Abstract
In this paper, we propose a novel method of Cancelable Biometrics for correlation-based matching. The biometric image is transformed by Number Theoretic Transform (Fourier-like transform over a finite field), and then the transformed data is masked with a random filter. By applying a particular kind of masking technique, the correlation between the registered image and the input matching image can be computed in masked domain (i.e., encrypted domain) without knowing the original images. And we proved theoretically that in our proposed method the masked version does not leak any information of the original image, in other words, our proposed method has perfect secrecy. Additionally, we applied our proposed method to finger-vein pattern verification and experimentally obtained very high verification performance.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometric-based authentication systems. IBM System Journal 40(3) (2001)
Savvides, M., Vijayakumar, B.V.K., Khosla, P.K.: Cancelable Biometric Filters for Face Recognition. In: 17th International Conference on Pattern Recognition (ICPR 2004), vol. 3, pp. 922–925 (2004)
Connie, T., Teoh, A., Goh, M., Ngo, D.: PalmHashing: a novel approach for cancelable biometrics. Information Processing Letters 93(1), 1–5 (2005)
Ratha, N.K., Connell, J.H., Bolle, R.M., Chikkerur, S.: Cancelable Biometrics: A Case Study in Fingerprints. In: 18th International Conference on Pattern Recognition (ICPR 2006), vol. 4, pp. 370–373 (2006)
Agarwal, R.C., Burrus, C.S.: Number theoretic transforms to implement fast digital convolution. Proc. IEEE 63(4), 550–560 (1975)
Rosenfeld, A., Kak, A.C.: Digital Picture Processing, 2nd edn., vol. 2. Academic Press, London (1982)
Reed, I.S., Truong, T.K., Kwoh, Y.S., Hall, E.L.: Image Processing by Transforms Over a Finte Field. IEEE Transactions on Computers C-26(9), 874–881 (1977)
Buchmann, J.A.: Introduction to Cryptography, 2nd edn. Springer, Heidelberg (2004)
Miura, N., Nagasaka, A., Miyatake, T.: Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification. Machine Vision and Applications 15(4), 194–203 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hirata, S., Takahashi, K. (2009). Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching. In: Tistarelli, M., Nixon, M.S. (eds) Advances in Biometrics. ICB 2009. Lecture Notes in Computer Science, vol 5558. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01793-3_88
Download citation
DOI: https://doi.org/10.1007/978-3-642-01793-3_88
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01792-6
Online ISBN: 978-3-642-01793-3
eBook Packages: Computer ScienceComputer Science (R0)