Abstract
Biometric authentication has attracted substantial attention over the past few years. It has been reported recently that a new technique called FaceHashing, which is proposed for personal authentication using face images, has achieved perfect accuracy and zero equal error rates (EER). In this paper, we are going to reveal that the secret of FaceHashing in achieving zero EER is based on a false assumption. This is done through simulating the claimants’ experiments. Thus, we would like to alert the use of “safe” token.
Chapter PDF
Similar content being viewed by others
References
Chellappa, R., Wilson, C.L., Sirohey, A.: Human and machine recognition of faces: A survey. Proceedings of the IEEE 83, 705–740 (1995)
Jain, A., Hong, L., Bolle, R.: On-line fingerprint verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 19, 302–314 (1997)
Bhanu, B., Tan, X.: Fingerprint indexing based on novel features of minutiae triplets. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 616–622 (2003)
Daugman, J.: High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15, 1148–1161 (1993)
Zhang, D., Kong, W.K., You, J., Wong, M.: On-line palmprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 1041–1050 (2003)
Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology 14, 4–20 (2004)
Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Boston Mass (1999)
Teoh, A.B.J., Ngo, D.C.L., Goh, A.: An integrated dual factor authenticator based on the face data and tokenised random number. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 117–123. Springer, Heidelberg (2004)
Ngo, D.C.L., Teoh, A.B.J., Goh, A.: Eigenspace-based face hashing. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 195–199. Springer, Heidelberg (2004)
Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Personalised cryptographic key generation based on FaceHashing. Computers and Security Journal 7, 606–614 (2004)
Teoh, A.B.J., Ngo, D.C.L.: Cancellable biometerics featuring with tokenised random number. Pattern Recognition Letters 26, 1454–1460 (2005)
Teoh, A.B.J., Ngo, D.C.L., Goh, A.: BioHashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37, 2245–2255 (2004)
Connie, T., Teoh, A., Goh, M., Ngo, D.: PalmHashing: A Novel Approach for Dual-Factor Authentication. Pattern Analysis and Application 7, 255–268
Pang, Y.H., Teoh, A.B.J., Ngo, D.C.L.: Palmprint based cancelable biometric authentication system. International Journal of Signal Processing 1, 98–104 (2004)
Connie, T., Teoh, A., Goh, M., Ngo, D.: PalmHashing: a novel approach to cancelable biometrics. Information Processing Letter 93, 1–5 (2005)
Samaria, F., Harter, A.: Parameterisation of a stochastic model for human face identification. In: Proceedings of the 2nd IEEE Workshop on Applications of Computer Vision, Sarasota (Florida), pp. 138–142 (1994), paper and ORL face database both available online at http://www.uk.research.att.com/facedatabase.html
Martinez, A.M., Kak, A.C.: PCA versus LDA. IEEE Transactions on Pattern Analysis and Machine Intelligence 23, 228–233 (2001)
Turk, M., Pentland, A.: Eigenfaces for recognition. Journal of Cognitive Neuroscience 3, 71–86 (1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cheung, KH., Kong, A., Zhang, D., Kamel, M., You, J. (2005). Revealing the Secret of FaceHashing. In: Zhang, D., Jain, A.K. (eds) Advances in Biometrics. ICB 2006. Lecture Notes in Computer Science, vol 3832. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11608288_15
Download citation
DOI: https://doi.org/10.1007/11608288_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31111-9
Online ISBN: 978-3-540-31621-3
eBook Packages: Computer ScienceComputer Science (R0)