DOI QR코드

DOI QR Code

Discriminative and Non-User Specific Binary Biometric Representation via Linearly-Separable SubCode Encoding-based Discretization

  • Lim, Meng-Hui (School of Electrical and Electronic Engineering, College of Engineering, Yonsei University) ;
  • Teoh, Andrew Beng Jin (School of Electrical and Electronic Engineering, College of Engineering, Yonsei University)
  • Received : 2010.11.13
  • Accepted : 2011.01.09
  • Published : 2011.02.28

Abstract

Biometric discretization is a process of transforming continuous biometric features of an identity into a binary bit string. This paper mainly focuses on improving the global discretization method - a discretization method that does not base on information specific to each user in bitstring extraction, which appears to be important in applications that prioritize strong security provision and strong privacy protection. In particular, we demonstrate how the actual performance of a global discretization could further be improved by embedding a global discriminative feature selection method and a Linearly Separable Subcode-based encoding technique. In addition, we examine a number of discriminative feature selection measures that can reliably be used for such discretization. Lastly, encouraging empirical results vindicate the feasibility of our approach.

Keywords

References

  1. P.N, Belhumeur, J.P. Kriegman and D.J. Kriegman, "Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 711-720, 1997. https://doi.org/10.1109/34.598228
  2. Y. Chang, W. Zhang and T. Chen, "Biometric-based cryptographic key generation," in Proc. of IEEE International Conference on Multimedia and Expo (ICME 2004), 2004.
  3. C. Chen, R. Veldhuis, T. Kevenaar and A. Akkermans, "Multi-bits biometric string generation based on the likelihood ratio," in Proc. of IEEE International Conference on Multimedia and Expo (ICME 2004), vol. 3, pp. 2203-2206, 2004.
  4. C. Chen, R. Veldhuis, T. Kevenaar and A. Akkermans, "Biometric quantization through detection rate optimized bit allocation," EURASIP Journal on Advances in Signal Processing, Article ID 784834, 16 pages, 2009.
  5. Y. Dodis, R. Ostrovsky, L. Reyzin and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," Eurocrypt 2004, LNCS, vol. 3027, pp. 523-540, 2004.
  6. F. Gray, "Pulse code communications," U.S. Patent 2632058, 1953.
  7. F. Han, J. Hu, L. He and Y. Wang, "Generation of reliable PINs from fingerprints," in Proc. of IEEE International Conference on Communications (ICC '07), pp. 1191-1196, 2007.
  8. F. Hao and C.W. Chan, "Private key generation from on-line handwritten signatures," Information Management & Computer Security, vol. 10, no. 4, pp. 159-164, 2002. https://doi.org/10.1108/09685220210436949
  9. A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in Proc. of 6th ACM Conference in Computer and Communication Security (CCS'99), pp. 28-36, 1999.
  10. T.A.M. Kevenaar, G.J. Schrijen, M. van der Veen, A.H.M. Akkermans and F. Zuo, "Face recognition with renewable and privacy preserving binary templates," in Proc. of 4th IEEE Workshop on Automatic Identification Advanced Technologies (AutoID '05), pp. 21-26, 2005.
  11. M.-H. Lim and A.B.J. Teoh, "Linearly separable subcode: A novel output label with high separability for biometric discretization," in Proc. of 5th IEEE Conference on Industrial Electronics and Applications (ICIEA'10), pp. 290 - 294, 2010.
  12. J.-P. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," in Proc. of 4th International Conference on Audio and Video Based Perso Authentication (AVBPA 2004), LNCS, vol. 2688, pp. 238-250, 2003.
  13. A.M. Martinez and R. Benavente, "The AR Face Database," CVC Technical Report # 24, 1998.
  14. F. Monrose, M.K. Reiter, Q. Li and S. Wetzel, "Cryptographic key generation from voice," in Proc. of IEEE Symposium on Security and Privacy (S&P 2001), pp. 202-213, 2001.
  15. F. Monrose, M.K. Reiter, Q. Li and S. Wetzel, "Using voice to generate cryptographic keys," Odyssey 2001, The Speaker Verification Workshop, 2001.
  16. A.B.J. Teoh, K.-A. Toh and W.K. Yip, "2$^{\wedge}$N discretisation of biophasor in cancellable biometrics," in Proc. of 2nd International Conference on Biometrics (ICB 2007), Lecture Notes in Computer Science, vol. 4642, pp. 435-444, 2007.
  17. A.B.J. Teoh, D.C.L. Ngo and A. Goh, "Personalised cryptographic key generation based on FaceHashing," Computers and Security, vol. 23, no. 7, pp. 606-614, 2004. https://doi.org/10.1016/j.cose.2004.06.002
  18. A.B.J. Teoh, W.K. Yip and K.-A. Toh, "Cancellable biometrics and user-dependent multi-state discretization in BioHash," Pattern Analysis & Applications, vol. 13, no. 3, pp. 301-307, 2009.
  19. M. Turk and A. Pentland, "Eigenfaces for Recognition", Journal of Cognitive, Neuroscience, vol. 3, no. 1, pp. 71-86, 1991. https://doi.org/10.1162/jocn.1991.3.1.71
  20. P. Tuyls, A.H.M. Akkermans, T.A.M. Kevenaar, G.-J. Schrijen, A.M. Bazen and N.J. Veldhuis, "Practical biometric authentication with template protection," in Proc. of 5th International Conference on Audio- and Video-based Biometric Person Authentication, LNCS, vol. 3546, pp. 436-446, 2005.
  21. E. Verbitskiy, P. Tuyls, D. Denteneer and J.P. Linnartz, "Reliable biometric authentication with privacy protection," in Proc. of 24th Benelux Symposium on Information Theory, pp. 125-132, 2003.
  22. W.K. Yip, A. Goh, D.C.L. Ngo and A.B.J. Teoh, "Generation of replaceable cryptographic keys from dynamic handwritten signatures," in Proc. of 1st International Conference on Biometrics, Lecture Notes in Computer Science, vol. 3832, pp. 509-515, 2006.