Abstract
In recent years, there are many algorithms have been reported to tackle biometric template protection problem, which can be divided into two categories, biometric cryptosystem approach and transformed-based approach. Previous work reported a method that combined these two approaches and proposed a framework for face biometric. However, this framework just worked for verification mode. In this paper, we combined both transform-based approach and biometric cryptosystem approach, and developed a novel template protection method for identification based on palmprint biometric. The experimental results show that the proposed method maintains high identification rate and high security level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ratha, N., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Proc. Audio and Video-based Biometric Person Authentication, pp. 223–228 (2011)
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)
Wu, X., Zhang, D., Wang, K.: A Cryptosystem Based on Palmprint Feature. In: IEEE International Conference on Pattern Recognition, pp. 1–4 (2008)
Goh, A., Ngo, D.: Computation of cryptographic keys from face biometrics. In: Proc. International Federation for Information Processing, pp. 1–13 (2003)
Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic key generation from voice. In: Proc. IEEE Symposium on Security and Privacy, pp. 202–213 (2001)
Feng, Y.C., Yuen, P.C., Jain, A.K.: A Hybrid Approach for Face Template Protection. In: Proc. of SPIE Conference of Biometric Technology for Human Identification (2008) doi: 10.1117/12.778652
Feng, Y.C., Yuen, P.C.: Class-Distribution Preserving Transform for Face Biometric Data Security. In: Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 141–144 (2007)
Goel, N., Bebis, G., Nefian, A.: Face Recognition Experiments with Random Projection. In: Proc. SPIE Conference on Biometric Technology for Human Identification, pp. 426–437 (2005)
Johnson, W.B., Lindenstrauss, J.: Extensions of Lipschitz mappings into a Hilbert space. In: Proc. of International Conference in Modern Analysis and Probability, pp. 189–206 (1984)
PolyU Palmprint Database, http://www.comp.polyu.edu.hk/~biometrics/
Kong, W., Zhang, D.: Competitive coding scheme for palmprint verification. In: International Conference Pattern Recognition, pp. 520–523 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lu, G., zhang, J., Shan, F. (2013). A Novel Template Protection Method Based on Palmprint Feature. In: Kamel, M., Campilho, A. (eds) Image Analysis and Recognition. ICIAR 2013. Lecture Notes in Computer Science, vol 7950. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39094-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-39094-4_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39093-7
Online ISBN: 978-3-642-39094-4
eBook Packages: Computer ScienceComputer Science (R0)