Skip to main content

Utility-Preserving Biometric Information Anonymization

  • Conference paper
  • First Online:
Computer Security – ESORICS 2022 (ESORICS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13555))

Included in the following conference series:

  • 1639 Accesses

Abstract

The use of biometrics such as fingerprints, voices, and images are becoming increasingly more ubiquitous through people’s daily lives, in applications ranging from authentication, identification, to much more sophisticated analytics, thanks to the recent rapid advances in both the sensing hardware technologies and machine learning techniques. While providing improved user experiences and better business insights, the use of biometrics has raised serious privacy concerns, due to their intrinsic sensitive nature and the accompanying high risk of leaking personally identifiable and private information.

In this paper, we propose a novel utility-preserving biometric anonymization framework, which provides a method to anonymize a biometric dataset without introducing artificial or external noise, with a process that retains features relevant for downstream machine learning-based analyses to extract interesting attributes that are valuable to relevant services, businesses, and research organizations. We carried out a thorough experimental evaluation using publicly available visual and vocal datasets. Results show that our proposed framework can achieve a high level of anonymization, while at the same time retain underlying data utility such that subsequent analyses on the anonymized biometric data could still be carried out to yield satisfactory accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rui, Z., Yan, Z.: A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE Access 7, 5994–6009 (2018)

    Article  Google Scholar 

  2. Ortiz, N., Hernández, R.D., Jimenez, R., Mauledeoux, M., Avilés, O.: Survey of biometric pattern recognition via machine learning techniques. Contemp. Eng. Sci. 11(34), 1677–1694 (2018)

    Article  Google Scholar 

  3. Barni, M., Donida Labati, R., Genovese, A., Piuri, V., Scotti, F.: Iris deidentification with high visual realism for privacy protection on websites and social networks. IEEE Access 9, 131995–132010 (2021). 2169-3536

    Google Scholar 

  4. Datta, P., Bhardwaj, S., Panda, S.N., Tanwar, S., Badotra, S.: Survey of security and privacy issues on biometric system. In: Gupta, B.B., Perez, G.M., Agrawal, D.P., Gupta, D. (eds.) Handbook of Computer Networks and Cyber Security, pp. 763–776. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-22277-2_30

    Chapter  Google Scholar 

  5. Labati, R.D., Piuri, V., Scotti, F.: Biometric privacy protection: guidelines and technologies. In: Obaidat, M.S., Sevillano, J.L., Filipe, J. (eds.) ICETE 2011. CCIS, vol. 314, pp. 3–19. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35755-8_1

    Chapter  Google Scholar 

  6. Garfinkel, S.: De-identification of Personal Information: US Department of Commerce, National Institute of Standards and Technology (2015)

    Google Scholar 

  7. Goodfellow, I.J., et al.: Challenges in representation learning: a report on three machine learning contests. In: NIPS (2013)

    Google Scholar 

  8. Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: ICCV (2015)

    Google Scholar 

  9. Becker, S., Ackermann, M., Lapuschkin, S., Müller, K.-R., Samek, W.: Interpreting and explaining deep neural networks for classification of audio signals. CoRR, vol. abs/1807.03418 (2018)

    Google Scholar 

  10. Apple, “Vision framework: Apply computer vision algorithms to perform a variety of tasks on input images and video” (2021). https://developer.apple.com/documentation/vision

  11. Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. In: IEEE TKDE (2005)

    Google Scholar 

  12. Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2015

    Google Scholar 

  13. Hsu, W.-N., Bolte, B., Tsai, Y.-H.H., Lakhotia, K., Salakhutdinov, R., Mohamed, A.: HuBERT: self-supervised speech representation learning by masked prediction of hidden units. IEEE/ACM Trans. Audio Speech Lang. Process. 29, 3451–3460 (2021)

    Article  Google Scholar 

  14. Breiman, L.: Random forests. Mach. Learn. 45, 5–32 (2001)

    Article  Google Scholar 

  15. Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011)

    MathSciNet  MATH  Google Scholar 

  16. Roffo, G., Melzi, S., Cristani, M.: Infinite feature selection. In: IEEE International Conference on Computer Vision (ICCV) 2015, pp. 4202–4210 (2015)

    Google Scholar 

  17. Gu, Q., Li, Z., Han, J.: Generalized fisher score for feature selection. In: Proceedings of the Twenty-Seventh Conference on Uncertainty in Artificial Intelligence, ser. UAI 2011, Arlington, Virginia, USA, pp. 266–273. AUAI Press (2011)

    Google Scholar 

  18. De Capitani, S., di Vimercati, S., Foresti, G.L., Samarati, P.: Data privacy: definitions and techniques. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 20(6), 793–817 (2012)

    Article  Google Scholar 

  19. Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: k-Anonymity. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Springer, Cham (2007)

    Google Scholar 

  20. Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng. (TKDE) 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  21. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: \(\ell \)-diversity: privacy beyond \(k\)-anonymity. In: ACM TKDD (2007)

    Google Scholar 

  22. Bayardo, R.J., Agrawal, R.: Data privacy through optimal \(k\)-anonymization. In: ICDE (2005)

    Google Scholar 

  23. Ribaric, S., Ariyaeeinia, A., Pavesic, N.: De-identification for privacy protection in multimedia content. Image Commun. 47, 131–151 (2016)

    Google Scholar 

  24. Gross, R., Airoldi, E., Malin, B., Sweeney, L.: Integrating utility into face de-identification. In: PET (2005)

    Google Scholar 

  25. Gross, R., Sweeney, L., de la Torre, F., Baker, S.: Semi-supervised learning of multi-factor models for face de-identification. In: CVPR (2008)

    Google Scholar 

  26. Sun, Z., Meng, L., Ariyaeeinia, A.: Distinguishable de-identified faces. In: FG (2015)

    Google Scholar 

  27. Meden, B., Emersic, Z., Struc, V., Peer, P.: \(\kappa \)-Same-Net: neural-network-based face deidentification. In: IWOBI (2017)

    Google Scholar 

  28. Pan, Y.-L., Haung, M.-J., Ding, K.-T., Wu, J.-L., Jang, J.-S.: K-Same-Siamese-GAN: K-same algorithm with generative adversarial network for facial image de-identification with hyperparameter tuning and mixed precision training. In: AVSS (2019)

    Google Scholar 

  29. Li, T., Lin, L.: AnonymousNet: natural face de-identification with measurable privacy. In: CVPR Workshops (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaohan Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Moriarty, B. et al. (2022). Utility-Preserving Biometric Information Anonymization. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds) Computer Security – ESORICS 2022. ESORICS 2022. Lecture Notes in Computer Science, vol 13555. Springer, Cham. https://doi.org/10.1007/978-3-031-17146-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-17146-8_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-17145-1

  • Online ISBN: 978-3-031-17146-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics