HEFT: Homomorphically Encrypted Fusion of Biometric Templates
- URL: http://arxiv.org/abs/2208.07241v1
- Date: Mon, 15 Aug 2022 14:55:08 GMT
- Title: HEFT: Homomorphically Encrypted Fusion of Biometric Templates
- Authors: Luke Sperling, Nalini Ratha, Arun Ross, Vishnu Naresh Boddeti
- Abstract summary: We propose a non-interactive solution for secure fusion and matching of biometric templates using fully homomorphic encryption (FHE)
Our method, dubbed HEFT, is custom-designed to overcome the unique constraint imposed FHE, namely the lack of computation support for non-arithmetic operations.
Experimental evaluation for template fusion shows that HEFT (i) improves biometric verification performance by 11.07% and 9.58% AUROC compared to the respective unibiometric representations.
- Score: 20.10175446213924
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: This paper proposes a non-interactive end-to-end solution for secure fusion
and matching of biometric templates using fully homomorphic encryption (FHE).
Given a pair of encrypted feature vectors, we perform the following ciphertext
operations, i) feature concatenation, ii) fusion and dimensionality reduction
through a learned linear projection, iii) scale normalization to unit
$\ell_2$-norm, and iv) match score computation. Our method, dubbed HEFT
(Homomorphically Encrypted Fusion of biometric Templates), is custom-designed
to overcome the unique constraint imposed by FHE, namely the lack of support
for non-arithmetic operations. From an inference perspective, we systematically
explore different data packing schemes for computationally efficient linear
projection and introduce a polynomial approximation for scale normalization.
From a training perspective, we introduce an FHE-aware algorithm for learning
the linear projection matrix to mitigate errors induced by approximate
normalization. Experimental evaluation for template fusion and matching of face
and voice biometrics shows that HEFT (i) improves biometric verification
performance by 11.07% and 9.58% AUROC compared to the respective unibiometric
representations while compressing the feature vectors by a factor of 16 (512D
to 32D), and (ii) fuses a pair of encrypted feature vectors and computes its
match score against a gallery of size 1024 in 884 ms. Code and data are
available at https://github.com/human-analysis/encrypted-biometric-fusion
Related papers
- Encrypted Vector Similarity Computations Using Partially Homomorphic Encryption: Applications and Performance Analysis [0.0]
We show encrypted cosine similarity can be computed using partially homomorphic encryption (PHE)
PHE is less computationally intensive, faster, and produces smaller ciphertexts/keys.
Results show PHE is well-suited for memory-constrained environments and real-world privacy-preserving encrypted similarity search.
arXiv Detail & Related papers (2025-03-07T09:52:16Z) - Blind-Match: Efficient Homomorphic Encryption-Based 1:N Matching for Privacy-Preserving Biometric Identification [31.48009609210313]
Blind-Match is a novel biometric identification system that leverages homomorphic encryption (HE) for efficient and privacy-preserving 1:N matching.
Blind-Match achieves superior performance compared to state-of-the-art methods across various biometric datasets.
arXiv Detail & Related papers (2024-08-12T14:13:08Z) - A secure and private ensemble matcher using multi-vault obfuscated templates [1.3518297878940662]
Generative AI has revolutionized modern machine learning by providing unprecedented realism, diversity, and efficiency in data generation.
Biometric template security and secure matching are among the most sought-after features of modern biometric systems.
This paper proposes a novel obfuscation method using Generative AI to enhance biometric template security.
arXiv Detail & Related papers (2024-04-08T05:18:39Z) - Computational-Statistical Gaps in Gaussian Single-Index Models [77.1473134227844]
Single-Index Models are high-dimensional regression problems with planted structure.
We show that computationally efficient algorithms, both within the Statistical Query (SQ) and the Low-Degree Polynomial (LDP) framework, necessarily require $Omega(dkstar/2)$ samples.
arXiv Detail & Related papers (2024-03-08T18:50:19Z) - Large-scale gradient-based training of Mixtures of Factor Analyzers [67.21722742907981]
This article contributes both a theoretical analysis as well as a new method for efficient high-dimensional training by gradient descent.
We prove that MFA training and inference/sampling can be performed based on precision matrices, which does not require matrix inversions after training is completed.
Besides the theoretical analysis and matrices, we apply MFA to typical image datasets such as SVHN and MNIST, and demonstrate the ability to perform sample generation and outlier detection.
arXiv Detail & Related papers (2023-08-26T06:12:33Z) - Perfectly Secure Steganography Using Minimum Entropy Coupling [60.154855689780796]
We show that a steganography procedure is perfectly secure under Cachin 1998's information-theoretic model of steganography.
We also show that, among perfectly secure procedures, a procedure maximizes information throughput if and only if it is induced by a minimum entropy coupling.
arXiv Detail & Related papers (2022-10-24T17:40:07Z) - Sparse high-dimensional linear regression with a partitioned empirical
Bayes ECM algorithm [62.997667081978825]
We propose a computationally efficient and powerful Bayesian approach for sparse high-dimensional linear regression.
Minimal prior assumptions on the parameters are used through the use of plug-in empirical Bayes estimates.
The proposed approach is implemented in the R package probe.
arXiv Detail & Related papers (2022-09-16T19:15:50Z) - DenseHybrid: Hybrid Anomaly Detection for Dense Open-set Recognition [1.278093617645299]
Anomaly detection can be conceived either through generative modelling of regular training data or by discriminating with respect to negative training data.
This paper presents a novel hybrid anomaly score which allows dense open-set recognition on large natural images.
Experiments evaluate our contributions on standard dense anomaly detection benchmarks as well as in terms of open-mIoU - a novel metric for dense open-set performance.
arXiv Detail & Related papers (2022-07-06T11:48:50Z) - Softmax-free Linear Transformers [90.83157268265654]
Vision transformers (ViTs) have pushed the state-of-the-art for visual perception tasks.
Existing methods are either theoretically flawed or empirically ineffective for visual recognition.
We propose a family of Softmax-Free Transformers (SOFT)
arXiv Detail & Related papers (2022-07-05T03:08:27Z) - High-Dimensional Sparse Bayesian Learning without Covariance Matrices [66.60078365202867]
We introduce a new inference scheme that avoids explicit construction of the covariance matrix.
Our approach couples a little-known diagonal estimation result from numerical linear algebra with the conjugate gradient algorithm.
On several simulations, our method scales better than existing approaches in computation time and memory.
arXiv Detail & Related papers (2022-02-25T16:35:26Z) - Binary Matrix Factorisation and Completion via Integer Programming [3.4376560669160394]
We present a compact and two exponential size integer programs (IPs) for the rank-k binary matrix factorisation problem (k-BMF)
We show that the compact IP has a weak LP relaxation, while the exponential size LPs have a stronger equivalent LP relaxation.
arXiv Detail & Related papers (2021-06-25T05:17:51Z) - Random Hash Code Generation for Cancelable Fingerprint Templates using
Vector Permutation and Shift-order Process [3.172761915061083]
We propose a non-invertible distance preserving scheme based on vector permutation and shift-order process.
A shift-order process is then applied to the generated features in order to achieve non-invertibility and combat similarity-based attacks.
The generated hash codes are resilient to different security and privacy attacks whilst fulfilling the major revocability and unlinkability requirements.
arXiv Detail & Related papers (2021-05-21T09:37:54Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.