Deep Secure Quantization: On secure biometric hashing against similarity-based attacks

被引:28
|
作者
Chen, Yanzhi [1 ,2 ]
Wo, Yan [1 ]
Xie, Renjie [1 ]
Wu, Chudan [1 ]
Han, Guoqiang [1 ]
机构
[1] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou, Peoples R China
[2] Univ Edinburgh, Sch Informat, Edinburgh, Midlothian, Scotland
来源
SIGNAL PROCESSING | 2019年 / 154卷
基金
中国国家自然科学基金;
关键词
Random projection; Biometric hashing; Deep learning; EFFICIENT; IDENTIFICATION;
D O I
10.1016/j.sigpro.2018.09.013
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The widespread application of biometric recognition has emerged solid protection on the privacy of biometric templates. Non-invertible transformations such as random projections are popular solutions for this purpose, yet their security has been recently challenged due to the advent of similarity-based attacks (SA). To address this issue, we developed Deep Secure Quantization (DSQ), a new biometric hashing scheme for privacy-preserving biometric recognition. DSQ essentially takes into account the information leakage between the original distance and the hashed distance, which is the security blind spot of existing hashing models. This leakage is further incorporated into an optimal hashing objective which well balances between security and utility. Hashing is then modeled as a highly nonlinear problem solved by a novel deep neural network. Experiments on CASIA-v4-interval demonstrate that DSQ not only offers strong resistance to SA but also yields comparable or even superior recognition performance over existing biometric hashing methods, including deep framework-based ones. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:314 / 323
页数:10
相关论文
共 50 条
  • [1] A general framework for secure biometric hashing against reconstruction attacks
    Lianyi Yu
    Yan Wo
    [J]. Applied Intelligence, 2023, 53 : 12811 - 12830
  • [2] A general framework for secure biometric hashing against reconstruction attacks
    Yu, Lianyi
    Wo, Yan
    [J]. APPLIED INTELLIGENCE, 2023, 53 (10) : 12811 - 12830
  • [3] Secure biometric hashing against relation-based attacks via maximizing min-entropy
    Yu, Lianyi
    Wang, Qiangjiang
    Wo, Yan
    Han, Guoqiang
    [J]. COMPUTERS & SECURITY, 2022, 118
  • [4] Secure biometric hashing against relation-based attacks via maximizing min-entropy
    Yu, Lianyi
    Wang, Qiangjiang
    Wo, Yan
    Han, Guoqiang
    [J]. Computers and Security, 2022, 118
  • [5] A Secure and Compact Multimodal Biometric Authentication Scheme using Deep Hashing
    Sivakumar, P.
    Rathnam, B. Ruthu
    Divakar, S.
    Teja, M. Anil
    Prasad, R. Rajendra
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, SMART AND GREEN TECHNOLOGIES (ICISSGT 2021), 2021, : 27 - 31
  • [6] A new biometric identity based encryption scheme secure against DoS attacks
    Sarier, Neyire Deniz
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 23 - 32
  • [7] Secure Learning Algorithm for Multimodal Biometric Systems against Spoof Attacks
    Akhtar, Zahid
    Alfarid, Nasir
    [J]. INFORMATION AND NETWORK TECHNOLOGY, 2011, 4 : 52 - 57
  • [8] Secure similarity-based cloud data deduplication in Ubiquitous city
    Liu, Jinfeng
    Wang, Jianfeng
    Tao, Xiaoling
    Shen, Jian
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 41 : 231 - 242
  • [9] Similarity-Based Secure Deduplication for IIoT Cloud Management System
    Gao, Yuan
    Chen, Liquan
    Han, Jinguang
    Yu, Shui
    Fang, Huiyu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2242 - 2256
  • [10] Similarity-based deduplication and secure auditing in IoT decentralized storage
    Gao, Yuan
    Chen, Liquan
    Han, Jinguang
    Wu, Ge
    Liu, Suhui
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142