A Statistical Analysis of IrisCode and Its Security Implications

IrisCode has been used to gather iris data for 430 million people. Because of the huge impact of IrisCode, it is vital that it is completely understood. This paper first studies the relationship between bit probabilities and a mean of iris images (The mean of iris images is defined as the average of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on pattern analysis and machine intelligence 2015-03, Vol.37 (3), p.513-528
1. Verfasser: Kong, Adams Wai Kin
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 528
container_issue 3
container_start_page 513
container_title IEEE transactions on pattern analysis and machine intelligence
container_volume 37
creator Kong, Adams Wai Kin
description IrisCode has been used to gather iris data for 430 million people. Because of the huge impact of IrisCode, it is vital that it is completely understood. This paper first studies the relationship between bit probabilities and a mean of iris images (The mean of iris images is defined as the average of independent iris images.) and then uses the Chi-square statistic, the correlation coefficient and a resampling algorithm to detect statistical dependence between bits. The results show that the statistical dependence forms a graph with a sparse and structural adjacency matrix. A comparison of this graph with a graph whose edges are defined by the inner product of the Gabor filters that produce IrisCodes shows that partial statistical dependence is induced by the filters and propagates through the graph. Using this statistical information, the security risk associated with two patented template protection schemes that have been deployed in commercial systems for producing application-specific IrisCodes is analyzed. To retain high identification speed, they use the same key to lock all IrisCodes in a database. The belief has been that if the key is not compromised, the IrisCodes are secure. This study shows that even without the key, application-specific IrisCodes can be unlocked and that the key can be obtained through the statistical dependence detected.
doi_str_mv 10.1109/TPAMI.2014.2343959
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_pubmed_primary_26353258</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6867381</ieee_id><sourcerecordid>1711535246</sourcerecordid><originalsourceid>FETCH-LOGICAL-c323t-6c47e0972e789921162cbfc5cd7ba2ccf2b36c3e201d50a43502d11c2b040fab3</originalsourceid><addsrcrecordid>eNo9kMtOwzAQRS0EoqXwAyAhL9mk2J44iXdEFY9IRSC1rC3HcSSjPErsLPL3uLR0NYs592rmIHRLyZJSIh63n_l7sWSExksGMQguztCcChARcBDnaE5owqIsY9kMXTn3TQLJCVyiGUsCwXg2R0853njlrfNWqwbnnWomZx3ua1wM1q36ymDVVbjwDm-MHgfrJ1y0uybg3vadu0YXtWqcuTnOBfp6ed6u3qL1x2uxyteRBgY-SnScGiJSZtJMCEbDZbqsNddVWiqmdc1KSDSY8E3FiYqBE1ZRqllJYlKrEhbo4dC7G_qf0TgvW-u0aRrVmX50kqaUcuAsTgLKDqgeeucGU8vdYFs1TJISuTcn_8zJvTl5NBdC98f-sWxNdYr8qwrA3QGwxpjTOsmSFDIKv5bvcU8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1711535246</pqid></control><display><type>article</type><title>A Statistical Analysis of IrisCode and Its Security Implications</title><source>IEEE Electronic Library (IEL)</source><creator>Kong, Adams Wai Kin</creator><creatorcontrib>Kong, Adams Wai Kin</creatorcontrib><description>IrisCode has been used to gather iris data for 430 million people. Because of the huge impact of IrisCode, it is vital that it is completely understood. This paper first studies the relationship between bit probabilities and a mean of iris images (The mean of iris images is defined as the average of independent iris images.) and then uses the Chi-square statistic, the correlation coefficient and a resampling algorithm to detect statistical dependence between bits. The results show that the statistical dependence forms a graph with a sparse and structural adjacency matrix. A comparison of this graph with a graph whose edges are defined by the inner product of the Gabor filters that produce IrisCodes shows that partial statistical dependence is induced by the filters and propagates through the graph. Using this statistical information, the security risk associated with two patented template protection schemes that have been deployed in commercial systems for producing application-specific IrisCodes is analyzed. To retain high identification speed, they use the same key to lock all IrisCodes in a database. The belief has been that if the key is not compromised, the IrisCodes are secure. This study shows that even without the key, application-specific IrisCodes can be unlocked and that the key can be obtained through the statistical dependence detected.</description><identifier>ISSN: 0162-8828</identifier><identifier>EISSN: 1939-3539</identifier><identifier>EISSN: 2160-9292</identifier><identifier>DOI: 10.1109/TPAMI.2014.2343959</identifier><identifier>PMID: 26353258</identifier><identifier>CODEN: ITPIDJ</identifier><language>eng</language><publisher>United States: IEEE</publisher><subject>Algorithms ; Biometric Identification - methods ; Computer Security ; Databases, Factual ; Gabor filters ; Humans ; Image Processing, Computer-Assisted - methods ; Iris ; Iris - anatomy &amp; histology ; Iris recognition ; Models, Statistical ; Probability ; Security ; Vectors</subject><ispartof>IEEE transactions on pattern analysis and machine intelligence, 2015-03, Vol.37 (3), p.513-528</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c323t-6c47e0972e789921162cbfc5cd7ba2ccf2b36c3e201d50a43502d11c2b040fab3</citedby><cites>FETCH-LOGICAL-c323t-6c47e0972e789921162cbfc5cd7ba2ccf2b36c3e201d50a43502d11c2b040fab3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6867381$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6867381$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/26353258$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Kong, Adams Wai Kin</creatorcontrib><title>A Statistical Analysis of IrisCode and Its Security Implications</title><title>IEEE transactions on pattern analysis and machine intelligence</title><addtitle>TPAMI</addtitle><addtitle>IEEE Trans Pattern Anal Mach Intell</addtitle><description>IrisCode has been used to gather iris data for 430 million people. Because of the huge impact of IrisCode, it is vital that it is completely understood. This paper first studies the relationship between bit probabilities and a mean of iris images (The mean of iris images is defined as the average of independent iris images.) and then uses the Chi-square statistic, the correlation coefficient and a resampling algorithm to detect statistical dependence between bits. The results show that the statistical dependence forms a graph with a sparse and structural adjacency matrix. A comparison of this graph with a graph whose edges are defined by the inner product of the Gabor filters that produce IrisCodes shows that partial statistical dependence is induced by the filters and propagates through the graph. Using this statistical information, the security risk associated with two patented template protection schemes that have been deployed in commercial systems for producing application-specific IrisCodes is analyzed. To retain high identification speed, they use the same key to lock all IrisCodes in a database. The belief has been that if the key is not compromised, the IrisCodes are secure. This study shows that even without the key, application-specific IrisCodes can be unlocked and that the key can be obtained through the statistical dependence detected.</description><subject>Algorithms</subject><subject>Biometric Identification - methods</subject><subject>Computer Security</subject><subject>Databases, Factual</subject><subject>Gabor filters</subject><subject>Humans</subject><subject>Image Processing, Computer-Assisted - methods</subject><subject>Iris</subject><subject>Iris - anatomy &amp; histology</subject><subject>Iris recognition</subject><subject>Models, Statistical</subject><subject>Probability</subject><subject>Security</subject><subject>Vectors</subject><issn>0162-8828</issn><issn>1939-3539</issn><issn>2160-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>EIF</sourceid><recordid>eNo9kMtOwzAQRS0EoqXwAyAhL9mk2J44iXdEFY9IRSC1rC3HcSSjPErsLPL3uLR0NYs592rmIHRLyZJSIh63n_l7sWSExksGMQguztCcChARcBDnaE5owqIsY9kMXTn3TQLJCVyiGUsCwXg2R0853njlrfNWqwbnnWomZx3ua1wM1q36ymDVVbjwDm-MHgfrJ1y0uybg3vadu0YXtWqcuTnOBfp6ed6u3qL1x2uxyteRBgY-SnScGiJSZtJMCEbDZbqsNddVWiqmdc1KSDSY8E3FiYqBE1ZRqllJYlKrEhbo4dC7G_qf0TgvW-u0aRrVmX50kqaUcuAsTgLKDqgeeucGU8vdYFs1TJISuTcn_8zJvTl5NBdC98f-sWxNdYr8qwrA3QGwxpjTOsmSFDIKv5bvcU8</recordid><startdate>20150301</startdate><enddate>20150301</enddate><creator>Kong, Adams Wai Kin</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7X8</scope></search><sort><creationdate>20150301</creationdate><title>A Statistical Analysis of IrisCode and Its Security Implications</title><author>Kong, Adams Wai Kin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c323t-6c47e0972e789921162cbfc5cd7ba2ccf2b36c3e201d50a43502d11c2b040fab3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Algorithms</topic><topic>Biometric Identification - methods</topic><topic>Computer Security</topic><topic>Databases, Factual</topic><topic>Gabor filters</topic><topic>Humans</topic><topic>Image Processing, Computer-Assisted - methods</topic><topic>Iris</topic><topic>Iris - anatomy &amp; histology</topic><topic>Iris recognition</topic><topic>Models, Statistical</topic><topic>Probability</topic><topic>Security</topic><topic>Vectors</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kong, Adams Wai Kin</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>MEDLINE - Academic</collection><jtitle>IEEE transactions on pattern analysis and machine intelligence</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kong, Adams Wai Kin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Statistical Analysis of IrisCode and Its Security Implications</atitle><jtitle>IEEE transactions on pattern analysis and machine intelligence</jtitle><stitle>TPAMI</stitle><addtitle>IEEE Trans Pattern Anal Mach Intell</addtitle><date>2015-03-01</date><risdate>2015</risdate><volume>37</volume><issue>3</issue><spage>513</spage><epage>528</epage><pages>513-528</pages><issn>0162-8828</issn><eissn>1939-3539</eissn><eissn>2160-9292</eissn><coden>ITPIDJ</coden><abstract>IrisCode has been used to gather iris data for 430 million people. Because of the huge impact of IrisCode, it is vital that it is completely understood. This paper first studies the relationship between bit probabilities and a mean of iris images (The mean of iris images is defined as the average of independent iris images.) and then uses the Chi-square statistic, the correlation coefficient and a resampling algorithm to detect statistical dependence between bits. The results show that the statistical dependence forms a graph with a sparse and structural adjacency matrix. A comparison of this graph with a graph whose edges are defined by the inner product of the Gabor filters that produce IrisCodes shows that partial statistical dependence is induced by the filters and propagates through the graph. Using this statistical information, the security risk associated with two patented template protection schemes that have been deployed in commercial systems for producing application-specific IrisCodes is analyzed. To retain high identification speed, they use the same key to lock all IrisCodes in a database. The belief has been that if the key is not compromised, the IrisCodes are secure. This study shows that even without the key, application-specific IrisCodes can be unlocked and that the key can be obtained through the statistical dependence detected.</abstract><cop>United States</cop><pub>IEEE</pub><pmid>26353258</pmid><doi>10.1109/TPAMI.2014.2343959</doi><tpages>16</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0162-8828
ispartof IEEE transactions on pattern analysis and machine intelligence, 2015-03, Vol.37 (3), p.513-528
issn 0162-8828
1939-3539
2160-9292
language eng
recordid cdi_pubmed_primary_26353258
source IEEE Electronic Library (IEL)
subjects Algorithms
Biometric Identification - methods
Computer Security
Databases, Factual
Gabor filters
Humans
Image Processing, Computer-Assisted - methods
Iris
Iris - anatomy & histology
Iris recognition
Models, Statistical
Probability
Security
Vectors
title A Statistical Analysis of IrisCode and Its Security Implications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T17%3A59%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Statistical%20Analysis%20of%20IrisCode%20and%20Its%20Security%20Implications&rft.jtitle=IEEE%20transactions%20on%20pattern%20analysis%20and%20machine%20intelligence&rft.au=Kong,%20Adams%20Wai%20Kin&rft.date=2015-03-01&rft.volume=37&rft.issue=3&rft.spage=513&rft.epage=528&rft.pages=513-528&rft.issn=0162-8828&rft.eissn=1939-3539&rft.coden=ITPIDJ&rft_id=info:doi/10.1109/TPAMI.2014.2343959&rft_dat=%3Cproquest_RIE%3E1711535246%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1711535246&rft_id=info:pmid/26353258&rft_ieee_id=6867381&rfr_iscdi=true