A Statistical Analysis of IrisCode and Its Security Implications
IrisCode has been used to gather iris data for 430 million people. Because of the huge impact of IrisCode, it is vital that it is completely understood. This paper first studies the relationship between bit probabilities and a mean of iris images (The mean of iris images is defined as the average of...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on pattern analysis and machine intelligence 2015-03, Vol.37 (3), p.513-528 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 528 |
---|---|
container_issue | 3 |
container_start_page | 513 |
container_title | IEEE transactions on pattern analysis and machine intelligence |
container_volume | 37 |
creator | Kong, Adams Wai Kin |
description | IrisCode has been used to gather iris data for 430 million people. Because of the huge impact of IrisCode, it is vital that it is completely understood. This paper first studies the relationship between bit probabilities and a mean of iris images (The mean of iris images is defined as the average of independent iris images.) and then uses the Chi-square statistic, the correlation coefficient and a resampling algorithm to detect statistical dependence between bits. The results show that the statistical dependence forms a graph with a sparse and structural adjacency matrix. A comparison of this graph with a graph whose edges are defined by the inner product of the Gabor filters that produce IrisCodes shows that partial statistical dependence is induced by the filters and propagates through the graph. Using this statistical information, the security risk associated with two patented template protection schemes that have been deployed in commercial systems for producing application-specific IrisCodes is analyzed. To retain high identification speed, they use the same key to lock all IrisCodes in a database. The belief has been that if the key is not compromised, the IrisCodes are secure. This study shows that even without the key, application-specific IrisCodes can be unlocked and that the key can be obtained through the statistical dependence detected. |
doi_str_mv | 10.1109/TPAMI.2014.2343959 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_pubmed_primary_26353258</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6867381</ieee_id><sourcerecordid>1711535246</sourcerecordid><originalsourceid>FETCH-LOGICAL-c323t-6c47e0972e789921162cbfc5cd7ba2ccf2b36c3e201d50a43502d11c2b040fab3</originalsourceid><addsrcrecordid>eNo9kMtOwzAQRS0EoqXwAyAhL9mk2J44iXdEFY9IRSC1rC3HcSSjPErsLPL3uLR0NYs592rmIHRLyZJSIh63n_l7sWSExksGMQguztCcChARcBDnaE5owqIsY9kMXTn3TQLJCVyiGUsCwXg2R0853njlrfNWqwbnnWomZx3ua1wM1q36ymDVVbjwDm-MHgfrJ1y0uybg3vadu0YXtWqcuTnOBfp6ed6u3qL1x2uxyteRBgY-SnScGiJSZtJMCEbDZbqsNddVWiqmdc1KSDSY8E3FiYqBE1ZRqllJYlKrEhbo4dC7G_qf0TgvW-u0aRrVmX50kqaUcuAsTgLKDqgeeucGU8vdYFs1TJISuTcn_8zJvTl5NBdC98f-sWxNdYr8qwrA3QGwxpjTOsmSFDIKv5bvcU8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1711535246</pqid></control><display><type>article</type><title>A Statistical Analysis of IrisCode and Its Security Implications</title><source>IEEE Electronic Library (IEL)</source><creator>Kong, Adams Wai Kin</creator><creatorcontrib>Kong, Adams Wai Kin</creatorcontrib><description>IrisCode has been used to gather iris data for 430 million people. Because of the huge impact of IrisCode, it is vital that it is completely understood. This paper first studies the relationship between bit probabilities and a mean of iris images (The mean of iris images is defined as the average of independent iris images.) and then uses the Chi-square statistic, the correlation coefficient and a resampling algorithm to detect statistical dependence between bits. The results show that the statistical dependence forms a graph with a sparse and structural adjacency matrix. A comparison of this graph with a graph whose edges are defined by the inner product of the Gabor filters that produce IrisCodes shows that partial statistical dependence is induced by the filters and propagates through the graph. Using this statistical information, the security risk associated with two patented template protection schemes that have been deployed in commercial systems for producing application-specific IrisCodes is analyzed. To retain high identification speed, they use the same key to lock all IrisCodes in a database. The belief has been that if the key is not compromised, the IrisCodes are secure. This study shows that even without the key, application-specific IrisCodes can be unlocked and that the key can be obtained through the statistical dependence detected.</description><identifier>ISSN: 0162-8828</identifier><identifier>EISSN: 1939-3539</identifier><identifier>EISSN: 2160-9292</identifier><identifier>DOI: 10.1109/TPAMI.2014.2343959</identifier><identifier>PMID: 26353258</identifier><identifier>CODEN: ITPIDJ</identifier><language>eng</language><publisher>United States: IEEE</publisher><subject>Algorithms ; Biometric Identification - methods ; Computer Security ; Databases, Factual ; Gabor filters ; Humans ; Image Processing, Computer-Assisted - methods ; Iris ; Iris - anatomy & histology ; Iris recognition ; Models, Statistical ; Probability ; Security ; Vectors</subject><ispartof>IEEE transactions on pattern analysis and machine intelligence, 2015-03, Vol.37 (3), p.513-528</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c323t-6c47e0972e789921162cbfc5cd7ba2ccf2b36c3e201d50a43502d11c2b040fab3</citedby><cites>FETCH-LOGICAL-c323t-6c47e0972e789921162cbfc5cd7ba2ccf2b36c3e201d50a43502d11c2b040fab3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6867381$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6867381$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/26353258$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Kong, Adams Wai Kin</creatorcontrib><title>A Statistical Analysis of IrisCode and Its Security Implications</title><title>IEEE transactions on pattern analysis and machine intelligence</title><addtitle>TPAMI</addtitle><addtitle>IEEE Trans Pattern Anal Mach Intell</addtitle><description>IrisCode has been used to gather iris data for 430 million people. Because of the huge impact of IrisCode, it is vital that it is completely understood. This paper first studies the relationship between bit probabilities and a mean of iris images (The mean of iris images is defined as the average of independent iris images.) and then uses the Chi-square statistic, the correlation coefficient and a resampling algorithm to detect statistical dependence between bits. The results show that the statistical dependence forms a graph with a sparse and structural adjacency matrix. A comparison of this graph with a graph whose edges are defined by the inner product of the Gabor filters that produce IrisCodes shows that partial statistical dependence is induced by the filters and propagates through the graph. Using this statistical information, the security risk associated with two patented template protection schemes that have been deployed in commercial systems for producing application-specific IrisCodes is analyzed. To retain high identification speed, they use the same key to lock all IrisCodes in a database. The belief has been that if the key is not compromised, the IrisCodes are secure. This study shows that even without the key, application-specific IrisCodes can be unlocked and that the key can be obtained through the statistical dependence detected.</description><subject>Algorithms</subject><subject>Biometric Identification - methods</subject><subject>Computer Security</subject><subject>Databases, Factual</subject><subject>Gabor filters</subject><subject>Humans</subject><subject>Image Processing, Computer-Assisted - methods</subject><subject>Iris</subject><subject>Iris - anatomy & histology</subject><subject>Iris recognition</subject><subject>Models, Statistical</subject><subject>Probability</subject><subject>Security</subject><subject>Vectors</subject><issn>0162-8828</issn><issn>1939-3539</issn><issn>2160-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>EIF</sourceid><recordid>eNo9kMtOwzAQRS0EoqXwAyAhL9mk2J44iXdEFY9IRSC1rC3HcSSjPErsLPL3uLR0NYs592rmIHRLyZJSIh63n_l7sWSExksGMQguztCcChARcBDnaE5owqIsY9kMXTn3TQLJCVyiGUsCwXg2R0853njlrfNWqwbnnWomZx3ua1wM1q36ymDVVbjwDm-MHgfrJ1y0uybg3vadu0YXtWqcuTnOBfp6ed6u3qL1x2uxyteRBgY-SnScGiJSZtJMCEbDZbqsNddVWiqmdc1KSDSY8E3FiYqBE1ZRqllJYlKrEhbo4dC7G_qf0TgvW-u0aRrVmX50kqaUcuAsTgLKDqgeeucGU8vdYFs1TJISuTcn_8zJvTl5NBdC98f-sWxNdYr8qwrA3QGwxpjTOsmSFDIKv5bvcU8</recordid><startdate>20150301</startdate><enddate>20150301</enddate><creator>Kong, Adams Wai Kin</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7X8</scope></search><sort><creationdate>20150301</creationdate><title>A Statistical Analysis of IrisCode and Its Security Implications</title><author>Kong, Adams Wai Kin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c323t-6c47e0972e789921162cbfc5cd7ba2ccf2b36c3e201d50a43502d11c2b040fab3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Algorithms</topic><topic>Biometric Identification - methods</topic><topic>Computer Security</topic><topic>Databases, Factual</topic><topic>Gabor filters</topic><topic>Humans</topic><topic>Image Processing, Computer-Assisted - methods</topic><topic>Iris</topic><topic>Iris - anatomy & histology</topic><topic>Iris recognition</topic><topic>Models, Statistical</topic><topic>Probability</topic><topic>Security</topic><topic>Vectors</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kong, Adams Wai Kin</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>MEDLINE - Academic</collection><jtitle>IEEE transactions on pattern analysis and machine intelligence</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kong, Adams Wai Kin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Statistical Analysis of IrisCode and Its Security Implications</atitle><jtitle>IEEE transactions on pattern analysis and machine intelligence</jtitle><stitle>TPAMI</stitle><addtitle>IEEE Trans Pattern Anal Mach Intell</addtitle><date>2015-03-01</date><risdate>2015</risdate><volume>37</volume><issue>3</issue><spage>513</spage><epage>528</epage><pages>513-528</pages><issn>0162-8828</issn><eissn>1939-3539</eissn><eissn>2160-9292</eissn><coden>ITPIDJ</coden><abstract>IrisCode has been used to gather iris data for 430 million people. Because of the huge impact of IrisCode, it is vital that it is completely understood. This paper first studies the relationship between bit probabilities and a mean of iris images (The mean of iris images is defined as the average of independent iris images.) and then uses the Chi-square statistic, the correlation coefficient and a resampling algorithm to detect statistical dependence between bits. The results show that the statistical dependence forms a graph with a sparse and structural adjacency matrix. A comparison of this graph with a graph whose edges are defined by the inner product of the Gabor filters that produce IrisCodes shows that partial statistical dependence is induced by the filters and propagates through the graph. Using this statistical information, the security risk associated with two patented template protection schemes that have been deployed in commercial systems for producing application-specific IrisCodes is analyzed. To retain high identification speed, they use the same key to lock all IrisCodes in a database. The belief has been that if the key is not compromised, the IrisCodes are secure. This study shows that even without the key, application-specific IrisCodes can be unlocked and that the key can be obtained through the statistical dependence detected.</abstract><cop>United States</cop><pub>IEEE</pub><pmid>26353258</pmid><doi>10.1109/TPAMI.2014.2343959</doi><tpages>16</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0162-8828 |
ispartof | IEEE transactions on pattern analysis and machine intelligence, 2015-03, Vol.37 (3), p.513-528 |
issn | 0162-8828 1939-3539 2160-9292 |
language | eng |
recordid | cdi_pubmed_primary_26353258 |
source | IEEE Electronic Library (IEL) |
subjects | Algorithms Biometric Identification - methods Computer Security Databases, Factual Gabor filters Humans Image Processing, Computer-Assisted - methods Iris Iris - anatomy & histology Iris recognition Models, Statistical Probability Security Vectors |
title | A Statistical Analysis of IrisCode and Its Security Implications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T17%3A59%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Statistical%20Analysis%20of%20IrisCode%20and%20Its%20Security%20Implications&rft.jtitle=IEEE%20transactions%20on%20pattern%20analysis%20and%20machine%20intelligence&rft.au=Kong,%20Adams%20Wai%20Kin&rft.date=2015-03-01&rft.volume=37&rft.issue=3&rft.spage=513&rft.epage=528&rft.pages=513-528&rft.issn=0162-8828&rft.eissn=1939-3539&rft.coden=ITPIDJ&rft_id=info:doi/10.1109/TPAMI.2014.2343959&rft_dat=%3Cproquest_RIE%3E1711535246%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1711535246&rft_id=info:pmid/26353258&rft_ieee_id=6867381&rfr_iscdi=true |