Selection of Distinguish Points for Class Distribution Preserving Transform for Biometric Template Protection

  • Yi C. Feng
  • Pong C. Yuen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4642)

Abstract

This paper addresses the biometric template security issue. Follow out previous work on class distribution transform, the proposed scheme selects the distinguish points automatically. By considering the geometric relationship with the biometric templates, the proposed scheme transforms a real-value biometric template to a binary string such that the class distribution is preserved and proved mathematically. The binary string is then further encoded using BCH and hashing method to ensure that the template protecting algorithm is non-invertible. Two face databases, namely ORL and FERET, are selected for evaluation and LDA is used for creating the original template. Experimental results show that by integrating the proposed scheme into the LDA (original) algorithm, the system performance can be further improved by 1.1% and 4%, in terms of equal error rate, on ORL and FERET databases respectively. The results show that the proposed scheme not only can preserve the original template discriminant power, but also improve the performance if the original template is not fully optimized.

Keywords

Biometric template security face recognition one-way transform class distribution preserving 

References

  1. 1.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6), 948–960 (2004)CrossRefGoogle Scholar
  2. 2.
    Ratha, N., Connell, J., Bolle, R.: Enhancing security and privacy in biometric-based authentication systems. IBM Systems Journal 40(3), 614–634 (2001)CrossRefGoogle Scholar
  3. 3.
    Ratha, N., Connell, J., Bolle, R., Chikkerur, S.: Cancelable biometrics: A case study in Fingerprints. In: Proceedings of International Conference on Pattern Recognition (2006)Google Scholar
  4. 4.
    Jain, A.K., Ross, A., Pankanti, S.: Biometrics: A Tool for Information Security. IEEE Transactions on Information Forensics and Security 1(2), 125–143 (2006)CrossRefGoogle Scholar
  5. 5.
    Adler, A.: Images can be regenerated from quantized biometric match score data. In: Proceedings of Canadian conference of Electrical and Computer Engineering, pp. 469–472 (2004)Google Scholar
  6. 6.
    Boult, T.: Robust distance measures for face-recognition supporting revocable biometric tokens. In: Proceeding of International Conference on Automatic Face and Gesture recognition (2006)Google Scholar
  7. 7.
    Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Sixth ACM Conf. on Comp. and Comm. Security, pp. 28–36 (1999)Google Scholar
  8. 8.
    Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: IEEE International Symposium on Information Theory, IEEE Computer Society Press, Los Alamitos (2002)Google Scholar
  9. 9.
    Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In: Proc. ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop, pp. 45–52 (2003)Google Scholar
  10. 10.
    Ngo, D.C.L., Teoh, A.B.J., Goh, A.: Biometric Hash: High-Confidence Face Recognition. IEEE transactions on circuits and systems for video technology 16(6) (2006)Google Scholar
  11. 11.
    Feng, Y.C., Yuen, P.C.: Class-Distribution Preserving Transform for Face Biometric Data Security. In: ICASSP 2007. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing 2007 (in press)Google Scholar
  12. 12.
    Belhumeur, P.N., Hespanha, J.P., Kriegman, D.J.: Eigenfaces vs. fisherfaces: Recognition using class specific linear projection. IEEE Trans. on PAMI 19(7), 711–720 (1997)Google Scholar
  13. 13.
    Goh, A., Ngo, D.C.L.: Computation of cryptographic keys from face biometrics. In: Proc. 7th IFIP TC6/TC11 Conf. Commun. Multimedia Security, vol. 22, pp. 1–13 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Yi C. Feng
    • 1
  • Pong C. Yuen
    • 1
  1. 1.Department of Computer Science, Hong Kong Baptist University 

Personalised recommendations