A Statistical Analysis of IrisCode and Its Security Implications

被引:5
作者
Kong, Adams Wai-Kin [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
关键词
Biometrics; iris recognition; statistical dependence; Daugman algorithm; template protection; RECOGNITION;
D O I
10.1109/TPAMI.2014.2343959
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
IrisCode has been used to gather iris data for 430 million people. Because of the huge impact of IrisCode, it is vital that it is completely understood. This paper first studies the relationship between bit probabilities and a mean of iris images (The mean of iris images is defined as the average of independent iris images.) and then uses the Chi-square statistic, the correlation coefficient and a resampling algorithm to detect statistical dependence between bits. The results show that the statistical dependence forms a graph with a sparse and structural adjacency matrix. A comparison of this graph with a graph whose edges are defined by the inner product of the Gabor filters that produce IrisCodes shows that partial statistical dependence is induced by the filters and propagates through the graph. Using this statistical information, the security risk associated with two patented template protection schemes that have been deployed in commercial systems for producing application-specific IrisCodes is analyzed. To retain high identification speed, they use the same key to lock all IrisCodes in a database. The belief has been that if the key is not compromised, the IrisCodes are secure. This study shows that even without the key, application-specific IrisCodes can be unlocked and that the key can be obtained through the statistical dependence detected.
引用
收藏
页码:513 / 528
页数:16
相关论文
共 34 条
[1]   A LINEAR-PROGRAMMING APPROACH FOR THE WEIGHTED GRAPH MATCHING PROBLEM [J].
ALMOHAMAD, HA ;
DUFFUAA, SO .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1993, 15 (05) :522-525
[2]  
[Anonymous], 2009, ELEMENTARY CRYPTANAL
[3]  
[Anonymous], 2002, IEEE WORKSHOP AUTOMA
[4]  
Braithwaite M., 2002, Authentication using application-specific biometric templates, Patent No. [WO2002/095657, 2002095657]
[5]   How iris recognition works [J].
Daugman, J .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004, 14 (01) :21-30
[6]  
Daugman J, 2003, PATTERN RECOGN, V36, P279, DOI 10.1016/S0031-3203(02)00030-4
[7]  
Daugman J., 2013, HIST IRIS RECOGNITIO
[8]   HIGH CONFIDENCE VISUAL RECOGNITION OF PERSONS BY A TEST OF STATISTICAL INDEPENDENCE [J].
DAUGMAN, JG .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1993, 15 (11) :1148-1161
[9]   New methods in iris recognition [J].
Daugman, John .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2007, 37 (05) :1167-1175
[10]  
Galbally Javier, 2012, BLACK HAT BRIEFINGS, P1