Revealing the Secret of FaceHashing

  • King-Hong Cheung
  • Adams Kong
  • David Zhang
  • Mohamed Kamel
  • Jane You
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3832)

Abstract

Biometric authentication has attracted substantial attention over the past few years. It has been reported recently that a new technique called FaceHashing, which is proposed for personal authentication using face images, has achieved perfect accuracy and zero equal error rates (EER). In this paper, we are going to reveal that the secret of FaceHashing in achieving zero EER is based on a false assumption. This is done through simulating the claimants’ experiments. Thus, we would like to alert the use of “safe” token.

References

  1. 1.
    Chellappa, R., Wilson, C.L., Sirohey, A.: Human and machine recognition of faces: A survey. Proceedings of the IEEE 83, 705–740 (1995)CrossRefGoogle Scholar
  2. 2.
    Jain, A., Hong, L., Bolle, R.: On-line fingerprint verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 19, 302–314 (1997)CrossRefGoogle Scholar
  3. 3.
    Bhanu, B., Tan, X.: Fingerprint indexing based on novel features of minutiae triplets. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 616–622 (2003)CrossRefGoogle Scholar
  4. 4.
    Daugman, J.: High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15, 1148–1161 (1993)CrossRefGoogle Scholar
  5. 5.
    Zhang, D., Kong, W.K., You, J., Wong, M.: On-line palmprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 1041–1050 (2003)CrossRefGoogle Scholar
  6. 6.
    Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology 14, 4–20 (2004)CrossRefGoogle Scholar
  7. 7.
    Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Boston Mass (1999)Google Scholar
  8. 8.
    Teoh, A.B.J., Ngo, D.C.L., Goh, A.: An integrated dual factor authenticator based on the face data and tokenised random number. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 117–123. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Ngo, D.C.L., Teoh, A.B.J., Goh, A.: Eigenspace-based face hashing. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 195–199. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Personalised cryptographic key generation based on FaceHashing. Computers and Security Journal 7, 606–614 (2004)CrossRefMathSciNetGoogle Scholar
  11. 11.
    Teoh, A.B.J., Ngo, D.C.L.: Cancellable biometerics featuring with tokenised random number. Pattern Recognition Letters 26, 1454–1460 (2005)CrossRefGoogle Scholar
  12. 12.
    Teoh, A.B.J., Ngo, D.C.L., Goh, A.: BioHashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37, 2245–2255 (2004)CrossRefGoogle Scholar
  13. 13.
    Connie, T., Teoh, A., Goh, M., Ngo, D.: PalmHashing: A Novel Approach for Dual-Factor Authentication. Pattern Analysis and Application 7, 255–268Google Scholar
  14. 14.
    Pang, Y.H., Teoh, A.B.J., Ngo, D.C.L.: Palmprint based cancelable biometric authentication system. International Journal of Signal Processing 1, 98–104 (2004)Google Scholar
  15. 15.
    Connie, T., Teoh, A., Goh, M., Ngo, D.: PalmHashing: a novel approach to cancelable biometrics. Information Processing Letter 93, 1–5 (2005)CrossRefMathSciNetGoogle Scholar
  16. 16.
    Samaria, F., Harter, A.: Parameterisation of a stochastic model for human face identification. In: Proceedings of the 2nd IEEE Workshop on Applications of Computer Vision, Sarasota (Florida), pp. 138–142 (1994), paper and ORL face database both available online at http://www.uk.research.att.com/facedatabase.html
  17. 17.
    Martinez, A.M., Kak, A.C.: PCA versus LDA. IEEE Transactions on Pattern Analysis and Machine Intelligence 23, 228–233 (2001)CrossRefGoogle Scholar
  18. 18.
    Turk, M., Pentland, A.: Eigenfaces for recognition. Journal of Cognitive Neuroscience 3, 71–86 (1991)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • King-Hong Cheung
    • 1
  • Adams Kong
    • 1
    • 2
  • David Zhang
    • 1
  • Mohamed Kamel
    • 2
  • Jane You
    • 1
  1. 1.Biometrics Research Centre, Department of ComputingThe Hong Kong Polytechnic University, Hung Hom, KowloonHong Kong
  2. 2.Pattern Analysis and Machine Intelligence LabUniversity of WaterlooCanada

Personalised recommendations