Cancelable Palm Print Templates Using Gabor Representations and Random Measure

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 216)

Abstract

Palm print template security is an important issue in a real biometric system because compromised templates cannot be revoked and reissued. To tackle these problems, in this paper, by measuring the Gabor-based palm print image with a chaotic random matrix, we propose a palm print template protection scheme with provable security and acceptable recognition performance. Firstly, the Gabor is employed to convolute with preprocessed palm print image. Then, to generate the binary cancelable template, the obtained Gabor representation is compared with a chaotic random matrix. The random measure can improve the template’s discriminability. Therefore, the proposed algorithm not only protects the template but also has better performance. The experimental results on Hong Kong PolyU palm print database show that the proposed approach can achieve zero equal error rate (EER) and has large cancel ability.

Keywords

Biometric recognition Palm print template protection Chaotic number Random measure 

Notes

Acknowledgments

The authors are very grateful to the anonymous referees for their helpful comments. This work was supported by grants by National Natural Science Foundation of China (No. 61070163), by the Shandong Province Outstanding Research Award Fund for Young Scientists of China (BS2011DX034) and by the Shandong Natural Science Foundation (ZR2011FQ030).

References

  1. 1.
    Bolle RM, Connell H, Pankanti S, Ratha NK, Senior AW (2003) Guide to biometrics. Springer, Berlin, New YorkGoogle Scholar
  2. 2.
    Zhang D, Kong WK, You J, Wong M (2003) On-line palm print identification. IEEE Trans PAMI 25(22):1041–1050CrossRefGoogle Scholar
  3. 3.
    Kong A, Zhang D, Mohame K (2009) A survey of palm print recognition. Pattern Recogn 42(11):1408–1418CrossRefGoogle Scholar
  4. 4.
    Ratha NK, Connell JH, Bolle R (2001) Enhancing security and privacy of biometric-based authentication systems. IBM Syst 40(6):614–634CrossRefGoogle Scholar
  5. 5.
    Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92(12):948–960 (Special Issue on Multimedia Security for Digital Rights Management)CrossRefGoogle Scholar
  6. 6.
    Li HJ, Zhang JS, Zhang ZT (2010) Generating cancelable palm print templates via coupled nonlinear dynamic filters and multiple orientation palmcodes. Inf Sci 180(43):3876–3893CrossRefGoogle Scholar
  7. 7.
    Leng L, Zhang JS, Chen G, Khan MK, Bai P (2011) Two dimensional palmphasor enhanced by multi-orientation score level fusion. Commun Comput Infor Sci 186(32):122–129CrossRefGoogle Scholar
  8. 8.
    Kong A, Zhang D, Kamel M (2008) Three measure for secure palm print identification. Pattern Recogn 41(16):1329–1337CrossRefGoogle Scholar
  9. 9.
    Khan MK, Zhang JS, Alghathbar K (2011) Challenge-response-based biometric image scrambling for secure personal identification. Future Gener Comput Syst 27(2):411–418CrossRefGoogle Scholar
  10. 10.
    Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Signal Process 113(43):1–17 (Special issue on Biometrics)CrossRefGoogle Scholar
  11. 11.
    Teoh ABJ, Goh A, Ngo DCL (2006) Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans PAMI 28(32):1892–1901CrossRefGoogle Scholar
  12. 12.
    Pillai JK, Patel VM, Chellappa R, Ratha NK (2011) Secure and robust iris recognition using random projections and sparse representations. IEEE Trans Pattern Anal Mach Intell 33(11):1877–1893Google Scholar
  13. 13.
    Li SJ, Zheng X, Mou XQ (2002) Chaotic encryption scheme for real-time digital video. Proc SPIE 666(13):149–160CrossRefGoogle Scholar
  14. 14.
    Daugman JG (2003) The importance of being random: statistical principles of iris recognition. Pattern Recogn 36(5):279–291CrossRefGoogle Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  1. 1.Shandong Provincial Key Laboratory of computer NetworkShandong Computer Science CenterJinanChina

Personalised recommendations