Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
129 tokens/sec
GPT-4o
28 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication (2312.11575v2)

Published 18 Dec 2023 in cs.CR

Abstract: Fingerprint authentication is a popular security mechanism for smartphones and laptops. However, its adoption in web and cloud environments has been limited due to privacy concerns over storing and processing biometric data on servers. This paper introduces Blind-Touch, a novel machine learning-based fingerprint authentication system leveraging homomorphic encryption to address these privacy concerns. Homomorphic encryption allows computations on encrypted data without decrypting. Thus, Blind-Touch can keep fingerprint data encrypted on the server while performing machine learning operations. Blind-Touch combines three strategies to efficiently utilize homomorphic encryption in machine learning: (1) It optimizes the feature vector for a distributed architecture, processing the first fully connected layer (FC-16) in plaintext on the client side and the subsequent layer (FC-1) post-encryption on the server, thereby minimizing encrypted computations; (2) It employs a homomorphic encryption compatible data compression technique capable of handling 8,192 authentication results concurrently; and (3) It utilizes a clustered server architecture to simultaneously process authentication results, thereby enhancing scalability with increasing user numbers. Blind-Touch achieves high accuracy on two benchmark fingerprint datasets, with a 93.6% F1- score for the PolyU dataset and a 98.2% F1-score for the SOKOTO dataset. Moreover, Blind-Touch can match a fingerprint among 5,000 in about 0.65 seconds. With its privacy focused design, high accuracy, and efficiency, Blind-Touch is a promising alternative to conventional fingerprint authentication for web and cloud applications.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (33)
  1. A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys (CSUR), 51(4): 1–35.
  2. Brakerski, Z. 2012. Fully homomorphic encryption without modulus switching from classical GapSVP. In Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 868–886. Springer.
  3. (Leveled) fully homomorphic encryption without bootstrapping. ACM Transactions on Computation Theory (TOCT), 1–36.
  4. SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost. In 31st USENIX Security Symposium (USENIX Security 22), 1361–1378.
  5. Bootstrapping for approximate homomorphic encryption. In Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29-May 3, 2018 Proceedings, Part I 37, 360–384.
  6. Remark on the security of ckks scheme in practice. Cryptology ePrint Archive.
  7. Homomorphic encryption for arithmetic of approximate numbers. In Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I 23, 409–437.
  8. On the security and usability implications of providing multiple authentication choices on smartphones: the more, the better? ACM Transactions on Privacy and Security (TOPS), 1–32.
  9. Can a CNN automatically learn the significance of minutiae points for fingerprint matching? In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 351–359.
  10. BFV, CKKS, TFHE: Which One is the Best for a Secure Neural Network Evaluation in the Cloud? In Applied Cryptography and Network Security Workshops: ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21–24, 2021, Proceedings, 279–300.
  11. I feel like I’m taking selfies all day! Towards understanding biometric authentication on smartphones. In Proceedings of the 33rd annual ACM conference on human factors in computing systems, 1411–1414.
  12. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. 201–210.
  13. Learning a fixed-length fingerprint representation. IEEE transactions on pattern analysis and machine intelligence, 43(6): 1981–1997.
  14. Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive.
  15. Detecting locally, patching globally: An end-to-end framework for high speed and accurate detection of fingerprint minutiae. IEEE Transactions on Information Forensics and Security, 18: 1720–1733.
  16. REDsec: Running Encrypted Discretized Neural Networks in Seconds. Cryptology ePrint Archive.
  17. Gentry, C. 2009. Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing, 169–178.
  18. Gootman, S. 2016. OPM hack: The most dangerous threat to the federal government today. Journal of Applied Security Research, 517–525.
  19. Efficient privacy-preserving fingerprint-based authentication system using fully homomorphic encryption. Security and Communication Networks, 1–11.
  20. Ko, K. 2007. User’s guide to nist biometric image software (nbis).
  21. Siamese neural networks for one-shot image recognition. In ICML deep learning workshop.
  22. Matching contactless and contact-based conventional fingerprint images for biometrics identification. IEEE Transactions on Image Processing, 27(4): 2008–2021.
  23. Seeing Red: PPG Biometrics Using Smartphone Cameras. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops.
  24. On ideal lattices and learning with errors over rings. Journal of the ACM (JACM), 1–35.
  25. A study of authentication in daily life. In Twelfth symposium on usable privacy and security (SOUPS 2016), 189–206.
  26. Robust minutiae extractor: Integrating deep networks and fingerprint domain knowledge. In 2018 International Conference on Biometrics (ICB), 9–16. IEEE.
  27. Rahulamathavan, Y. 2022. Privacy-preserving similarity calculation of speaker features using fully homomorphic encryption. arXiv preprint arXiv:2202.07994.
  28. A survey on biometric authentication: Toward secure and privacy-preserving identification. IEEE access, 7: 5994–6009.
  29. Sokoto coventry fingerprint dataset. arXiv preprint arXiv:1807.10609.
  30. Occlusion robust face recognition based on mask learning with pairwise differential siamese network. In Proceedings of the IEEE/CVF International Conference on Computer Vision, 773–782.
  31. Face recognition based on convolution siamese networks. In 2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 1–5.
  32. Secure fingerprint authentication with homomorphic encryption. In 2020 Digital Image Computing: Techniques and Applications (DICTA), 1–6.
  33. A multi-task fully deep convolutional neural network for contactless fingerprint minutiae extraction. Pattern Recognition, 120: 108189.
Citations (7)

Summary

We haven't generated a summary for this paper yet.