelligence, Foshan 528225, Peoples R China
[4] South China Univ Technol, Sch Automat Sci & Engn, Guangzhou 510641, Peoples R China
[5] South China Univ Technol, Sch Future Technol, Guangzhou 510641, Peoples R China
[6] Pazhou Lab, Guangzhou 510335, Peoples R China
基金
新加坡国家研究基金会;
关键词
Authentication; bio-cryptosystem; biometric measurements; biometric technology; unconstrained face bio-cryptosystem; BIOMETRIC TEMPLATE PROTECTION; RECOGNITION;
D O I
10.1109/TIM.2024.3485436
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Deriving a unique cryptographic key from biometric measurements is a challenging task due to the existing noise gap between the biometric measurements and error correction coding. Additionally, privacy and security concerns arise as biometric measurements are inherently linked to the user. Bio-cryptosystems represent a key branch of solutions aimed at addressing these issues. However, many existing bio-cryptosystems rely on handcrafted feature extractors and error correction codes (ECC), often leading to performance degradation. To address these challenges and improve the reliability of biometric measurements, we propose a novel biometric cryptosystem (BC) named WiFaKey, for generating cryptographic keys from face in unconstrained settings. Specifically, WiFaKey first introduces an adaptive random masking-driven feature transformation pipeline, AdaMTrans. AdaMTrans effectively quantizes and binarizes real-valued features and incorporates an adaptive random masking scheme to align the bit error rate (BER) with error correction requirements, thereby mitigating the noise gap. Besides, WiFaKey incorporates a supervised learning-based neural decoding scheme called neural-MS decoder, which delivers a more robust error correction performance with less iteration than nonlearning decoders, thereby alleviating the performance degradation. We evaluated WiFaKey using widely adopted face feature extractors on six large unconstrained and two constrained datasets. On the labeled faces in the wild database (LFW) dataset, WiFaKey achieved an average genuine match rate (GMR) of 85.45% and 85.20% at a 0% false match rate (FMR) for MagFace and AdaFace features, respectively. Our comprehensive comparative analysis shows a significant performance improvement of WiFaKey.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Practical Network Encryption with Quantum Cryptographic Keys
    Jain, Nitin
    Bidstrup, Erik
    Chin, Hou-Man
    Mani, Hossein
    Hajomer, Adnan A. E.
    Andersen, Ulrik L.
    Gehring, Tobias
    2022 EUROPEAN CONFERENCE ON OPTICAL COMMUNICATION (ECOC), 2022,
  • [32] Parameter Control in Predistribution Schemes of Cryptographic Keys
    Zhao, Jun
    2015 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2015, : 863 - 867
  • [33] Distribution of cryptographic keys in systems with a hierarchy of objects
    Belim S.V.
    Bogachenko N.F.
    Automatic Control and Computer Sciences, 2016, 50 (08) : 777 - 786
  • [34] Securing Cryptographic Keys in the IaaS Cloud Model
    AlBelooshi, B.
    Salah, K.
    Martin, T.
    Damiani, E.
    2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, : 397 - 401
  • [35] Direct visualization of cryptographic keys for enhanced security
    Oleg Lobachev
    The Visual Computer, 2018, 34 : 1749 - 1759
  • [36] Direct visualization of cryptographic keys for enhanced security
    Lobachev, Oleg
    VISUAL COMPUTER, 2018, 34 (12): : 1749 - 1759
  • [37] Efficient Ephemeral Elliptic Curve Cryptographic Keys
    Miele, Andrea
    Lenstra, Arjen K.
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 524 - 547
  • [38] Binding Cryptographic Keys into Biometric Data: Optimization
    Zainulina, E. T.
    Matveev, I. A.
    JOURNAL OF COMPUTER AND SYSTEMS SCIENCES INTERNATIONAL, 2020, 59 (05) : 699 - 711
  • [39] A Scattering Technique for Protecting Cryptographic Keys in the Cloud
    Mohamed, Fatma
    AlBelooshi, Bushra
    Salah, Khaled
    Yeun, Chan Yeob
    Damiani, Ernesto
    2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 301 - 306
  • [40] Reconstructing a Fragmented Face from a Cryptographic Identification Protocol
    Andy Luong
    Gerbush, Michael
    Waters, Brent
    Grauman, Kristen
    2013 IEEE WORKSHOP ON APPLICATIONS OF COMPUTER VISION (WACV), 2013, : 238 - 245