Advertisement

Anchored Kernel Hashing for Cancelable Template Protection for Cross-Spectral Periocular Data

  • Kiran B. RajaEmail author
  • R. Raghavendra
  • Christoph Busch
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11188)

Abstract

Periocular characteristics is gaining prominence in biometric systems and surveillance systems that operate either in NIR spectrum or visible spectrum. While the ocular information can be well utilized, there exists a challenge to compare images from different spectra such as Near-Infra-Red (NIR) versus Visible spectrum (VIS). In addition, the ocular biometric templates from both NIR and VIS domain need to be protected after the extraction of features to avoid the leakage or linkability of biometric data. In this work, we explore a new approach based on anchored kernel hashing to obtain a cancelable biometric template that is both discriminative for recognition purposes while preserving privacy. The key benefit is that the proposed approach not only works for both NIR and the Visible spectrum, it can also be used with good accuracy for cross-spectral protected template comparison. Through the set of experiments using a cross-spectral periocular database, we demonstrate the performance with \(EER=1.39\%\) and \(EER=1.61\%\) for NIR and VIS protected templates respectively. We further present a set of cross-spectral template comparison by comparing the protected templates from one spectrum to another spectra to demonstrate the applicability of the proposed approach.

Keywords

Template protection Cross-spectral periocular recognition Hashing 

Notes

Acknowledgement

This work is partially carried out under the funding of the Research Council of Norway (Grant No. IKTPLUSS 248030/O70).

References

  1. 1.
    Alonso-Fernandez, F., Mikaelyan, A., Bigun, J.: Comparison and fusion of multiple iris and periocular matchers using near-infrared and visible images. In: 2015 International Workshop on Biometrics and Forensics (IWBF), pp. 1–6. IEEE (2015)Google Scholar
  2. 2.
    European Council: Regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (general data protection regulation), April 2016Google Scholar
  3. 3.
    ISO/IEC JTC1 SC27 Security Techniques: ISO/IEC 24745:2011. information technology - security techniques - biometric information protection (2011)Google Scholar
  4. 4.
    ISO/IEC TC JTC1 SC37 Biometrics: ISO/IEC 19795–1:2006. Information Technology–Biometric Performance Testing and Reporting–Part 1: Principles and Framework. International Organization for Standardization and International Electrotechnical Committee, March 2006Google Scholar
  5. 5.
    Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245–2255 (2004)CrossRefGoogle Scholar
  6. 6.
    Raja, K.B., Raghavendra, R., Busch, C.: Binarized statistical features for improved iris and periocular recognition in visible spectrum. In: Proceedings of IWBF, pp. 1–6 (2014)Google Scholar
  7. 7.
    Raja, K.B., Raghavendra, R., Busch, C.: Collaborative representation of deep sparse filtered feature for robust verification of smartphone periocular images. In: 23rd IEEE International Conference on Image Processing, ICIP 2016, pp. 1–5, October 2016Google Scholar
  8. 8.
    Raja, K.B., Raghavendra, R., Busch, C.: Cross-spectrum periocular authentication for nir and visible images using bank of statistical filters. In: 2016 IEEE International Conference on Imaging Systems and Techniques (IST), pp. 227–231. IEEE (2016)Google Scholar
  9. 9.
    Raja, K.B., Raghavendra, R., Busch, C.: Towards protected and cancelable multi-spectral face templates using feature fusion and kernalized hashing. In: International Conference on Information Fusion (IFIP-FUSION), pp. 1–8. IEEE (2018)Google Scholar
  10. 10.
    Raja, K.B., Raghavendra, R., Stokkenes, M., Busch, C.: Smartphone authentication system using periocular biometrics. In: 2014 International Conference on Biometrics Special Interest Group, pp. 27–38. IEEE (2014)Google Scholar
  11. 11.
    Liu, W., Wang, J., Ji, R., Jiang, Y.G., Chang, S.F.: Supervised hashing with kernels. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2074–2081. IEEE (2012)Google Scholar
  12. 12.
    Liu, W., Wang, J., Kumar, S., Chang, S.F.: Hashing with graphs. In: Proceedings of the 28th International Conference on Machine Learning (ICML 2011), pp. 1–8. Citeseer (2011)Google Scholar
  13. 13.
    Park, U., Ross, A., Jain, A.K.: Periocular biometrics in the visible spectrum: a feasibility study. In: 3rd IEEE International Conference on Biometrics: Theory, Applications, and Systems, BTAS 2009, pp. 1–6 (2009)Google Scholar
  14. 14.
    Patel, V.M., Ratha, N.K., Chellappa, R.: Cancelable biometrics: a review. IEEE Sig. Process. Mag. 32(5), 54–65 (2015)CrossRefGoogle Scholar
  15. 15.
    Pillai, J.K., Patel, V.M., Chellappa, R., Ratha, N.K.: Secure and robust iris recognition using random projections and sparse representations. IEEE Trans. Pattern Anal. Mach. Intell. 33(9), 1877–1893 (2011)CrossRefGoogle Scholar
  16. 16.
    Raghavendra, R., Raja, K.B., Yang, B., Busch, C.: Combining iris and periocular recognition using light field camera. In: 2nd IAPR Asian Conference on Pattern Recognition, ACPR 2013. IEEE (2013)Google Scholar
  17. 17.
    Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)CrossRefGoogle Scholar
  18. 18.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)CrossRefGoogle Scholar
  19. 19.
    Rathgeb, C., Breitinger, F., Busch, C.: Alignment-free cancelable iris biometric templates based on adaptive bloom filters. In: Proceedings of 2013 International Conference on Biometrics, ICB 2013 (2013).  https://doi.org/10.1109/ICB.2013.6612976
  20. 20.
    Rathgeb, C., Gomez-Barrero, M., Busch, C., Galbally, J., Fierrez, J.: Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris. In: 2015 IWBF, pp. 1–6, March 2015.  https://doi.org/10.1109/IWBF.2015.7110225
  21. 21.
    Sequeira, A.F., Chen, L., Wild, P., Radu, P., Ferryman, J.: Cross-Eyed: Reading Cross-Spectrum Iris/Periocular Dataset (2016). www.crosseyed.eu
  22. 22.
    Sequeira, A., et al.: Cross-eyed-cross-spectral iris/periocular recognition database and competition. In: 2016 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–5. IEEE (2016)Google Scholar
  23. 23.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948–960 (2004)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Kiran B. Raja
    • 1
    • 2
    Email author
  • R. Raghavendra
    • 2
  • Christoph Busch
    • 2
  1. 1.University of South-Eastern Norway (USN)KongsbergNorway
  2. 2.Norwegian Biometrics LaboratoryNTNU - GjøvikGjøvikNorway

Personalised recommendations