Browse > Article

A Method of Generating Changeable Face Template for Statistical Appearance-Based Face Recognition  

Lee, Chul-Han (Biometric Engineering Research Center, Yonsei University)
Jung, Min-Yi (Biometric Engineering Research Center, Yonsei University)
Kim, Jong-Sun (Biometric Engineering Research Center, Yonsei University)
Choi, Jeung-Yoon (Biometric Engineering Research Center, Yonsei University)
Kim, Jai-Hie (Biometric Engineering Research Center, Yonsei University)
Publication Information
Abstract
Changeable biometrics identify a person using transformed biometric data instead of original biometric data in order to enhance privacy and security in biometrics when biometric data is compromised. In this paper, a novel scheme which generates changeable face templates for statistical appearance-based face recognition is proposed. Two different original face feature vectors are extracted from two different appearance-based approaches, respectively, each original feature vector is normalized, and its elements are re-ordered. Finally a changeable face template is generated by weighted addition between two normalized and scrambled feature vectors. Since the two feature vectors are combined into one by a two to one mapping, the original two feature vectors are not easily recovered from the changeable face template even if the combining rule is known. Also, when we need to make new changeable face template for a person, we change the re-ordering rule for the person and make a new feature vector for the person. Therefore, the security and privacy in biometric system can be enhanced by using the proposed changeable face templates. In our experiments, we analyze the proposed method with respect to performance and security using an AR-face database.
Keywords
Changeable Biometrics; Face Recognition; Security and privacy concerns;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A.B.J. Teoh, and D.C.L. Ngo, 'Cancellable biometrics featuring with tokenized random number,' Pattern Recognition Letter, vol. 26, no. 10, pp. 14541460, 2005   DOI   ScienceOn
2 M. Y. Jung, C. H. Lee, J. S. Kim, J. Y. Chol, and J. H. Kim, 'A Changeable Biometric System for Appearance-Based Face Recognition,' Biometric Consortium Conference (BCC 2006), Baltimore, USA, 2006
3 M. S. Bartlett, J. R. Movellan, and T. J. Sejnowski, 'Face Recognition by Independent Component Analysis,' IEEE Trans. Neural Networks, vol. 13, no. 6, pp. 1450-1464, 2002   DOI   ScienceOn
4 A.M. Martinez and R. Benavente, 'The AR Face Database,' CVC Tech, 1998
5 D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, New York, 2003v
6 A. Kong, K. H. Cheung, D. Zhang, M. Kamel and J. You, 'An analysis of BioHashing and its variants,' Pattern Recognition, In Press, Corrected Proof, Available online, 27 December 2005
7 N. K. Ratha, J. H. Connell, and R. M. Bolle, 'Enhancing security and privacy in biometrics-based authentication systems,' IBM Systems Journal, vol. 40, no. 3, 2001
8 M.A. Turk and A.P. Pentland, 'Eigenfaces for Recognition,' Cognitive Neuroscience, vol. 3, no. 1, pp. 71-86, 1991   DOI   ScienceOn
9 M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla, 'Cancelable Biometric Filters for Face Recognition,' Proceedings of the 17th International Conference on Pattern Recognition, 3, pp. 922-925, Cambridge, UK, 2004
10 C. S. Chin, A.B.J. Teoh, and D.C.L. Ngo, 'High security Iris verificationsystem based on random secret integration,' Computer Vision and Image Understanding, vol. 102, Iss. 2, pp. 169-177, 2006   DOI   ScienceOn
11 D. D. Lee and H. S. Seung, 'Learning the parts of objects by non-negative matrix factorization,' Nature, vol. 401, pp. 788-791, 1999   DOI   ScienceOn
12 A.B.J. Teoh, D.C.L. Ngo, and A. Goh, 'BioHashing: two factor authentication featuring fingerprint data and tokenised random number,' Pattern Recognition, vol. 37, pp. 22452255, November, 2004   DOI   ScienceOn
13 J. N. Kang, D. H. Nyang and K. H. Lee, 'Two Factor Face Authentication Scheme with Cancelable Feature,' Lecture notes in Computer Science 3781, pp.67-76, Oct. 2005
14 Y.H. Pang, A.B. J Teoh, and D.C.L. Ngo, 'Palmprint based cancelable biometric authentication system,' International Journal of Signal Processing, vol. 1, no. 2, pp. 98-104, 2004
15 R. M. Bolle, J.H. Connel, and N.K. Ratha, 'Biometrics Perils and Patches,' Pattern Recognition, vol. 35, pp. 2727-2738, 2002   DOI   ScienceOn
16 A.B.J. Teoh, D.C.L. Ngo, and A. Goh, 'Personalised cryptographic key generation based on FaceHashing,' Computers and Security, vol. 23, no. 7, pp. 606-614, 2004   DOI   ScienceOn
17 T. Connie, A. Teoh, M. Goh, and D. Ngo, 'PalmHashing: a novel approach for dual-factor authentication,' Pattern Analysis and Applications, vol. 7, no. 3, pp. 255 268, 2004   DOI
18 A. Hyvarinen and E. Oja, 'Independent component analysis: a tutorial,' http://www.cis.hut.fi/~aapo/papers/IJCNN99_tutori alweb/, 1999
19 R. Ang. R.Safavi-Naini, and L.McAven, 'Cancelable Key-Based Fingerprint Templates,' Information Security and Privacy: 10th Australasian Conference, ACISP, pp. 242-252, Brisbane, Australia, 2005