%Aigaion2 BibTeX export from Idiap Publications
%Tuesday 03 December 2024 06:13:39 PM

@INPROCEEDINGS{OtroshiShahreza_IJCB_2022,
         author = {Otroshi Shahreza, Hatef and Rathgeb, Christian and Osorio-Roig, Dail{\'{e}} and Krivokuca, Vedrana and Marcel, S{\'{e}}bastien and Busch, Christoph},
       projects = {TRESPASS-ETN},
          title = {Hybrid Protection of Biometric Templates by Combining Homomorphic Encryption and Cancelable Biometrics},
      booktitle = {Proceedings of the 2022 International Joint Conference on Biometrics (IJCB)},
           year = {2022},
      publisher = {IEEE},
       location = {Abu Dhabi, United Arab Emirates (UAE)},
            url = {https://ieeexplore.ieee.org/abstract/document/10007960},
            doi = {10.1109/IJCB54206.2022.10007960},
       abstract = {Homomorphic Encryption (HE) has become a well-known tool for privacy-preserving recognition in biometric systems. Despite some important advantages of HE (such as preservation of recognition accuracy), there are two main drawbacks in the application of HE to biometric recognition systems: first, the security of the system solely depends on the secrecy of the private (decryption) key; second, the computational costs of the operations on the ciphertexts are expensive. To address these challenges, in this paper we propose a hybrid scheme for the protection of biometric templates, which combines cancelable biometrics (CB) methods and HE. Applying CB prior to HE enhances both the security and privacy of the overall system, since the protected templates remain irreversible even if the secret keys are leaked (commonly referred to as the full disclosure scenario). In addition, we can reduce the dimensionality of templates using CB before applying HE, which speeds up the computation over the ciphertexts. We use BioHashing, Multi-Layer Perceptron (MLP) hashing, and Index-of-Maximum (IoM) hashing as different CB methods, and for each of these schemes, we propose a method for computing scores between hybrid-protected templates in the encrypted domain. We evaluate our proposed hybrid scheme using different state-of-the-art face recognition models (ArcFace, ElasticFace, and FaceNet) on the MOBIO and LFW datasets. The source code of our experiments is publicly available, so our work can be fully reproduced.},
            pdf = {https://publications.idiap.ch/attachments/papers/2022/OtroshiShahreza_IJCB_2022.pdf}
}