Browse > Article
http://dx.doi.org/10.4218/etrij.10.1510.0103

Secure Face Authentication Framework in Open Networks  

Lee, Yong-Jin (Software Research Laboratory, ETRI)
Lee, Yong-Ki (Digital IP Development Team, Samsung Electronics)
Chung, Yun-Su (Software Research Laboratory, ETRI)
Moon, Ki-Young (Software Research Laboratory, ETRI)
Publication Information
ETRI Journal / v.32, no.6, 2010 , pp. 950-960 More about this Journal
Abstract
In response to increased security concerns, biometrics is becoming more focused on overcoming or complementing conventional knowledge and possession-based authentication. However, biometric authentication requires special care since the loss of biometric data is irrecoverable. In this paper, we present a biometric authentication framework, where several novel techniques are applied to provide security and privacy. First, a biometric template is saved in a transformed form. This makes it possible for a template to be canceled upon its loss while the original biometric information is not revealed. Second, when a user is registered with a server, a biometric template is stored in a special form, named a 'soft vault'. This technique prevents impersonation attacks even if data in a server is disclosed to an attacker. Finally, a one-time template technique is applied in order to prevent replay attacks against templates transmitted over networks. In addition, the whole scheme keeps decision equivalence with conventional face authentication, and thus it does not decrease biometric recognition performance. As a result, the proposed techniques construct a secure face authentication framework in open networks.
Keywords
Face authentication; cancelable biometrics; one-time template;
Citations & Related Records

Times Cited By Web Of Science : 0  (Related Records In Web of Science)
Times Cited By SCOPUS : 0
연도 인용수 순위
  • Reference
1 N.K. Ratha, J.H. Connell, and R.M. Bolle, "Enhancing Security and Privacy in Biometrics-Based Authentication Systems," IBM Syst. J., vol. 40, no. 3, Jan. 2001, pp. 614-634.
2 T. Connie et al., "PalmHashing: A Novel Approach for Cancelable Biometrics," Inf. Process. Lett., vol. 93, no. 1, Jan. 2005, pp. 1-5.   DOI   ScienceOn
3 T. Kevenaar et al., "Face Recognition with Renewable and Privacy Preserving Binary Templates," IEEE Workshop Automatic Identification Advanced Technol., 2005, pp. 21-26.
4 Y. Sutcu, T. Sencar, and N. Memon, "A Secure Biometric Authentication Scheme Based on Robust Hashing," ACM Workshop on Multimedia and Security, 2005, pp. 111-116.
5 J.H. Ton and T. Kalker, "Robust Audio Hashing for Content Identification," Content-Based Multimedia Indexing, 2001.
6 Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," Adv. Cryptology - EUROCRYPT, LNCS 3027, 2004, pp. 523-540.
7 A. Juels and M. Sudan, "A Fuzzy Vault Scheme," IEEE Int. Symp. Inf. Theory, 2002, p. 408.
8 A. Juels and M. Wattenberg, "A Fuzzy Commitment Scheme," ACM Conf. Computer Commun. Security, 1999, pp. 28-36.
9 G. Davida, Y. Frankel, and B.J. Matt, "On Enabling Secure Applications through Off-Line Biometric Identification," IEEE Symp. Security Privacy, 1998, pp. 148-157.
10 Y.K. Lee and I. Verbauwhede, "Secure and Low-Cost RFID Authentication Protocols," IEEE Int. Workshop Adaptive Wireless Networks, Nov. 2005.
11 K. Messer et al., "XM2VTSDB: The Extended M2VTS Database," Audio- and Video-Based Biometric Person Authentication, Mar. 1999, pp. 72-77.
12 Q. Li, Y. Sutcu, and N. Memon, "Secure Sketch for Biometric Templates," Adv. Cryptology - ASIACRYPT, LNCS 4284, 2006, pp. 99-113.
13 A.T.B. Jin, D.N.C. Ling, and A. Goh, "Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenised Random Number," Patt. Recog., vol. 37, no. 11, Nov. 2004, pp. 2245-2255.   DOI   ScienceOn
14 A.B.J. Teoh, D.C.L. Ngo, and A. Goh, "An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number," Int. Conf. Biometric Authentication, LNCS 3072, 2004, pp. 117-123.
15 A. Kong et al., "An Analysis of BioHashing and Its Variants," Pattern Recog., vol. 39, no. 7, July 2006, pp. 1359-1368.   DOI   ScienceOn
16 N. Ratha et al., "Cancelable Biometrics: A Case Study in Fingerprints," Int. Conf. Pattern Recog., vol. 4, 2006, pp. 370-373.
17 J.P. Linnartz and P. Tuyls, "New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates," Audioand Video-Based Biometric Person Authentication, LNCS 2688, 2003, pp. 393-402.
18 K. Simoens, P. Tuyls, and B. Preneel, "Privacy Weaknesses in Biometric Sketches," IEEE Symp. Security Privacy, 2009, pp. 188-203.
19 R. Ang, R. Safavi-Naini, and L. McAven, "Cancelable Key- Based Fingerprint Templates," Australasian Conf. Inf. Security Privacy, LNCS 3574, 2005, pp. 242-252.
20 N.K. Ratha et al., "Generating Cancelable Fingerprint Templates," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, 2007, pp. 561-572.
21 Y.J. Lee et al., "One-Time Templates for Face Authentication," Int. Conf. Convergence Inf. Technol., Nov. 2007, pp. 1818-1823.
22 M. Turk and A. Pentland, "Eigenfaces for Recognition," J. Cognitive Neuroscience, vol. 3, no. 1, Jan. 1991, pp. 71-86.   DOI   ScienceOn
23 P.N. Belhumeur, J.P. Hespanha, and D.J. Kriegman, "Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection," IEEE Trans. Pattern Analysis Mach. Intell., vol. 19, no. 7, Oct. 1997, pp. 711-720.   DOI   ScienceOn
24 Y.J. Lee, Y.S. Chung, and K.Y. Moon, "Inverse Operation and Preimage Attack on Biohashing," IEEE Workshop Computational Intell. Biometrics: Theory, Algorithms, Appl., Mar. 2009, pp. 92-97.