Abstract
Biometric system databases are vulnerable to many types of attacks. To address this issue, several bio-metric template protection systems have been proposed to protect biometric data against unauthorized use. Many of biometric protection systems require the biometric templates to be represented in a binary form. Therefore, extracting binary templates from real-valued biometric data is a key step in such biometric data protection systems. In addition, binary representation of biometric data can speed-up the matching process and reduce the storage capacity required to store the enrolled templates. The main challenge of existing biometric data binarization approaches is to retain the discrimination power of the original real-valued templates after binarization. In this paper, we propose a secure and efficient biometric data binarization scheme that employs multi-objective optimization using Nondominated Sorting Genetic Algorithm (NSGA-II). The goal of the proposed method is to find optimal quantization and encoding parameters that are employed in the binarization process. Results obtained from the experiments conducted on the ORL face and MCYT fingerprint databases show a promising recognition accuracy without sacrificing the security of the system.
Article PDF
Avoid common mistakes on your manuscript.
7. References
Y. Chang, W. Zhang, and T. Chen. Biometric-based cryptographic key generation. In Proc. the IEEE Intl. Conf. on Multimedia and Expo, pages 2203 –2206, 2004.
A. Teoh, A. Goh, and D. Ngo. Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs. Proc. IEEE Trans. on Pattern Analysis and Machine Intelligence, 28(12), 2006.
A. Juels and M. Wattenberg. A fuzzy commitment scheme. In Proc. the 6th ACM Conf. on Computer and Communication Security, pages 28–36, 1999.
O. Ouda, N. Tsumura, and T. Nakaguchi. Tokenless cancelable biometrics scheme for protecting iris codes. In Proc. Intl. Conf. on Pattern Recognition, pages 882–885, 2010.
J. Daugman. How iris recognition works. IEEE Trans. on Circuits and Systems for Video Technology, 14(1), 2004.
M. Lim and A. Teoh. An effective biometric discretization approach to extract highly discriminative, informative, and privacy-protective binary representation. EURASIP Journal on Advances in Signal Processing, 2011.
C. Chen, R. Veldhuis, T. Kevenaar, and A. Akkermans. Biometric quantization through detection rate optimized bit allocation. EURASIP Journal on Advances in Signal Processing, 2009.
C.Coello. An updated survey of evolutionary multi-objective optimization techniques: state of the art and future trends. In Proc. the Intl. Congress on Evolutionary Computations, 1999.
K. Deb, A. Pratap, S.Agarwal, and T.Meyarivan. A fast and elitist multi objective genetic algorithm : Nsga-ii. IEEE Transactions on Evolutionary Computation, 6(2), 2000.
ORL face image database AT&T Laboratories www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.
MCYT-Fingerprint-100 ATVS Biometric Recogntion Group http://atvs.ii.uam.es/databases.jsp.
J. Linnartz and P. Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In Proc. the 4th Intl. Conf. on Audio and Video Based Person Authentication, pages 238–250, 2003.
F. Hao and W. Chan. Private key generation from on-line handwritten signatures. Information Management and Computer Security, 10(4), 2002.
M. Lim, A. Teoh, and K. Toh. An analysis on equal width quantization and linearly separable subcode encoding-based discretization and its performance resemblances. EURASIP Journal on Advances in Signal Processing, 2011.
A. Teoh, W. Yip, and K. Toh. Cancellable biometrics and user-dependent multi-state discretization in biohash. Intl. Journal of Pattern Analysis and Applications, 13(3), 2010.
C. Chen and R. Veldhuis. Extracting biometric binary strings with minimal area under the FRR curve for the hamming distance classifier. Signal Processing Journal, 91(4), 2011.
P. Tuyls, A. Akkermans, T. Kevenaar, G. Schrijen, A. Bazen, and N. Veldhuis. Practical biometric authentication with template protection. In Proc. the 5th Intl. Conf. on Audio- and Video-based Biometric Person Authentication, pages 436–446, 2005.
A. Teoh, K. Toh, and W. Yip. 2n discretization of biophasor in cancellable biometrics. In Proc. Intl. Conf. on Biometrics, pages 435–444, 2007.
M. Lim and A. Teoh. A novel output label with high separability for biometric discretization. In Proc. the 5th IEEE Conf. on Industrial Electronics and Applications, pages 290–294, 2010.
M. Lim and A. Teoh. A novel encoding scheme for effective biometric discretization linearly separable subcode. IEEE Trans. on Pattern Analysis and Machine Intelligence, 35(2), 2013.
A. Hans. Multicriteria optimization for highly accurate systems, Multicirteria optimization in engineering and sciences. Plenum Press, 1988.
N. Srinivas and K. Deb. Multiobjective optimization using nondominated sorting in genetic algorithm. The Journal of Evolutionary Computations, 2(3), 1994.
M. Fonseca and J. Fleming. Genetic algorithms for multiobjective optimization: Formulation, discussion and generalization. In Proc. the 5th Conf. onGenetic Algorithms, 1993.
J. Horn, N.Nafpliotis, and E. Goldberg. Multiobjective optimization using the niched pareto genetic algorithm. In Proc. the 1st IEEE Intl. Conf. on Evolutionary Computations, 1994.
E.Zitzler, K.Deb, and L.Thiele. Comparison of multiobjective evolutionary algorithms: empirical results. Evolutionary Computation, 8(2), 2000.
M. Mitchell. An introduction to genetic algorithms. MIT Press Cambridge, 1996.
J.Koza. Genetic Programming on The Programming of Computers by Means of Natural Selection. MIT Press, 1992.
A. Pentland M. Turk. Eigenfaces for recognition. Journal of Cognitive Neurosicence, 3(1):71–86, 1991.
F.Fernandez, J.Ortega, J. Fronthaler, H.Kollreider, and K.Bigun. Combining multiple matchers for fingerprint verification: A case study in biosecure network of excellence. Annals of Telecommunications, Multimodal Biometrics, 62(2), 2007.
P. Rogaway and T. Shrimpton. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Springer-Verlag, 2004.
Author information
Authors and Affiliations
Rights and permissions
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
About this article
Cite this article
Hamouda, E., Yuan, X., Ouda, O. et al. Secure and Efficient Biometric-Data Binarization using Multi-Objective Optimization. Int J Comput Intell Syst 8, 1116–1127 (2015). https://doi.org/10.1080/18756891.2015.1113746
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1080/18756891.2015.1113746