Abstract
Biometric cryptosystems extend the user authentication functionality of usual biometric systems with the ability to generate robust stable values (also called biometric hashes) from variable biometric data. This work addresses a biometric hash algorithm applied to handwriting data and investigates the performance of both user authentication and hash generation scenarios. In order to improve the hash generation performance, some feature selection approaches are proposed. The intelligent reduction of features leads not only to a better ratio of collision/reproduction rates, but also improves equal error rates in user authentication scenario. Additionally, the parameterization of biometric hash algorithm is discussed. It has been shown that different quantization parameters as well as different features should be selected to achieve better performance rates in both scenarios. For the best semantic, symbol, the EER is improved from 8.30% to 5.27% and the CRR from 11.20% to 6.32%. Finally, the almost useful and needless features are figured out e.g. only 2 features are selected for every semantic in both scenarios and 10 features are never selected.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Guyon, I., Elisseeff, A.: An Introduction to Variable and Feature Selection. Journal of Machine Learning Research 3, 1157–1182 (2003)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Signal Processing, Article ID 579416 (2008)
John, G.H., Kohavi, R., Pfleger, K.: Irrelevant Features and the Subset Selection Problem. In: Proc. of the International Conference on Machine Learning, pp. 121–129 (1994)
Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Proc. of the ACM Conference on Computer and Communications Security, pp. 28–36 (1999)
Kumar, A., Zhang, D.: Biometric Recognition Using Feature Selection and Combination. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 813–822. Springer, Heidelberg (2005)
Scheidat, T., Vielhauer, C., Dittmann, J.: Advanced studies on reproducibility of biometric hashes. In: Schouten, B., Juul, N.C., Drygajlo, A., Tistarelli, M. (eds.) BIOID 2008. LNCS, vol. 5372, pp. 150–159. Springer, Heidelberg (2008)
Sutcu, Y., Li, Q., Memon, N.: Protecting Biometric Templates with Sketch: Theory and Practice. IEEE Trans. on Information Forensics and Security 2(3), 503–512 (2007)
Vielhauer, C.: Biometric User Authentication for IT Security: From Fundamentals to Handwriting. Springer, New York (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Makrushin, A., Scheidat, T., Vielhauer, C. (2011). Handwriting Biometrics: Feature Selection Based Improvements in Authentication and Hash Generation Accuracy. In: Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C., Fairhurst, M.C. (eds) Biometrics and ID Management. BioID 2011. Lecture Notes in Computer Science, vol 6583. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19530-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-19530-3_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19529-7
Online ISBN: 978-3-642-19530-3
eBook Packages: Computer ScienceComputer Science (R0)