Advertisement

A Dissimilarity-Based Approach for Biometric Fuzzy Vaults–Application to Handwritten Signature Images

  • George S. Eskander
  • Robert Sabourin
  • Eric Granger
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8158)

Abstract

Bio-Cryptographic systems enforce authenticity of cryptogra-phic applications like data encryption and digital signatures. Instead of simple user passwords, biometrics, such as, fingerprint and handwritten signatures, are employed to access the cryptographic secret keys. The Fuzzy Vault scheme (FV) is massively employed to produce bio-cryptogra-phic systems, as it absorbs variability in biometric signals. However, the FV design problem is not well formulated in the literature, and different approaches are applied for the different biometric traits. In this paper, a generic FV design approach, that could be applied to different biometrics, is introduced. The FV decoding functionality is formulated as a simple classifier that operates in a dissimilarity representation space. A boosting feature selection (BFS) method is employed for optimizing this classifier. Application of the proposed approach to offline signature biometrics confirms its viability. Experimental results on the Brazilian signature database (that includes various forgeries) have shown FV recognition accuracy of 90% and system entropy of about 69-bits.

Keywords

Fuzzy Vault Bio-Cryptography Offline Signatures Dissimilarity Representation 

References

  1. 1.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. Proceedings of the IEEE 92(6), 948–960 (2004)CrossRefGoogle Scholar
  2. 2.
    Juels, A., Sudan, M.: A Fuzzy Vault scheme. In: Proc. IEEE Int. Symp. Inf. Theory, Switzerland, p. 408 (2002)Google Scholar
  3. 3.
    Pekalska, E., Duin, R.P.W.: Dissimilarity representations allow for building good classifiers. PR Letters 23(8), 161–166 (2002)Google Scholar
  4. 4.
    Tieu, K., Viola, P.: Boosting image retrieval. International Journal of Computer Vision 56(1), 17–36 (2004)CrossRefGoogle Scholar
  5. 5.
    Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint based Fuzzy Vault: Implementation and Performance. IEEE TIFS 2(4), 744–757 (2007)Google Scholar
  6. 6.
    Eskander, G.S., Sabourin, R., Granger, E.: Signature based Fuzzy Vaults with boosted feature selection. In: SSCI-CIBIM 2011, Paris, pp. 131–138 (2011)Google Scholar
  7. 7.
    Rivard, D., Granger, E., Sabourin, R.: Multi-Feature extraction and selection in writer-independent offline signature verification. IJDAR 16(1), 83–103 (2013)CrossRefGoogle Scholar
  8. 8.
    Eskander, G.S., Sabourin, R., Granger, E.: Adaptation of writer-independent systems for offline signature verification. In: ICFHR 2012, Bari, Italy, pp. 432–437 (2012)Google Scholar
  9. 9.
    Eskander, G.S., Sabourin, R., Granger, E.: On the Dissimilarity Representation and Prototype Selection for Signature-Based Bio-Cryptographic Systems. In: SIMBAD 2013, York, UK, July 3-5 (accepted for publication, 2013)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • George S. Eskander
    • 1
  • Robert Sabourin
    • 1
  • Eric Granger
    • 1
  1. 1.Laboratoire d’imagerie, de vision et d’intelligence artificielle Ecole de technologie supérieureUniversité du QuébecMontréalCanada

Personalised recommendations