2011 18th IEEE International Conference on Image Processing 2011
DOI: 10.1109/icip.2011.6116352
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of a cancelable iris recognition system based on block remapping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…Then, a key is used as a seed to represent one particular distortion on the remapped image to prevent reconstruction of the original iris data. Jenisch and Uhl [30] highlighted the vulnerability of the remapping process in the scenario of coalition attack presuming that single or multiple templates are available to an attacker. Increasing the security to the recommended level will sacrifice the performance of the system with more than 100% of EER degradation from 1.244 to 2.846.…”
Section: Related Work Problem Definitionmentioning
confidence: 99%
“…Then, a key is used as a seed to represent one particular distortion on the remapped image to prevent reconstruction of the original iris data. Jenisch and Uhl [30] highlighted the vulnerability of the remapping process in the scenario of coalition attack presuming that single or multiple templates are available to an attacker. Increasing the security to the recommended level will sacrifice the performance of the system with more than 100% of EER degradation from 1.244 to 2.846.…”
Section: Related Work Problem Definitionmentioning
confidence: 99%
“…In [24], Jenisch and Uhl applied block permutation and remapping to protecting the iris template. Specifically, in the permutation operation, blocks of the feature texture are rearranged, controlled by a permutation key, and in the remapping operation, some blocks are mapped on top of the other blocks to make the reconstruction of the iris image more difficult.…”
Section: Related Workmentioning
confidence: 99%
“…The existing issue: In the abovementioned iris-based authentication schemes, the non-invertible transformations rely on user-specific keys (or parameters), which can also be referred to as key-dependent transformations. However, in some schemes, e.g., [21,24], when the key, which is used to guide the transformation, is known by an adversary, the transformation can be reversed easily. In random projection based schemes, e.g., [23], if multiple transformed feature vectors and keys are lost, the adversary can restore the original feature vector from the attacks via record multiplicity (ARM) [27,28].…”
Section: Related Workmentioning
confidence: 99%
“…The random and repeated remapping process prevents the reconstruction of the original iris image. Although the non-invertibility criterion was fulfilled through the block remapping process, Jenisch et al [46] demonstrated that 60% of the original iris image could be reconstructed from the stolen template.…”
Section: Cancelable Biometricsmentioning
confidence: 99%