How to Generate Keys from Margarita Osadchy University of Haifa - - PowerPoint PPT Presentation

how to generate keys from
SMART_READER_LITE
LIVE PREVIEW

How to Generate Keys from Margarita Osadchy University of Haifa - - PowerPoint PPT Presentation

How to Generate Keys from Margarita Osadchy University of Haifa Facial Images and Keep your Joint work with Mahmood Privacy at the Same Time Sharif and Orr Dunkelman Motivation Key-Derivation: generating a secret key, from information


slide-1
SLIDE 1

How to Generate Keys from Facial Images and Keep your Privacy at the Same Time

Margarita Osadchy University of Haifa Joint work with Mahmood Sharif and Orr Dunkelman

slide-2
SLIDE 2

Motivation

❖ Key-Derivation: generating a secret key, from information

possessed by the user

❖ Passwords are the most widely used means for key derivation, ❖ but…

slide-3
SLIDE 3

Motivation

❖ Passwords are:

  • 1. Forgettable

??

slide-4
SLIDE 4

Motivation

❖ Passwords are:

  • 1. Forgettable
  • 2. Easily observable (shoulder-surfing)

What’s up doc?

slide-5
SLIDE 5

Motivation

❖ Passwords are:

  • 1. Forgettable
  • 2. Easily observable (shoulder-surfing)
  • 3. Low entropy

pwd

slide-6
SLIDE 6

Motivation

❖ Passwords are:

  • 1. Forgettable
  • 2. Easily observable (shoulder-surfing)
  • 3. Low entropy
  • 4. Carried over between systems

pwd pwd

slide-7
SLIDE 7

Motivation

❖ Suggestion: use biometric data for key generation ❖ Problems :

  • 1. It is hard/impossible to replace the biometric template in case it

gets compromised

  • 2. Privacy of the users
slide-8
SLIDE 8

Privacy of Biometric Data

x K

slide-9
SLIDE 9

The Fuzziness Problem

Two images of the same face are rarely identical (due to lighting, pose, expression changes(

  • Taken one after the other
  • 81689 pixels are different
  • only 3061 pixels have identical values!
slide-10
SLIDE 10

The Fuzziness Problem

❖ Two images of the same face are rarely identical (due to

lighting, pose, expression changes(

❖ Yet we want to consistently create the same key for the user

every time

❖ The fuzziness in the samples is handled by:

  • 1. Feature extraction
  • 2. Use of error-correction codes and helper data
slide-11
SLIDE 11

3-Step Noise Reduction Process

1 1 1

ECC

reduces changes due to viewing conditions and small distortions Feature extraction Binarization Error correction converts to binary representation and removes most of the noise removes the remaining noise

slide-12
SLIDE 12

Feature Extraction

User-specific features: Eigenfaces (PCA) Fisherfaces (FLD( Generic Features Histograms of low-level features, e.g.: LBPs, SIFT Filters : Gabor features, etc

training step produces user specific parameters, stored for feature extraction No training, no user specific information is required

slide-13
SLIDE 13

Feature Extraction

Previous Work

❖ ]FYJ10] used Fisherfaces - public data looks like the users:

❖ Very discriminative (better recognition) ❖ But compromises privacy.

Can’t be used!

slide-14
SLIDE 14

Use Generic Features?

❖ Yes, but require caution. ❖ In [KSVAZ05] high-order dependencies between different channels

  • f the Gabor transform

❖ ➜

correlations between the bits of the suggested representation

slide-15
SLIDE 15

Binarization

❖ Essential for using the cryptographic constructions ❖ Some claim: non-invertibility [TGN06] ❖ By :

  • Sign of projection
  • Quantization

Biometric features can be approximated

Quantization is more accurate, but requires storing additional private information.

slide-16
SLIDE 16

Cryptographic Noise Tolerant Constructions

❖ Fuzzy Commitment [JW99]: ❖ Other constructions: Fuzzy Vault [JS06], Fuzzy Extractors [DORS08]

s Encode s Decode k

Enrollment Key Generation

Binary Representation of the biometrics Binary Representation of the biometrics

𝑙 ← {0,1}∗

slide-17
SLIDE 17

Previous Work

Problems

  • 1. Short keys
  • 2. Non-uniformly distributed binary strings as an input for the

fuzzy commitment scheme

  • 3. Dependency between bits of the biometric samples
  • 4. Auxiliary data leaks personal information
  • 5. No protection when the adversary gets hold of the cryptographic

key

slide-18
SLIDE 18

Security Requirements

1. Consistency: identify a person as himself (low FRR) 2. Discrimination: impostor cannot impersonate an enrolled user (low FAR) ]BKR08]: 3. Weak Biometric Privacy (REQ-WBP): computationally infeasible to learn the biometric information given the helper data 4. Strong Biometric Privacy (REQ-SBP): computationally infeasible to learn the biometric information given the helper data and the key 5. Key Randomness (REQ-KR): given access to the helper data, the key should be computationally indistinguishable from random

slide-19
SLIDE 19

Feature Extraction

  • 1. Landmark Localization and Alignment

❖ Face landmark localization [ZR12] and affine transformation to a

canonical pose:

❖ An essential step, due to the inability to perform alignment between

enrolled and newly presented template

slide-20
SLIDE 20

Feature Extraction

  • 2. Feature Extraction

❖ Local Binary Patterns (LBPs) descriptors are computed from 21 regions

defined on the face:

❖ The same is done with Scale Invariant Feature Transform (SIFT)

descriptors

❖ Histograms of Oriented Gradients (HoGs) are computed on the whole face

slide-21
SLIDE 21

Binarization by Projection

   

1 2 1 ) (   x W sign x h

T

x

slide-22
SLIDE 22

Binarization by Projection

+1

  • 1

Wi

   

1 2 1 ) (   x W sign x h

T

x

1 ) (  x hi

slide-23
SLIDE 23

Binarization by Projection

+1

  • 1

Wi

   

1 2 1 ) (   x W sign x h

T

x

) (  x hi

slide-24
SLIDE 24

Binarization by Projection

+1

  • 1

Wi h(x’) ?

   

1 2 1 ) (   x W sign x h

T

x

) (  x hi

slide-25
SLIDE 25

Binarization by Projection

+1

  • 1

Wi

   

1 2 1 ) (   x W sign x h

T

x ) ' ( ) (   x h x h

i i

slide-26
SLIDE 26

Binarization by Projection

+1

  • 1

Wi

   

1 2 1 ) (   x W sign x h

T

x 1 ) ' ( 1 ) (   x h x h

i i

slide-27
SLIDE 27

Embedding in d-dimensional space

+1

  • 1

Wi

slide-28
SLIDE 28

Embedding in d-dimensional space

+1

  • 1

Wj

slide-29
SLIDE 29

Binarization Alg.

❖ Requirements from the binary representation:

  • 1. Consistency and discrimination
  • 2. No correlations between the bits
  • 3. High min-entropy

❖ We find a discriminative projection space W by generalizing an

algorithm from [WKC10] (for solving ANN problem)

❖ For

:

❖ The aim is to find hyperplanes , s.t. for

:

if

  • therwise

if the pair belongs to the same user

  • therwise
slide-30
SLIDE 30

Removing Dependencies between Bits

Dimension Reduction and Concatenation

  • f Feature Vectors

X

slide-31
SLIDE 31

Removing Dependencies between Bits

Dimension Reduction and Concatenation

  • f Feature Vectors

Removing Correlations Between the Features Rescaling for the [0,1] Interval

w

A

X Z=AtX

slide-32
SLIDE 32

Removing Dependencies between Bits

Dimension Reduction and Concatenation

  • f Feature Vectors

Removing Correlations Between the Features Rescaling for the [0,1] Interval

32

w

A

X Z=AtX

   

1 2 1 ) (   z W sign z h

T

mutually independent bits

Projection onto orthogonal hypeplanes W

slide-33
SLIDE 33

Full System

❖ Enrollment: ❖ Key-Generation:

Feature Extraction

Binarization

s Encode

s

Feature Extraction

Binarization

Decode and Hash

𝑙 ← {0,1}∗

slide-34
SLIDE 34

Transfer Learning of the Embedding

  • Learning W is done only once using subjects different from the users
  • f the key derivation system.
  • How is it done?

Is this Alice? Instead of learning … Is this Bob? … Same? We learn Different? A more generic question that can be learnt for population.

slide-35
SLIDE 35

Experiments

Constructing the Embedding

  • Performed only once
  • Subjects are different than those in testing

View Number of Subjects Images Per Subject Number of Hyperplanes Frontal 949 3-4 800 Profile 1117 1-8 800

slide-36
SLIDE 36

Experiments

Evaluation

❖ Data:

  • 2 frontal images and 2 profile images of 100 different subjects

(not in the training set) were used

❖ Recognition tests:

  • 5 round cross validation framework was followed to measure

TPR-vs-FPR while increasing the threshold (ROC-curves)

❖ Key generation tests:

  • 100 genuine authentication attempts, and 99*100 impostor

authentication attempts

slide-37
SLIDE 37

Results

Recognition

ROC curves

slide-38
SLIDE 38

Results

Key Generation

❖ There is a trade-off between the amount of errors that the error-

correction code can handle and the length of the produced key

❖ The Hamming-bound gives the following relation:

  • n: the code length (=1600 in our case)
  • t: the maximal number of corrected errors
  • k: the length of the encoded message (produced key, in our case)
slide-39
SLIDE 39

Results

Key Generation

t k≤ FRR our method FRR Random Projection 595 80 0.30 0.32 609 70 0.16 0.23 624 60 0.12 0.19

For FAR= 0 :

slide-40
SLIDE 40

Error Correction Code

5 bits 5 bits 5 bits

X RS,GF(25): 15,GF(25) 31,GF(25) Probability of error in bit 0.3 Probability of error in symbol 1-0.75≈0.83

slide-41
SLIDE 41

Possible Solution

X RS,GF(25): 15,GF(25) 31,GF(25) Probability of error in bit 0.3 Probability of error in symbol 0.3 X X X X 5 bits

slide-42
SLIDE 42

Possible Solution

X X X X X … q times 31 5 ECC(K) 31 5 ECC(K) Encoding: s1 s2 s3 s4 s5

slide-43
SLIDE 43

Possible Solution

X’ X’ X’ X’ X’ … Decoding: s1 s2 s3 s4 s5 31 5 31 5 the value of the bit = majority over q values decode(C) K C

slide-44
SLIDE 44

Problem in Security

X RS,GF(25): 15,GF(25) 31,GF(25) X X X X

15 bits

31 5 ECC(K) guessing

slide-45
SLIDE 45

Problem in Security

X RS,GF(25): 15,GF(25) 31,GF(25) Probability of error in bit 0.3 Probability of error in symbol 0.3 X X X X

15 bits

31 5 ECC(K)

15 bits 15 bits 15 bits 15 bits

guessing

slide-46
SLIDE 46

Problem in Security

X RS,GF(25): 15,GF(25) 31,GF(25) X X X X

15 bits

ECC(K)

15 bits 15 bits 15 bits 15 bits

guessing reveals

15 bit security

slide-47
SLIDE 47

Secret Sharing Solution

RS,GF(25): 15,GF(25) 31,GF(25) K=K1 K2 … Kr X X X X X … q times 31 5 ECC(K1) 31 5 ECC(K1) s1 s2 s3 s4 s5 … q times 31 5 ECC(Kr) 31 5 ECC(Kr) …

15r bit security

slide-48
SLIDE 48

Results for r=3

75 bits Key Length 45 bits Security 0.085 FRR 5.6022e-04 FAR sec 0.07 Encoding time (Matlab implementation) 0.05 sec Decoding time (Matlab implementation)

slide-49
SLIDE 49

Security Analysis

  • 1. Consistency: FRR = 0.085 (for 75-bit key)
  • 2. Discrimination: FAR very low
  • 3. REQ-WBP: follows from REQ-SBP
  • 4. REQ-SBP: this property is accomplished if the representation is

uniformly distributed, as shown in [JW99]

slide-50
SLIDE 50

Security Analysis

Uniformity of the Representation

❖ No correlation between the bits - way 1

:

  • High degrees-of-freedom : 1571.72
  • p: average relative distance between two representation of

different persons

  • : the standard deviation

No correlation between the bits + high min-entropy ⇒ uniform distribution

slide-51
SLIDE 51

Security Analysis

Uniformity of the Representation

❖ No correlation between the bits

way 2:

❖ The representation has a diagonal covariance matrix: ❖ High min-entropy: 1562.02

(maximal bias from 0.5 is 0.0757, average distance from 0.5 is 0.0066)

No correlation between the bits + high min-entropy ⇒ uniform distribution

slide-52
SLIDE 52

Security Analysis

  • 1. Consistency: FRR = 0.16 (for 70-bit key)
  • 2. Discrimination: FAR = 0
  • 3. REQ-WBP: follows from REQ-SBP
  • 4. REQ-SBP: this property is accomplished if the representation is

uniformly distributed, as shown in [JW99]

  • 5. REQ-KR: next
slide-53
SLIDE 53

Security Analysis

REQ-KR

❖ Show that is high ❖ x~U ➜ all possible results of have an almost

equal probability, regardless of s’s value

❖ Thus, is high

slide-54
SLIDE 54

Conclusions

❖ We showed a system for Key-Derivation that achieves:

  • 1. Consistency and discriminability
  • 2. High min-entropy representation
  • 3. Provable security
  • 4. Provable privacy
  • 5. Fast face-authentication
slide-55
SLIDE 55

What this is Good for?

❖ Key derivation schemes – your face is your key ❖ Can be easily transformed into a login mechanism ❖ Can be used in biometric databases (identify double acquisition

without hurting honest users’ privacy(

slide-56
SLIDE 56

Future Work

1. Generating longer keys - by decreasing the distance within the same class/subject 2. Adding invariance to changes in viewing conditions and intra- personal changes 3. Improving the error-correction

slide-57
SLIDE 57

Thank You!