Browse > Article
http://dx.doi.org/10.3837/tiis.2011.02.008

Discriminative and Non-User Specific Binary Biometric Representation via Linearly-Separable SubCode Encoding-based Discretization  

Lim, Meng-Hui (School of Electrical and Electronic Engineering, College of Engineering, Yonsei University)
Teoh, Andrew Beng Jin (School of Electrical and Electronic Engineering, College of Engineering, Yonsei University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.5, no.2, 2011 , pp. 374-388 More about this Journal
Abstract
Biometric discretization is a process of transforming continuous biometric features of an identity into a binary bit string. This paper mainly focuses on improving the global discretization method - a discretization method that does not base on information specific to each user in bitstring extraction, which appears to be important in applications that prioritize strong security provision and strong privacy protection. In particular, we demonstrate how the actual performance of a global discretization could further be improved by embedding a global discriminative feature selection method and a Linearly Separable Subcode-based encoding technique. In addition, we examine a number of discriminative feature selection measures that can reliably be used for such discretization. Lastly, encouraging empirical results vindicate the feasibility of our approach.
Keywords
Biometric; discretization; quantization; encoding; linearly separable subcode;
Citations & Related Records

Times Cited By Web Of Science : 1  (Related Records In Web of Science)
Times Cited By SCOPUS : 1
연도 인용수 순위
  • Reference
1 W.K. Yip, A. Goh, D.C.L. Ngo and A.B.J. Teoh, "Generation of replaceable cryptographic keys from dynamic handwritten signatures," in Proc. of 1st International Conference on Biometrics, Lecture Notes in Computer Science, vol. 3832, pp. 509-515, 2006.
2 A.B.J. Teoh, D.C.L. Ngo and A. Goh, "Personalised cryptographic key generation based on FaceHashing," Computers and Security, vol. 23, no. 7, pp. 606-614, 2004.   DOI
3 A.B.J. Teoh, W.K. Yip and K.-A. Toh, "Cancellable biometrics and user-dependent multi-state discretization in BioHash," Pattern Analysis & Applications, vol. 13, no. 3, pp. 301-307, 2009.
4 M. Turk and A. Pentland, "Eigenfaces for Recognition", Journal of Cognitive, Neuroscience, vol. 3, no. 1, pp. 71-86, 1991.   DOI
5 P. Tuyls, A.H.M. Akkermans, T.A.M. Kevenaar, G.-J. Schrijen, A.M. Bazen and N.J. Veldhuis, "Practical biometric authentication with template protection," in Proc. of 5th International Conference on Audio- and Video-based Biometric Person Authentication, LNCS, vol. 3546, pp. 436-446, 2005.
6 E. Verbitskiy, P. Tuyls, D. Denteneer and J.P. Linnartz, "Reliable biometric authentication with privacy protection," in Proc. of 24th Benelux Symposium on Information Theory, pp. 125-132, 2003.
7 A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in Proc. of 6th ACM Conference in Computer and Communication Security (CCS'99), pp. 28-36, 1999.
8 T.A.M. Kevenaar, G.J. Schrijen, M. van der Veen, A.H.M. Akkermans and F. Zuo, "Face recognition with renewable and privacy preserving binary templates," in Proc. of 4th IEEE Workshop on Automatic Identification Advanced Technologies (AutoID '05), pp. 21-26, 2005.
9 M.-H. Lim and A.B.J. Teoh, "Linearly separable subcode: A novel output label with high separability for biometric discretization," in Proc. of 5th IEEE Conference on Industrial Electronics and Applications (ICIEA'10), pp. 290 - 294, 2010.
10 J.-P. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," in Proc. of 4th International Conference on Audio and Video Based Perso Authentication (AVBPA 2004), LNCS, vol. 2688, pp. 238-250, 2003.
11 A.M. Martinez and R. Benavente, "The AR Face Database," CVC Technical Report # 24, 1998.
12 C. Chen, R. Veldhuis, T. Kevenaar and A. Akkermans, "Biometric quantization through detection rate optimized bit allocation," EURASIP Journal on Advances in Signal Processing, Article ID 784834, 16 pages, 2009.
13 F. Monrose, M.K. Reiter, Q. Li and S. Wetzel, "Cryptographic key generation from voice," in Proc. of IEEE Symposium on Security and Privacy (S&P 2001), pp. 202-213, 2001.
14 F. Monrose, M.K. Reiter, Q. Li and S. Wetzel, "Using voice to generate cryptographic keys," Odyssey 2001, The Speaker Verification Workshop, 2001.
15 A.B.J. Teoh, K.-A. Toh and W.K. Yip, "2$^{\wedge}$N discretisation of biophasor in cancellable biometrics," in Proc. of 2nd International Conference on Biometrics (ICB 2007), Lecture Notes in Computer Science, vol. 4642, pp. 435-444, 2007.
16 Y. Dodis, R. Ostrovsky, L. Reyzin and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," Eurocrypt 2004, LNCS, vol. 3027, pp. 523-540, 2004.
17 F. Gray, "Pulse code communications," U.S. Patent 2632058, 1953.
18 P.N, Belhumeur, J.P. Kriegman and D.J. Kriegman, "Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 711-720, 1997.   DOI
19 F. Han, J. Hu, L. He and Y. Wang, "Generation of reliable PINs from fingerprints," in Proc. of IEEE International Conference on Communications (ICC '07), pp. 1191-1196, 2007.
20 F. Hao and C.W. Chan, "Private key generation from on-line handwritten signatures," Information Management & Computer Security, vol. 10, no. 4, pp. 159-164, 2002.   DOI
21 C. Chen, R. Veldhuis, T. Kevenaar and A. Akkermans, "Multi-bits biometric string generation based on the likelihood ratio," in Proc. of IEEE International Conference on Multimedia and Expo (ICME 2004), vol. 3, pp. 2203-2206, 2004.
22 Y. Chang, W. Zhang and T. Chen, "Biometric-based cryptographic key generation," in Proc. of IEEE International Conference on Multimedia and Expo (ICME 2004), 2004.