{"title":"Cancelable iris template based on slicing","authors":"Qianrong Zheng , Jianwen Xiang , Changtian Song , Rivalino Matias , Rui Hao , Songsong Liao , Xuemin Zhang , Meng Zhao , Dongdong Zhao","doi":"10.1016/j.cose.2025.104381","DOIUrl":null,"url":null,"abstract":"<div><div>With the widespread adoption of iris authentication technology and its use in different applications, the potential risks associated with iris template leakage have become a major concern. Hence, a secure template protection scheme becomes an important requirement for biometric systems. However, most of the current template protection schemes based on cancelable templates fail to meet the balance between security and performance. To address this challenge, we propose a method called cancelable iris template based on slicing (Iris-Slice). The scheme generates segments by segmenting the original iris data to a specific length, and subsequently compares these segments with their opposite sequences and retains the smaller segments. Next, the retained segments are randomly expanded, where the expanded sequences are half the inverse of the original iris data. Ultimately, the expanded sequences are saved in a collection for iris data protection. Experimental results on well-known iris datasets (CASIA-IrisV3-Interval, CASIA-IrisV4-Lamp, MMU-V1, IITD) show that the accuracy of the Iris-Slice method decreases only slightly by 0.63%. We also analyze the irreversibility, revocability, and unlinkability of our proposed scheme, both theoretically and experimentally. The results show that our scheme satisfies all these requirements with high performance.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"152 ","pages":"Article 104381"},"PeriodicalIF":4.8000,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825000707","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
With the widespread adoption of iris authentication technology and its use in different applications, the potential risks associated with iris template leakage have become a major concern. Hence, a secure template protection scheme becomes an important requirement for biometric systems. However, most of the current template protection schemes based on cancelable templates fail to meet the balance between security and performance. To address this challenge, we propose a method called cancelable iris template based on slicing (Iris-Slice). The scheme generates segments by segmenting the original iris data to a specific length, and subsequently compares these segments with their opposite sequences and retains the smaller segments. Next, the retained segments are randomly expanded, where the expanded sequences are half the inverse of the original iris data. Ultimately, the expanded sequences are saved in a collection for iris data protection. Experimental results on well-known iris datasets (CASIA-IrisV3-Interval, CASIA-IrisV4-Lamp, MMU-V1, IITD) show that the accuracy of the Iris-Slice method decreases only slightly by 0.63%. We also analyze the irreversibility, revocability, and unlinkability of our proposed scheme, both theoretically and experimentally. The results show that our scheme satisfies all these requirements with high performance.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.