http://iet.metastore.ingenta.com
1887

On application of bloom filters to iris biometrics

On application of bloom filters to iris biometrics

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this study, the application of adaptive Bloom filters to binary iris biometric feature vectors, that is, iris-codes, is proposed. Bloom filters, which have been established as a powerful tool in various fields of computer science, are applied in order to transform iris-codes to a rotation-invariant feature representation. Properties of the proposed Bloom filter-based transform concurrently enable (i) biometric template protection, (ii) compression of biometric data and (iii) acceleration of biometric identification, whereas at the same time no significant degradation of biometric performance is observed. According to these fields of application, detailed investigations are presented. Experiments are conducted on the CASIA-v3 iris database for different feature extraction algorithms. Confirming the soundness of the proposed approach, the application of adaptive Bloom filters achieves rotation-invariant cancellable templates maintaining biometric performance, a compression of templates down to 20–40% of original size and a reduction of bit-comparisons to less than 5% leading to a substantial speed-up of the biometric system in identification mode.

References

    1. 1)
      • J. Daugman .
        1. Daugman, J.: ‘High confidence visual recognition of persons by a test of statistical independence’, IEEE Trans. Pattern Anal. Mach. Intell., 1993, 15, (11), pp. 11481161 (doi: 10.1109/34.244676).
        . IEEE Trans. Pattern Anal. Mach. Intell. , 11 , 1148 - 1161
    2. 2)
      • K. Bowyer , K. Hollingsworth , P. Flynn .
        2. Bowyer, K., Hollingsworth, K., Flynn, P.: ‘Image understanding for iris biometrics: a survey’, Comput. Vis. Image Underst., 2007, 110, (2), pp. 281307 (doi: 10.1016/j.cviu.2007.08.005).
        . Comput. Vis. Image Underst. , 2 , 281 - 307
    3. 3)
      • C. Rathgeb , A. Uhl , P. Wild . (2012)
        3. Rathgeb, C., Uhl, A., Wild, P.: ‘Iris biometrics: from segmentation to template securityNumber 59 in Advances in Information Security. (Springer, 2012).
        .
    4. 4)
      • J. Daugman . (2009)
        4. Daugman, J.: ‘Iris recognition at airports and border-crossings’. In: Li, S.Z. (ed):‘Encyclopedia of biometrics’ (Springer, 2009).
        .
    5. 5)
      • A. Ross .
        5. Ross, A.: ‘Iris recognition: the path forward’, Computer, 2001, 43, pp. 3035 (doi: 10.1109/MC.2010.44).
        . Computer , 30 - 35
    6. 6)
      • J. Daugman .
        6. Daugman, J.: ‘How iris recognition works’, IEEE Trans. Circuits Syst. Video Technol., 2004, 14, (1), pp. 2130 (doi: 10.1109/TCSVT.2003.818350).
        . IEEE Trans. Circuits Syst. Video Technol. , 1 , 21 - 30
    7. 7)
      • 7. Unique Identification Authority of India. Aadhaar: http://www.uidai.gov.in/. retrieved March, 2013.
        .
    8. 8)
      • S. Cimato , M. Gamassi , V. Piuri , R. Sassi , F. Scotti . (2009)
        8. Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: ‘Privacy in biometrics’ ‘Biometrics: fundamentals, theory, and systems’ (Wiley, 2009).
        .
    9. 9)
      • S. Venugopalan , M. Savvides .
        9. Venugopalan, S., Savvides, M.: ‘How to generate spoofed irises from an iris code template’, IEEE Trans. Inf. Forensics Sec., 2011, 6, (2), pp. 385395 (doi: 10.1109/TIFS.2011.2108288).
        . IEEE Trans. Inf. Forensics Sec. , 2 , 385 - 395
    10. 10)
      • 10. ISO/IEC JTC1 SC27 Security Techniques. ISO/IEC 24745:2011. Information Technology – Security Techniques – Biometric Information Protection. International Organization for Standardization, 2011.
        .
    11. 11)
      • A.K. Jain , K. Nandakumar , A. Nagar .
        11. Jain, A.K., Nandakumar, K., Nagar, A.: ‘Biometric template security’, EURASIP J. Adv. Signal Process., 2008, 2008, pp. 117 (doi: 10.1155/2008/657081).
        . EURASIP J. Adv. Signal Process. , 1 - 17
    12. 12)
      • C. Rathgeb , A. Uhl .
        12. Rathgeb, C., Uhl, A.: ‘A survey on biometric cryptosystems and cancelable biometrics’, EURASIP J. Inf. Sec., 2011, 2011, (3), pp. 125.
        . EURASIP J. Inf. Sec. , 3 , 1 - 25
    13. 13)
      • N. Ratha , J. Connell , R. Bolle .
        13. Ratha, N., Connell, J., Bolle, R.: ‘Enhancing security and privacy in biometrics-based authentication systems’, IBM Syst. J., 2001, 40, (3), pp. 614634 (doi: 10.1147/sj.403.0614).
        . IBM Syst. J. , 3 , 614 - 634
    14. 14)
      • J. Daugman .
        14. Daugman, J.: ‘The importance of being random: statistical principles of iris recognition’, Pattern Recognition, 2003, 36, (2), pp. 279291 (doi: 10.1016/S0031-3203(02)00030-4).
        . Pattern Recognition , 2 , 279 - 291
    15. 15)
      • K.P. Hollingsworth , K.W. Bowyer , P.J. Flynn .
        15. Hollingsworth, K.P., Bowyer, K.W., Flynn, P.J.: ‘The best bits in an iris code’, IEEE Trans. Pattern Anal. Mach. Intell., 2009, 31, (6), pp. 964973 (doi: 10.1109/TPAMI.2008.185).
        . IEEE Trans. Pattern Anal. Mach. Intell. , 6 , 964 - 973
    16. 16)
      • J.E. Gentile , N. Ratha , J. Connell .
        16. Gentile, J.E., Ratha, N., Connell, J.: ‘SLIC: short-length iris codes’. Proc. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems, 2009, pp. 15.
        . Proc. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems , 1 - 5
    17. 17)
      • J.E. Gentile , N. Ratha , J. Connell .
        17. Gentile, J.E., Ratha, N., Connell, J.: ‘An efficient, two-stage iris recognition system’. Proc. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems, 2009, pp. 15.
        . Proc. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems , 1 - 5
    18. 18)
      • M. Konrad , H. Stögner , A. Uhl , P. Wild .
        18. Konrad, M., Stögner, H., Uhl, A., Wild, P.: ‘Computationally efficient serial combination of rotation-invariant and rotation compensating iris recognition algorithms’. Proc. Fifth Int. Conf. on Computer Vision Theory and Applications, 2010, vol. 1, pp. 8590.
        . Proc. Fifth Int. Conf. on Computer Vision Theory and Applications , 85 - 90
    19. 19)
      • B. Bloom .
        19. Bloom, B.: ‘Space/time tradeoffs in hash coding with allowable errors’, Commun. ACM, 1970, 13, (7), pp. 422426 (doi: 10.1145/362686.362692).
        . Commun. ACM , 7 , 422 - 426
    20. 20)
      • J. Mullin .
        20. Mullin, J.: ‘Optimal semijoins for distributed database systems’, IEEE Trans. Softw. Eng., 1990, 16, (5), pp. 558560 (doi: 10.1109/32.52778).
        . IEEE Trans. Softw. Eng. , 5 , 558 - 560
    21. 21)
      • A. Broder , M. Mitzenmacher .
        21. Broder, A., Mitzenmacher, M.: ‘Network applications of bloom filters: a survey’, Internet Math., 2005, 1, (4), pp. 485509 (doi: 10.1080/15427951.2004.10129096).
        . Internet Math. , 4 , 485 - 509
    22. 22)
      • C. Rathgeb , F. Breitinger , C. Busch .
        22. Rathgeb, C., Breitinger, F., Busch, C.: ‘Alignment-free cancelable Iris biometric templates based on adaptive bloom filters’. Proc. Sixth IAPR Int. Conf. on Biometrics (ICB'13), 2013, pp. 18.
        . Proc. Sixth IAPR Int. Conf. on Biometrics (ICB'13) , 1 - 8
    23. 23)
      • A. Juels , M. Wattenberg .
        23. Juels, A., Wattenberg, M.: ‘A fuzzy commitment scheme’. Proc. Sixth ACM Conf. on Computer and Communications Security, 1999, pp. 2836.
        . Proc. Sixth ACM Conf. on Computer and Communications Security , 28 - 36
    24. 24)
      • A. Juels , M. Sudan .
        24. Juels, A., Sudan, M.: ‘A fuzzy vault scheme’. Proc. IEEE Int. Symp. on Information Theory, 2002, p. 408.
        . Proc. IEEE Int. Symp. on Information Theory
    25. 25)
      • F. Hao , R. Anderson , J. Daugman .
        25. Hao, F., Anderson, R., Daugman, J.: ‘Combining cryptography with biometrics effectively’, IEEE Trans. Comput., 2006, 55, (9), pp. 10811088 (doi: 10.1109/TC.2006.138).
        . IEEE Trans. Comput. , 9 , 1081 - 1088
    26. 26)
      • J. Bringer , H. Chabanne , G. Cohen , B. Kindarji , G. Zemor .
        26. Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Zemor, G.: ‘Theoretical and practical boundaries of binary secure sketches’, IEEE Trans. Inf. Forensics Sec., 2008, 3, pp. 673683 (doi: 10.1109/TIFS.2008.2002937).
        . IEEE Trans. Inf. Forensics Sec. , 673 - 683
    27. 27)
      • C. Lee , J. Choi , K. Toh , S. Lee , J. Kim .
        27. Lee, C., Choi, J., Toh, K., Lee, S., Kim, J.: ‘Alignment-free cancelable fingerprint templates based on local minutiae information’, IEEE Trans. Syst. Man Cybern. B, Cybern., 2007, 37, (4), pp. 980992 (doi: 10.1109/TSMCB.2007.896999).
        . IEEE Trans. Syst. Man Cybern. B, Cybern. , 4 , 980 - 992
    28. 28)
      • C. Rathgeb , A. Uhl .
        28. Rathgeb, C., Uhl, A.: ‘Statistical attack against fuzzy commitment scheme’, IET Biometrics, 2012, 1, (2), pp. 94104 (doi: 10.1049/iet-bmt.2011.0001).
        . IET Biometrics , 2 , 94 - 104
    29. 29)
      • W. Scheirer , T. Boult .
        29. Scheirer, W., Boult, T.: ‘Cracking fuzzy vaults and biometric encryption’. Proc. Biometrics Symp., 2007, pp. 16.
        . Proc. Biometrics Symp. , 1 - 6
    30. 30)
      • J. Zuo , N.K. Ratha , J.H. Connel .
        30. Zuo, J., Ratha, N.K., Connel, J.H.: ‘Cancelable iris biometric’. Proc. 19th Int. Conf. on Pattern Recognition, 2008, pp. 14.
        . Proc. 19th Int. Conf. on Pattern Recognition , 1 - 4
    31. 31)
      • J. Hämmerle-Uhl , E. Pschernig , A. Uhl .
        31. Hämmerle-Uhl, J., Pschernig, E., Uhl, A.: ‘Cancelable iris biometrics using block re-mapping and image warping’. in: Samarati, P., Yung, M., Martinelli, F., Ardagna, C., (Eds.), Proc. 12th Int. Information Security Conf., 2009(LNCS, 5735), pp. 135142.
        . Proc. 12th Int. Information Security Conf. , 135 - 142
    32. 32)
      • O. Ouda , N. Tsumura , T. Nakaguchi .
        32. Ouda, O., Tsumura, N., Nakaguchi, T.: ‘Tokenless cancelable biometrics scheme for protecting iris codes’. Proc. 20th Int. Conf. on Pattern Recognition, 2010, pp. 882885.
        . Proc. 20th Int. Conf. on Pattern Recognition , 882 - 885
    33. 33)
      • A. Kong , K.-H. Cheunga , D. Zhanga , M. Kamelb , J. Youa .
        33. Kong, A., Cheunga, K.-H., Zhanga, D., Kamelb, M., Youa, J.: ‘An analysis of BioHashing and its variants’, Pattern Recognit., 2006, 39, (7), pp. 13591368 (doi: 10.1016/j.patcog.2005.10.025).
        . Pattern Recognit. , 7 , 1359 - 1368
    34. 34)
      • J.K. Pillai , V.M. Patel , R. Chellappa , N.K. Ratha .
        34. Pillai, J.K., Patel, V.M., Chellappa, R., Ratha, N.K.: ‘Secure and robust iris recognition using random projections and sparse representations’, IEEE Trans. Pattern Anal. Mach. Intell., 2011, 33, (9), pp. 18771893 (doi: 10.1109/TPAMI.2011.34).
        . IEEE Trans. Pattern Anal. Mach. Intell. , 9 , 1877 - 1893
    35. 35)
      • S.C. Chong , A.T.B. Jin , D.N.C. Ling .
        35. Chong, S.C., Jin, A.T.B., Ling, D.N.C.: ‘High security iris verification system based on random secret integration’, Comput. Vis. Image Underst., 2006, 102, (2), pp. 169177 (doi: 10.1016/j.cviu.2006.01.002).
        . Comput. Vis. Image Underst. , 2 , 169 - 177
    36. 36)
      • S.C. Chong , A.T.B. Jin , D.N.C. Ling .
        36. Chong, S.C., Jin, A.T.B., Ling, D.N.C.: ‘Iris authentication using privatized advanced correlation filter’. in: Zhang, D., Jain, A. (Eds.), Proc. First Int. Conf. on Biometrics, 2006,(LNCS, 3832), pp. 382388.
        . Proc. First Int. Conf. on Biometrics , 382 - 388
    37. 37)
      • F. Hao , J. Daugman , P. Zielinski .
        37. Hao, F., Daugman, J., Zielinski, P.: ‘A fast search algorithm for a large fuzzy database’, IEEE Trans. Inf. Forensics Sec., 2008, 3, (2), pp. 203212 (doi: 10.1109/TIFS.2008.920726).
        . IEEE Trans. Inf. Forensics Sec. , 2 , 203 - 212
    38. 38)
      • R. Mukherjee , A. Ross .
        38. Mukherjee, R., Ross, A.: ‘Indexing iris images’. Proc. 19th Int. Conf. on Pattern Recognition (ICPR'08), 2008, pp. 14.
        . Proc. 19th Int. Conf. on Pattern Recognition (ICPR'08) , 1 - 4
    39. 39)
      • C. Rathgeb , A. Uhl .
        39. Rathgeb, C., Uhl, A.: ‘Iris-biometric hash generation for biometric database indexing’. Proc. 20th Int. Conf. on Pattern Recognition, 2010, pp. 28482851.
        . Proc. 20th Int. Conf. on Pattern Recognition , 2848 - 2851
    40. 40)
      • C. Rathgeb , A. Uhl , P. Wild .
        40. Rathgeb, C., Uhl, A., Wild, P.: ‘Incremental iris recognition: a single-algorithm serial fusion strategy to optimize time complexity’. Proc. IEEE Fourth Int. Conf. on Biometrics: Theory, Applications, and Systems, 2010, pp. 16.
        . Proc. IEEE Fourth Int. Conf. on Biometrics: Theory, Applications, and Systems , 1 - 6
    41. 41)
      • L. Masek . (2003)
        41. Masek, L.: ‘Recognition of human iris patterns for biometric identification’. Master's thesis, University of Western Australia, 2003.
        .
    42. 42)
      • 42. ISO/IEC TC JTC1 SC37 Biometrics. ISO/IEC 19795-1:2006. Information Technology – Biometric Performance Testing and Reporting – Part 1: Principles and Framework. International Organization for Standardization and International Electrotechnical Committee, Mar. 2006.
        .
    43. 43)
      • A. Uhl , P. Wild .
        43. Uhl, A., Wild, P.: ‘Weighted adaptive hough and ellipsopolar transforms for real-time iris segmentation’. Proc. Fifth Int. Conf. on Biometrics, 2012, pp. 18.
        . Proc. Fifth Int. Conf. on Biometrics , 1 - 8
    44. 44)
      • L. Ma , T. Tan , Y. Wang , D. Zhang .
        44. Ma, L., Tan, T., Wang, Y., Zhang, D.: ‘Efficient iris recognition by characterizing key local variations’, IEEE Trans. Image Process., 2004, 13, (6), pp. 739750 (doi: 10.1109/TIP.2004.827237).
        . IEEE Trans. Image Process. , 6 , 739 - 750
    45. 45)
      • R. Viveros , K. Balasubramanian , N. Balakrishnan .
        45. Viveros, R., Balasubramanian, K., Balakrishnan, N.: ‘Binomial and negative binomial analogues under correlated Bernoulli trials’, Am. Stat., 1984, 48, (3), pp. 243247.
        . Am. Stat. , 3 , 243 - 247
    46. 46)
      • E. Maiorana .
        46. Maiorana, E.: ‘Biometric cryptosystem using function based on-line signature recognition’, Expert Syst. Appl., 2010, 37, (4), pp. 34543461 (doi: 10.1016/j.eswa.2009.10.043).
        . Expert Syst. Appl. , 4 , 3454 - 3461
    47. 47)
      • J. Daugman .
        47. Daugman, J.: ‘Probing the uniqueness and randomness of iriscodes: results from 200 billion iris pair comparisons’, Proc. IEEE, 2006, 94, (11), pp. 19271935 (doi: 10.1109/JPROC.2006.884092).
        . Proc. IEEE , 11 , 1927 - 1935
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2013.0049
Loading

Related content

content/journals/10.1049/iet-bmt.2013.0049
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address