Abstract
In order to provide protection for biometric features in palmprint authentication, we propose a palmprint authentication scheme suitable for personal environments with privacy-preserving trait using the ElGamal encryption scheme which is mulplicatively homomorphic. To achieve faster running speed, we use binary vectors to represent palmprint features and use Hamming distance to indicate the similarity of different feature vectors. We give security and performance analysis, and use Matlab to implement some key modules of the proposed scheme. Theoretical analysis and experimental results show that the proposed scheme achieves confidential computations of palmprint feature vectors. The recognition accuracy can meet practical requirements and the overall performance transcends existing relative schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 113 (2008)
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005). doi:10.1007/978-3-540-30576-7_18
Luo, Z.: Research on blind identity authentication protocol based on biometrics. Ph.D. thesis, Beijing Jiaotong University, Beijing (2014)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Upmanyu, M., Namboodiri, A.M., Srinathan, K., Jawahar, C.V.: Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans. Inf. Forensics Secur. 5(2), 255–268 (2010)
Schoenmakers, B., Tuyls, P.: Computationally secure authentication with noisy data. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds.) Security with Noisy Data, pp. 141–149. Springer, London (2007). doi:10.1007/978-1-84628-984-2_9
Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235–253. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03168-7_14
Blanton, M., Gasti, P.: Secure and efficient protocols for iris and fingerprint identification. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 190–209. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23822-2_11
Qu, Y.: Research on palmprint authentication based on homomorphic encryption. Ph.D. thesis, Southwest Jiaotong University (2015)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7_2
Im, J.H., Choi, J.C., Nyang, D.H., Lee, M.K.: Privacy-preserving palm print authentication using homomorphic encryption. In: IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress, Auckland, pp. 878–881 (2016)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_16
Catalano, D., Fiore, D.: Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, pp. 1518–1529. ACM (2015)
Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984)
Du, X., Zhang, M., Nygard, K.E., Guizani, S., Chen, H.-H.: Self-healing sensor networks with distributed decision making. Int. J. Sens. Netw. 2(5–6), 289–298 (2007)
Yue, F., Zuo, W., Zhang, D.: A survey of palmprint recognition. J. Autom. 36(3), 353–365 (2010)
Yang, J., Zhang, D., Yang, J.-Y., Niu, B.: Globally maximizing, locally minimizing: unsupervised discriminant projection with applications to face and palm biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 650–664 (2007)
Connie, T., Jin, A.T.B., Ong, M.G.K., Ling, D.N.C.: An automated palmprint recognition system. Image Vis. Comput. 23(5), 501–515 (2005)
Bingham, E., Mannil, H.:. Random projection in dimensionality reduction: applications to image and text data. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, pp. 245–250. ACM (2001)
Achlioptas, D.: Database-friendly random projections: Johnson-lindenstrauss with binary coins. J. Comput. Syst. Sci. 66(4), 671–687 (2003)
Yao, X., Han, X., Xiaojiang, D., Zhou, X.: A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sens. J. 13(10), 3693–3701 (2013)
Acknowledgements
This work is partially supported by the National Natural Science Foundation of China “Research on Key Technologies of Secure Cloud Data Storage Based on (Fully) Homomorphic Encryption” (Grant No. 61772150), the Crypto Development Fund of China (Grant No. MMJJ20170217) and the open subject project “Palmprint feature protection research based on homomorphic encryption” of Guangxi Key Laboratory of cryptography and information security (Approval No. GCIS201622) and the planning fund project of ministry of education (12YJAZH136).
We thank Diongxiong WU and Zhiqiang Gao for helpful comments and discussions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Wang, H., Ding, Y., Tang, S., Wang, J. (2017). An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_39
Download citation
DOI: https://doi.org/10.1007/978-3-319-69471-9_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69470-2
Online ISBN: 978-3-319-69471-9
eBook Packages: Computer ScienceComputer Science (R0)