WiFaKey: Generating Cryptographic Keys From Face in the Wild

被引:0
|
作者
Dong, Xingbo [1 ,2 ]
Zhang, Hui [2 ]
Lai, Yen Lung [2 ]
Jin, Zhe [2 ]
Huang, Junduan [3 ]
Kang, Wenxiong [4 ,5 ,6 ]
Teoh, Andrew Beng Jin [1 ]
机构
[1] Yonsei Univ, Coll Engn, Sch Elect & Elect Engn, Seoul 120749, South Korea
[2] Anhui Univ, Anhui Prov Int Joint Res Ctr Adv Technol Med Imagi, Anhui Prov Key Lab Secure Artificial Intelligence, Hefei 230093, Peoples R China
[3] South China Normal Univ, Sch Artificial Intelligence, Foshan 528225, Peoples R China
[4] South China Univ Technol, Sch Automat Sci & Engn, Guangzhou 510641, Peoples R China
[5] South China Univ Technol, Sch Future Technol, Guangzhou 510641, Peoples R China
[6] Pazhou Lab, Guangzhou 510335, Peoples R China
基金
新加坡国家研究基金会;
关键词
Authentication; bio-cryptosystem; biometric measurements; biometric technology; unconstrained face bio-cryptosystem; BIOMETRIC TEMPLATE PROTECTION; RECOGNITION;
D O I
10.1109/TIM.2024.3485436
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Deriving a unique cryptographic key from biometric measurements is a challenging task due to the existing noise gap between the biometric measurements and error correction coding. Additionally, privacy and security concerns arise as biometric measurements are inherently linked to the user. Bio-cryptosystems represent a key branch of solutions aimed at addressing these issues. However, many existing bio-cryptosystems rely on handcrafted feature extractors and error correction codes (ECC), often leading to performance degradation. To address these challenges and improve the reliability of biometric measurements, we propose a novel biometric cryptosystem (BC) named WiFaKey, for generating cryptographic keys from face in unconstrained settings. Specifically, WiFaKey first introduces an adaptive random masking-driven feature transformation pipeline, AdaMTrans. AdaMTrans effectively quantizes and binarizes real-valued features and incorporates an adaptive random masking scheme to align the bit error rate (BER) with error correction requirements, thereby mitigating the noise gap. Besides, WiFaKey incorporates a supervised learning-based neural decoding scheme called neural-MS decoder, which delivers a more robust error correction performance with less iteration than nonlearning decoders, thereby alleviating the performance degradation. We evaluated WiFaKey using widely adopted face feature extractors on six large unconstrained and two constrained datasets. On the labeled faces in the wild database (LFW) dataset, WiFaKey achieved an average genuine match rate (GMR) of 85.45% and 85.20% at a 0% false match rate (FMR) for MagFace and AdaFace features, respectively. Our comprehensive comparative analysis shows a significant performance improvement of WiFaKey.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Protecting Cryptographic Keys against Continual Leakage
    Juma, Ali
    Vahlis, Yevgeniy
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 41 - 58
  • [42] K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces
    Li, Juanru
    Lin, Zhiqiang
    Caballero, Juan
    Zhang, Yuanyuan
    Gu, Dawu
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 412 - 425
  • [43] Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations
    Nassi, Ben
    Vayner, Ofek
    Iluz, Etay
    Nassi, Dudi
    Jancar, Jan
    Genkin, Daniel
    Tromer, Eran
    Zadov, Boris
    Elovici, Yuval
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 268 - 280
  • [44] A new method for generating keys
    Jia, JP
    Yang, H
    ICSP '96 - 1996 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, PROCEEDINGS, VOLS I AND II, 1996, : 1570 - 1573
  • [45] Generating Secret Keys from Biometric Body Impedance Measurements
    Roeschlin, Marc
    Sluganovic, Ivo
    Martinovic, Ivan
    Tsudik, Gene
    Rasmussen, Kasper B.
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'16), 2016, : 59 - 69
  • [46] NOCRY: No More Secure Encryption Keys for Cryptographic Ransomware
    Genc, Ziya Alper
    Lenzini, Gabriele
    Ryan, Peter Y. A.
    EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2019, 2020, 11967 : 69 - 85
  • [47] MoCrySIL - Carry Your Cryptographic Keys in Your Pocket
    Reimair, Florian
    Teufl, Peter
    Kollmann, Christian
    Thaller, Christoph
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 285 - 292
  • [48] Optical scheme for cryptographic commitments with physical unclonable keys
    Nikolopoulos, Georgios M.
    OPTICS EXPRESS, 2019, 27 (20) : 29366 - 29378
  • [49] Biometric/Cryptographic Keys Binding based on Function Minimization
    Riccio, Daniel
    Galdi, Clemente
    Manzo, Rita
    2016 12TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS), 2016, : 144 - 150
  • [50] A limitation on security evaluation of cryptographic primitives with fixed keys
    Kawai, Yutaka
    Hanaoka, Goichiro
    Ohta, Kazuo
    Kunihiro, Noboru
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1663 - 1675