A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation

被引:1
|
作者
Jegede, Abayomi [1 ,2 ]
Udzir, Nur Izura [1 ]
Abdullah, Azizol [1 ]
Mahmod, Ramlan [1 ]
机构
[1] Univ Putra Malaysia, UPM Serdang, Fac Comp Sci & Informat Technol, Seri Kembangan 43400, Selangor, Malaysia
[2] Univ Jos, Dept Comp Sci, Jos, Nigeria
关键词
Authentication; Biometric; Non-invertible transformation; Security; Privacy; RECOGNITION; IMAGES; SYSTEM;
D O I
10.1007/978-3-319-56549-1_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometric authentication is the use of unique human features to provide secure, reliable, friendly and convenient access to an environment or a computer installation. However, the use of biometrics as a means of authentication exposes legitimate users to security threats, privacy attacks and loss of identity. This paper proposes and implements a novel non-invertible transformation technique known as matrix transformation. Matrix transformation is a simple but powerful and effective method to achieve template revocability and prevent the recovery of original biometric data from secured templates. The approach provides a high level template security and user privacy. It is also robust against replay attack, cross matching and loss of identity.
引用
收藏
页码:341 / 352
页数:12
相关论文
共 50 条
  • [41] An effective iris biometric privacy protection scheme with renewability
    Wickramaarachchi, Wiraj Udara
    Zhao, Dongdong
    Zhou, Junwei
    Xiang, Jianwen
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 80
  • [42] Privacy Preserving Speech, Face and Fingerprint Based Biometric Authentication System Using Secure Signal Processing
    Dinesh, Archana
    Bijoy, Edet K.
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, COMPUTING AND IT APPLICATIONS (CSCITA), 2017, : 164 - 168
  • [43] Secure and Privacy preserving Biometric based User Authentication with Data Access Control System in the Healthcare Environment
    Kaul, Sonam Devgan
    Murty, V. Kumar
    Hatzinakos, Dimitrios
    [J]. 2020 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW 2020), 2020, : 249 - 256
  • [44] Password authentication scheme preserving identity privacy
    Yang, Fuw-Yi
    Hsu, Chih-Wei
    Chiu, Su-Hui
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 443 - 447
  • [45] Secure Biometric Authentication Scheme Based on Chaotic Map
    Liang, Jiahao
    You, Lin
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 643 - 653
  • [46] Privacy Preserving Facial and Fingerprint Multi-biometric Authentication
    Anzaku, Esla Timothy
    Sohn, Hosik
    Ro, Yong Man
    [J]. DIGITAL WATERMARKING, 2011, 6526 : 239 - 250
  • [47] Security of a Privacy-Preserving Biometric Authentication Protocol Revisited
    Abidin, Aysajan
    Matsuura, Kanta
    Mitrokotsa, Aikaterini
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 290 - +
  • [48] Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes
    Wu, Yongdong
    Weng, Jian
    Wang, Zhengxia
    Wei, Kaimin
    Wen, Jinming
    Lai, Junzuo
    Li, Xin
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1744 - 1755
  • [49] A Secure Privacy-Preserving Mutual Authentication Scheme for Publish-Subscribe Fog Computing
    Salem, Fatty M.
    [J]. 2018 14TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2018, : 213 - 218
  • [50] Secure Communication Scheme of VANET with Privacy Preserving
    Hwang, Ren-Junn
    Hsiao, Yu-Kai
    Liu, Yen-Fu
    [J]. 2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 654 - 659