Browse > Article

A Study on A Biometric Bits Extraction Method Using Subpattern-based PCA and A Helper Data  

Lee, Hyung-Gu (Yonsei University, Biometric Engineering Research Center)
Jung, Ho-Gi (Yonsei University, Biometric Engineering Research Center)
Publication Information
Abstract
Unique and invariant biometric characteristics have been used for secure user authentication. Storing original biometric data is not acceptable due to privacy and security concerns of biometric technology. In order to enhance the security of the biometric data, the cancelable biometrics was introduced. Using revocable and non-invertible transformation, the cancelable biometrics can provide a way of more secure biometric authentication. In this paper, we present a new cancelable bits extraction method for the facial data. For the feature extraction, the Subpattern-based Principle Component Analysis (PCA) is adopted. The Subpattern-based PCA divides a whole image into a set of partitioned subpatterns and extracts principle components from each subpattern area. The feature extracted by using Subpattern-based PCA is discretized with a helper data based method. The elements of the obtained bits are evaluated and ordered according to a measure based on the fisher criterion. Finally, the most discriminative bits are chosen as the biometric bits string and used for authentication of each identity. Even if the generated bits string is compromised, new bits string can be generated simply by changing the helper data. Because, the helper data utilizes partial information of the feature, the proposed method does not reveal privacy sensitive biometric information of the user. For a security evaluation of the proposed method, a scenario in which the helper is compromised by an adversary is also considered.
Keywords
Biometric bits string extraction; cancelable biometrics; Subpattern-based PCA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Chen and Y. Zhu, "Subpattern-based Principle component analysis," Pattern Recognition, vol 37, no 5, pp 1081-1083, 2004   DOI   ScienceOn
2 J. Daugman, "The Importance of Being Random: Statistical Principles of Iris Recognition," Pattern Recognition, vol. 36, no. 2, pp. 279-291, 2003.   DOI   ScienceOn
3 Brian Chen and Gregory W. Wornell, " Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding," IEEE Trans. on Information Theory, vol. 47, no. 4, pp. 1423-1443, 2001.   DOI   ScienceOn
4 Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar, "Biometric template security," EURASIP Journal on Advances in Signal Processing, vol. 2008, no. 113, 2008.
5 T. Sim, S. Baker, and M. Bsat, "The CMU Pose, Illumination, and Expression Database," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 12, 2003.
6 Qi Han, Zhifang Wang, and Xiamu Niu, "A Non-uniform Quantizing Approach to Protect Biometric Templates," International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP '06., pp. 693-698, 2006.
7 Andrew Teoh, David Ngo and Alwyn Goh, "Biohashing: Two Factor Authentication Featuring Fingerprint Data And Tokenised Random Number," Pattern Recognition, Vol. 37, Issue 11, pp. 2245-2255, 2004.   DOI   ScienceOn
8 Andrew B. J. Teoh, Yip Wai Kuan, and Sangyoun Lee, "Cancellable biometrics and annotations on BioHash," Pattern Recognition, Vol. 41 , Issue 6, pp. 2034-2044, 2008.   DOI   ScienceOn
9 Andrew B.J. Teoh, Alwyn Goh, and David C.L. Ngo, "Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs," IEEE transactions on a Pattern Analysis and Machine Intelligence, vol. 28, no. 12, 2006.
10 Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, and Raymond N. J. Veldhuis, "Practical Biometric Authentication with Template Protection," International conference on: Audio- and Video-Based Biometric Person Authentication. AVBPA, Vol. 3546, pp. 436-446, 2005.
11 Chen C., Veldhuis R.N.J., Kevenaar T.A.M., and Akkermans A.H.M., "Multi-Bits Biometric String Generation based on the Likelihood Ratio," First IEEE International Conference on Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007., 2007.
12 N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometricsbased authentication systems," IBM systems Journal, vol. 40, pp. 614-634, 2001.   DOI
13 Chen C., Veldhuis R.N.J., Kevenaar T.A.M., and Akkermans A.H.M., "Biometric Quantization through Detection Rate Optimized Bit Allocation," EURASIP Journal on Advances in Signal Processing, vol. 2009, 2009.
14 Jean-paul Linnartz and Pim Tuyls, "New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates," AVBPA, pp. 393-402, 2003.
15 C. Vielhauer and R. Steinmetz, "Handwriting: feature correlation analysis for biometric hashes," EURASIP Journal on Applied Signal Processing, vol. 2004, no. 4, pp. 542-558, special issue on Biometric Signal Processing, 2004.   DOI   ScienceOn