A general framework for secure biometric hashing against reconstruction attacks

被引:1
|
作者
Yu, Lianyi [1 ]
Wo, Yan [1 ]
机构
[1] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510641, Guangdong, Peoples R China
关键词
Privacy-preserving; Biometrics; Image hashing; Similarity attacks; Reconstruction attacks; TEMPLATE; QUANTIZATION;
D O I
10.1007/s10489-022-04153-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Binary representation is a popular privacy-preserving biometric recognition approach. However, it is vulnerable to similarity-based reconstruction attacks (i.e., similarity attacks) due to its similarity-preserving property. In this paper, the cause of this security threat is studied, a sufficient condition for secure anti-similarity-attack hashing (ASAH) is derived, and the definition of the ASAH manifold is provided. Moreover, a general framework is proposed for employing a statistical manifold to locate a secure hash function in a given hash function family. Specifically, a secure hash function can be obtained by finding the point that is closest to the ASAH manifold in the hash function family manifold. A generalized expectation-maximization-based algorithm is then developed to optimize this process. In addition, a case study is presented to clarify the implementation details of the aforementioned algorithm. In particular, an ideal ASAH submanifold is constructed through random generation to enhance the feasibility of the proposed framework, enabling ideal hash code generation. In addition, the generative adversarial network framework is adopted to generate high-quality hash codes; the distribution of these hash codes is close to that of the ideal hash codes. We perform experiments on public biometric datasets to verify that our approach can achieve both superior recognition performance and higher security under reconstruction attacks.
引用
收藏
页码:12811 / 12830
页数:20
相关论文
共 50 条
  • [21] Sparse Reconstruction Based Watermarking for Secure Biometric Authentication
    Ma, Bin
    Li, Chunlei
    Zhang, Zhaoxiang
    Wang, Yunhong
    BIOMETRIC RECOGNITION: CCBR 2011, 2011, 7098 : 244 - 251
  • [22] Secure Control Against Replay Attacks
    Mo, Yilin
    Sinopoli, Bruno
    2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 911 - 918
  • [23] A novel blockchain based framework to secure IoT-LLNs against routing attacks
    Sahay, Rashmi
    Geethakumari, G.
    Mitra, Barsha
    COMPUTING, 2020, 102 (11) : 2445 - 2470
  • [24] A novel blockchain based framework to secure IoT-LLNs against routing attacks
    Rashmi Sahay
    G. Geethakumari
    Barsha Mitra
    Computing, 2020, 102 : 2445 - 2470
  • [25] A General Framework for Deep Supervised Discrete Hashing
    Li, Qi
    Sun, Zhenan
    He, Ran
    Tan, Tieniu
    INTERNATIONAL JOURNAL OF COMPUTER VISION, 2020, 128 (8-9) : 2204 - 2222
  • [26] A General Framework for Deep Supervised Discrete Hashing
    Qi Li
    Zhenan Sun
    Ran He
    Tieniu Tan
    International Journal of Computer Vision, 2020, 128 : 2204 - 2222
  • [27] A General Framework for Linear Distance Preserving Hashing
    Wang, Min
    Zhou, Wengang
    Tian, Qi
    Li, Houqiang
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2018, 27 (02) : 907 - 922
  • [28] Secure Split Learning against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks
    Mao, Yunlong
    Xin, Zexi
    Li, Zhenyu
    Hong, Jue
    Yang, Qingyou
    Zhong, Sheng
    arXiv, 2023,
  • [29] Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks
    Mao, Yunlong
    Xin, Zexi
    Li, Zhenyu
    Hong, Jue
    Yang, Qingyou
    Zhong, Sheng
    COMPUTER SECURITY - ESORICS 2023, PT IV, 2024, 14347 : 23 - 43
  • [30] A Robust Image Hashing Algorithm Resistant Against Geometrical Attacks
    Liu, YuLing
    Xiao, Yong
    RADIOENGINEERING, 2013, 22 (04) : 1072 - 1081