Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.5.1059

A Method for Generating Robust Key from Face Image and User Intervention  

Kim, Hyejin (Inha University)
Choi, JinChun (Inha University)
Jung, Chang-hun (Inha University)
Nyang, DaeHun (Inha University)
Lee, KyungHee (The University of Suwon)
Abstract
Even though BioHashing scheme can effectively extract binary string key from analog biometrics templates, it shows lower performance in stolen-token scenario due to dependency of the token. In this paper, to overcome this limitation, we suggest a new method of generating security key from face image and user intervention. Using BioHashing and GPT schemes, our scheme can adjust dependency of PIN for user authentication and generate robust key with sufficient length. We perform various experiments to show performance of the proposed scheme.
Keywords
biometrics; key generation; cryptography; BioHashing; GPT;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Soo-yeon Lim, "National Innovation Trend: FinTech" Science & Technology Policy Periodicals, No. 210, pp. 14-21, Jan. 2016
2 Seon-Jong Kim, "A Method to support possession and biometric authentication using public certificate in smartphone environment," Review of Korea Institute of Information Security and Cryptography, vol. 25, no. 6, pp. 13-17, Dec. 2015.
3 Jian Yang, D. Zhang, A.F. Frangi and Jing-yu Yang, "Two-Dimensional PCA: A New Approach to Appearance-Based Face Representation and Recognition," IEEE Transactions on Pattern Analysis and Machine Intelligence Vol. 26(1). pp. 131-137, 2004   DOI
4 D. Zhang, Z. Zhou and S. Chen, "Diagonal principal component analysis for face recognition," Pattern Recognition, vol. 39(1), pp. 140-142, 2006   DOI
5 Jae-Hyun Oh and Nojun Kwak, "A Resampling Method for Small Sample Size Problems in Face Recognition using LDA," Signal processing-Journal of the institute of electronics engineers of Korea, vol. 46(2), pp. 78-88, 2009
6 J. Lu, K.N. Plataniotis and A.N. Venetsanopoulos, "Regularization studies of linear discriminant analysis in small sample size scenarios with application to face recognition,", Pattern Recognition Letters, vol. 26(2), pp. 181-191, 2005   DOI
7 Andrew Teoh Beng Jin, David Ngo Chek Ling and Alwyn Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenised random number," Pattern Recognition, vol. 37(11), pp. 2245-2255, 2004   DOI
8 E. Bingham and H. Mannila, "Random projection in dimensionality reduction: applications to image and text data," Proceddings of seventh ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '01, pp. 245-250, Aug. 2001
9 Hosik Sohn and YongMan Ro, "Privacy analysis of random projection based biometrics template," Conference of The Institute of Electonic Engineers of Korea, pp. 213-214, Nov. 2009
10 A. Goh and D. Ngo, "Computation of Cryptographic Keys from Face Biometrics," IFIP International Conference on Communications and Multimedia Security, vol. 2828, pp. 1-13, 2003
11 M.A. Turk and A.P. Pentland, "Face Recognition Using Eigenfaces," Guide to Cryptography, CVPR'91, pp. 72-86, 1991
12 T.A.M. Kevenaar, G.J. Schrijen, M. Van Der Veen and A.H.M. Akkermans, "Face recognition with renewable and privacy preserving binary templates," Fourth IEEE Workshop on Autmatic Identification Advanced Technologies, AutoID'05, pp. 21-26, Oct. 2005
13 David Ngo, Andrew Beng Jin Teoh and Alwyn Goh, "Biometric hash: High-confidence face recognition," IEEE Transactions on Circuits and Systems for Video Technology, vol. 16(6), pp. 771-775, June 2006   DOI
14 Adams Kong, King-Hong Cheung, David Zhang, Mohammed Kamel and Jane You, "An analysis of BioHashing and its variants," Pattern Recognition, vol. 39(7), pp. 1359-1368, July 2006   DOI
15 Andrew Beng Jin Teoh and Chong Tze Yuang, "Cancelable Biometrics Realization With Multispace Random Projections," IEEE Transactions on System, Man, and Cybernetics, Part B: Cybernetics, vol. 37(5), pp. 1096-1106, 2007   DOI
16 Andrew Beng Jin Teoh, Yip Wai Kuan and Sangyoun Lee, "Cancellable biometrics and annotations on BioHash," Pattern Recognition, vol. 41(6), pp. 2034-2044, 2008   DOI
17 Meng-Hui Lim, Min-Yi Jeong and Andrew Beng Jin Teoh, "A Novel Two-Stage Approach in Rectifying BioHash's Problem under Stolen Token Scenario," Journal of information and communication convergence engineering, vol. 8(2), pp. 173-179, 2010   DOI
18 Jeonil Kang, DaeHun Nyang and KyungHee Lee, "Two Factor Face Authentication Scheme with Cancelable Feature," Journal of the Korea Institute of Information Security and Cryptography, vol. 16(1), pp. 13-21, Feb. 2006
19 Jeonil Kang, DaeHun Nyang, and KyungHee Lee, "Two-factor face authentication using matrix permutation transformation and a user password," Information Sciences, vol. 269, pp. 1-20, June 2014   DOI
20 C. Soutar, D. Roberge, A. Stoianov, R. Gilroy and B.V.K. Vijaya Kumar, "Biometric Encryption using image processing," ICSA Guide to Cryptography, pp. 649-675, 1999
21 M. Savvides, B.V.K. Vijaya Kumar, and P.K. Khosla "Cancelable biometrics filters for face recognition,", Proc. Int. Conf. Pattern Recognition, vol. 3, pp. 922-925, 2004