A Study on A Biometric Bits Extraction Method of A Cancelable face Template based on A Helper Data

보조정보에 기반한 가변 얼굴템플릿의 이진화 방법의 연구

  • Lee, Hyung-Gu (Yonsei University, Biometric Engineering Research Center) ;
  • Kim, Jai-Hie (Yonsei University, Biometric Engineering Research Center)
  • 이형구 (연세대학교 생체인식연구센터) ;
  • 김재희 (연세대학교 생체인식연구센터)
  • Published : 2010.01.25

Abstract

Cancelable biometrics is a robust and secure biometric recognition method using revocable biometric template in order to prevent possible compromisation of the original biometric data. In this paper, we present a new cancelable bits extraction method for the facial data. We use our previous cancelable feature template for the bits extraction. The adopted cancelable template is generated from two different original face feature vectors extracted from two different appearance-based approaches. Each element of feature vectors is re-ordered, and the scrambled features are added. With the added feature, biometric bits string is extracted using helper data based method. In this technique, helper data is generated using statistical property of the added feature vector, which can be easily replaced with straightforward revocation. Because, the helper data only utilizes partial information of the added feature, our proposed method is a more secure method than our previous one. The proposed method utilizes the helper data to reduce feature variance within the same individual and increase the distinctiveness of bit strings of different individuals for good recognition performance. For a security evaluation of our proposed method, a scenario in which the system is compromised by an adversary is also considered. In our experiments, we analyze the proposed method with respect to performance and security using the extended YALEB face database

가변생체인식 방법 (Cancelable Biometrics)은 생체정보의 도난이나 도용으로부터 강인하며 재생성 가능한 생체템플릿을 제공하는 높은 보안성을 갖는 생체 인식방법이다. 본 논문은 가변얼굴인식 방법의 하나로써 얼굴생체템플릿을 나머지에 기반하여 이진화하는 방법을 제안한다. 이진화를 위한 입력 값으로, 우리의 기존 연구 결과로서의 가변얼굴템플릿을 이용하였다. 이 가변얼굴템플릿은 상이한 두 개의 형상 기반의 얼굴특징추출 방법 (Appearance based face recognition)을 이용하여 두 개의 얼굴특징벡터를 추출하고, 추출된 두 개의 얼굴특징벡터를 재배열 후 합하여 얻어진다. 우리의 기존방법으로 얻어진 얼굴특징벡터는 실수 값을 갖기 때문에 저장 시 기존의 암호화 방법과의 접목이 힘들며 원래의 생체정보 노출에 대한 잠정적인 위협이 될 수 있다. 본 논문의 나머지에 기반한 이진화 방법은 우리의 기존 가변얼굴템플릿에서 부분정보인 나머지를 이용하여 이진비트열을 생성하므로 향상된 보안성을 제공한다. 또한 본 논문의 이진화 기법은 합해진 특징벡터의 통계적인 특징으로부터 정의된 보조정보 (Helper data)를 이용하여 높은 인식 성능을 갖는다. 제안방법은 보조정보가 노출된 경우에서도 이진화된 가변얼굴템플릿이 원 얼굴특징벡터보다 향상된 인식성능을 보장한다. 제안하는 방법은 the extended YALEB face database를 이용하여 성능과 보안성에 대하여 평가 하였다.

Keywords

References

  1. Jean-paul Linnartz and Pim Tuyls, "New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates," AVBPA, pp. 393-402, 2003.
  2. Brian Chen and Gregory W. Wornell, " Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding," IEEE Trans. on Information Theory, vol. 47, no. 4, pp. 1423-1443, 2001. https://doi.org/10.1109/18.923725
  3. C. Vielhauer and R. Steinmetz, "Handwriting: feature correlation analysis for biometric hashes," EURASIP Journal on Applied Signal Processing, vol. 2004, no. 4, pp. 542–558, special issue on Biometric Signal Processing, 2004. https://doi.org/10.1155/S1110865704309248
  4. Qi Han, Zhifang Wang, and Xiamu Niu, "A Non-uniform Quantizing Approach to Protect Biometric Templates," International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP '06., pp. 693-698, 2006.
  5. Chen C., Veldhuis R.N.J., Kevenaar T.A.M., and Akkermans A.H.M., "Multi-Bits Biometric String Generation based on the Likelihood Ratio," First IEEE International Conference on Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007., 2007.
  6. Andrew Teoh, David Ngo and Alwyn Goh, "Biohashing: Two Factor Authentication Featuring Fingerprint Data And Tokenised Random Number," Pattern Recognition, Vol. 37, Issue 11, pp. 2245-2255, 2004. https://doi.org/10.1016/j.patcog.2004.04.011
  7. Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, and Raymond N. J. Veldhuis, "Practical Biometric Authentication with Template Protection," International conference on: Audioand Video-Based Biometric Person Authentication. AVBPA, Vol. 3546, pp. 436-446, 2005.
  8. Andrew B. J. Teoh, Yip Wai Kuan, and Sangyoun Lee, "Cancellable biometrics and annotations on BioHash," Pattern Recognition, Vol. 41 , Issue 6, pp. 2034-2044, 2008. https://doi.org/10.1016/j.patcog.2007.12.002
  9. M.A. Turk and A.P. Pentland, "Eigenfaces for Recognition," Cognitive Neuroscience, Vol. 3, No. 1, pp. 71-86, 1991. https://doi.org/10.1162/jocn.1991.3.1.71
  10. M. S. Bartlett, J. R. Movellan, and T. J. Sejnowski, "Face Recognition by Independent Component Analysis," IEEE Trans. Neural Networks, vol. 13, no. 6, pp. 1450-1464, 2002. https://doi.org/10.1109/TNN.2002.804287
  11. D. D. Lee and H. S. Seung, "Learning the parts of objects by non-negative matrix factorization," Nature, vol. 401, pp. 788-791, 1999. https://doi.org/10.1038/44565
  12. 이철한, 정민이, 김종선, 최정윤, 김재희, "통계적 형상 기반의 얼굴인식을 위한 가변얼굴템플릿 생성방법," 대한전자공학회 논문지 제 44권 SP편 제 2호, pp. 27-36, 2007.
  13. M.Y. Jeong, C.H. Lee, J.S. Kim, J.Y. Choi, K.A. Toh, and J.H. Kim, "Changeable biometrics for appearance based face recognition," The Biometric Consortium Conference, pp. 1-5, 2006.
  14. Hyunggu Lee, Chulhan Lee, Jeung-yoon Choi, Jongsun Kim, and Jaihie Kim, "Changeable Face Representations Suitable for Human Recognition," International Conference on Biometrics, Vol. 4642, No. 1, pp. 557-565, 2007.
  15. K.C. Lee, J. Ho and D. Kriegman, "Acquiring Linear Subspaces for Face Recognition under Variable Lighting," IEEE Trans. Pattern Anal. Mach. Intelligence, Vol. 27, No. 5, pp. 684-698, 2005. https://doi.org/10.1109/TPAMI.2005.92
  16. Georghiades A.S., Belhumeur P.N., and Kriegman D.J., "From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose," IEEE Trans. Pattern Anal. Mach. Intelligence, vol. 23, no. 6, pp. 643-660, 2001, http://vision.ucsd.edu/-leekc/ExtYaleDatabase/Ext YaleB.html https://doi.org/10.1109/34.927464
  17. Kong et al., 2006 B. Kong, K. Cheung, D. Zhang, M. Kamel and J. You, "An analysis of BioHashing and its variants," Pattern Recognition vol. 39, no. 7, 2006, pp. 1359–1368. https://doi.org/10.1016/j.patcog.2005.10.025
  18. Hyunggu Lee, Andrew Beng Jin Teoh, and Jaihie Kim, "Biometric Bits Extraction through Phase Quantization based on Feature level fusion", submitted to the Special Issue on Biometric Systems and Applications in the Journal of Telecommunication Systems