Browse > Article
http://dx.doi.org/10.5391/JKIIS.2013.23.2.113

Real Fuzzy Vault for Protecting Face Template  

Lee, Dae-Jong (School of Electronics Engineering, Chugbuk National University)
Song, Chang-Kyu (School of Electronics Engineering, Chugbuk National University)
Park, Sung-Moo (Department of Electricity, Hong Seong Campus, Korea Polytechnic College)
Chun, Myung-Geun (School of Electronics Engineering, Chugbuk National University)
Publication Information
Journal of the Korean Institute of Intelligent Systems / v.23, no.2, 2013 , pp. 113-119 More about this Journal
Abstract
Face recognition techniques have been widely used for various areas including criminal identification due to their capability of easy implementing and user friendly interface. However, they have some drawbacks related to individual's privacy in case that his or her face information is divulged to illegal users. So, this paper proposed a novel method for protecting face template based on the real fuzzy vault. This proposed method has some advantages of regenerating a new face template when a registered face template is disclosed. Through implementing and testing the proposed method, we showed its validity and usefulness.
Keywords
Fuzzy Vault; RN-ECC; Face Verification; Biometrics;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 M. K. Muhammad, N. Marsono, Rabia Bakhteri. "Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm," Future Generation Computer Systems, Vol. 29, No. 3, pp. 800-810, 2013.   DOI   ScienceOn
2 A. Marinoa, F. H. Alvarezb, L. H. Encinasb, "A crypto-biometric scheme based on iris-templates with fuzzy extractors," Information Sciences, Vol. 195, 15, pp. 91-102, 2012.   DOI   ScienceOn
3 E. C. Chang and S. Roy, "Robust Extraction of Secret Bits From Minutiae," Proceedings of Second International Conference on Biometrics, pp. 750-759, 2007,
4 Dae Jong Lee, Yong-Nyuo Shin, Seon-Hong Park, Myung-Geun Chun, "RN-ECC Based Fuzzy Vault for Protecting Fingerprint Templates," International Journal of Fuzzy Logic and Intelligent Systems, vol. 11. no. 4, pp. 286-292, 2011.   과학기술학회마을   DOI   ScienceOn
5 Juels A and Sudan M, "A fuzzy vault scheme," Proceeding of IEEE Int. Symposium on Information Theory, pp. 408, 2002.
6 P. Li, X. Yang, K. Cao, X. Tao, R. Wang, and J. Tian, "An alignment-free fingerprint cryptosystem based on fuzzy vault scheme," Journal of Network and Computer Applications, Vol. 33, No. 3, pp. 207-220, 2010.   DOI   ScienceOn
7 Y. Wang and K. N. Plataniotis, "fuzzy vault for face based cryptographic key generation," Proceedings of Biometrics Symposium, pp. 1-6, 2007.
8 F. Thomas, Z. Xuebing, and B. Christoph, "Fuzzy Vault for 3D face recognition systems," Int. Conf. on Intelligent information hiding and multimedia signal processing, pp. 1069-1074, 2008.
9 K. Moon, Error Correcting Code: Mathematical Methods and Algorithm, Wiley-Interscience, 2005
10 T. Marshall, "Coding of real-number sequences for error correction: a digital signal processing problem," IEEE Journal of Selected Areas in Communication, Vol. 2, No. 2, pp. 381-392, 1984.   DOI
11 A. Kumar and A. Makur, "Improved coding-theoretic and subspace-based decoding algorithms for a wider class of DCT and DST codes", IEEE Trans. on Signal Processing, Vol. 58, No. 2, pp. 695-708, 2010.   DOI   ScienceOn
12 M. Turk, A. Pentland, "Face recognition using eigenfaces", Proc. IEEE Conf. On Computer Vision and Pattern Recognition, pp. 586-591, 1991.
13 ORL face database, http://www.uk.research.att.com/facedatabase.html
14 L. Yiun Joo, P. Kang Ryong, L. Sung Joo, B. Kwanghyuk, K. Jaihie, "A new method for generating an invariant iris private key based on the fuzzy vault system," IEEE Trans. on System, Man, Cybernetics, Vol. 38, No. 5, pp.1302-1313, 2008.   DOI   ScienceOn
15 A. B. J. Teoh, Y. W. Kuan, S. LEE, "Cancellable Biometrics and Annotations on BioHash," Pattern Recognition, Vol. 41, No. 6, pp.2034-2044, 2008.   DOI   ScienceOn