A Biometric Key-Binding and Template Protection Framework Using Correlation Filters

  • Vishnu Naresh Boddeti
  • Fei Su
  • B. V. K. Vijaya Kumar
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5558)


We describe a new framework to bind cryptographic keys with biometric signatures using correlation filters. This scheme combines correlation filter based biometric recognition with biometric key-binding while offering template protection, revocability, diversity and security. We demonstrate the effectiveness of our scheme via numerical results on the CMU-PIE face database.


Encryption Key-Binding Correlation Filters Face Recognition Template Protection Biometrics 


  1. 1.
    Soutar, C., et al.: Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178–188 (1998)Google Scholar
  2. 2.
    Soutar, C., et al.: Proc. SPIE, Optical Pattern Recognition IX, vol. 3386, pp. 24–35 (1998)Google Scholar
  3. 3.
    Soutar, C., et al.: Biometric encryption. In: Nichols, R.K. (ed.) ICSA Guide to Cryptography. McGraw-Hill, New York (1999)Google Scholar
  4. 4.
    Juels, A., Sudan, M.: Proc. of IEEE Intl. Symp. on Info. Theory, Lausanne, Switzerland, p. 408 (2002)Google Scholar
  5. 5.
    Uludag, U., et al.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K., et al. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)Google Scholar
  6. 6.
    Lee, Y.J., et al.: IEEE Transactions on Systems, Man, and Cybernetics-Part B 38, 1302–1313 (October 2008)Google Scholar
  7. 7.
    Scheirer, W.J., Boult, T.E.: Proc. of Biometrics Symposium, September 2007, pp. 1–6 (2007)Google Scholar
  8. 8.
    Kholmatov, A., Yanikoglu, B.: Proc. of SPIE Symposium on Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, USA, vol. 6819, pp. 68190O–68190O-7 (2008)Google Scholar
  9. 9.
    Ratha, N.K., et al.: IEEE Trans. Pattern Anal. Mach. Intell., 561–572 (2007)Google Scholar
  10. 10.
    Savvides, M., et al.: International Conference on Pattern Recognition, pp. 922–925 (2004)Google Scholar
  11. 11.
    Hao, F., et al.: IEEE Trans. Computers, 1081–1088 (2006)Google Scholar
  12. 12.
    Sutcu, Y., et al.: IEEE International Symposium on Information Theory (ISIT), pp. 2297-2301 (July 2008)Google Scholar
  13. 13.
    Sutcu, Y., et al.: IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), June 2008, vol. 23, pp. 1–6 (2008)Google Scholar
  14. 14.
    Vijaya Kumar, B.V.K., et al.: Proceedings of International Conference of Image Processing, September 2002, pp. 53–56 (2002)Google Scholar
  15. 15.
    Savvides, M., Vijaya Kumar, B.V.K.: Proceedings of IEEE Conference on Advanced Video and Signal Based Surveillance, July 2003, pp. 45–52 (2003)Google Scholar
  16. 16.
    Thronton, J., et al.: Proceedings of International Conference on Image Analysis and Recognition, September 2005, pp. 1098–1105 (2005)Google Scholar
  17. 17.
    Vijaya Kumar, B.V.K.: Applied Optics 31, 4773–4801 (1992)Google Scholar
  18. 18.
    Mahalanobis, A., et al.: Applied Optics 26, 3633–3640 (1987)Google Scholar
  19. 19.
    Adler, A.: Audio and Video Based Biometric Person Authentication, pp. 1100–1109 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Vishnu Naresh Boddeti
    • 1
  • Fei Su
    • 2
  • B. V. K. Vijaya Kumar
    • 1
  1. 1.Carnegie Mellon UniversityPittsburghUSA
  2. 2.Beijing University of Posts and TelecommunicationsBeijingChina

Personalised recommendations