One-Factor Cancellable Fingerprint Template Protection Based on Index Self-Encoding

被引:0
作者
Feng, Yalan [1 ]
Wang, Huabin [1 ]
Zhang, Dailei [1 ]
Li, Jiahao [1 ]
Tao, Liang [1 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Anhui Prov Key Lab Multimodal Cognit Computat, Hefei, Peoples R China
基金
中国国家自然科学基金;
关键词
Binary; Biometrics; Encoded Key; Hash Function; Performance; Privacy; Recognition; Revocability; Security; XOR; CANCELABLE BIOMETRICS; FRAMEWORK; SECURITY; PRIVACY;
D O I
10.4018/JDM.321546
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existing one-factor cancellable biometrics algorithms generally require random sequences to reorder the biometrics, which reduces the discrimination of the transformed biometrics. Some algorithms hide and transmit the random sequence by XORing the random sequence with original biometrics, which may cause the leakage of the original biometrics. Therefore, this paper proposes a one-factor cancellable fingerprint template protection based on index self-encoding. First, the integer sequence generated by the hash function is used as the index. The random sequence is automatically encoded directly by the index value, and the generated binary sequence retains the original biological characteristics to the greatest extent. Second, self-encoding binary sequence and random binary sequence are XORed to obtain the encoded key without directly storing binary factor sequences. Experiments are implemented on the fingerprint database of FVC2002 and FVC2004, the results show that the recognition rate is enhanced; meanwhile, it fits the design criteria of cancellable biometrics.
引用
收藏
页数:18
相关论文
共 33 条
[1]  
Abe N., 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), P1, DOI DOI 10.1109/BTAS.2015.7358770
[2]   An improved method of locality-sensitive hashing for scalable instance matching [J].
Aydar, Mehmet ;
Ayvaz, Serkan .
KNOWLEDGE AND INFORMATION SYSTEMS, 2019, 58 (02) :275-294
[3]   Biometric perils and patches [J].
Bolle, RM ;
Connell, JH ;
Ratha, NK .
PATTERN RECOGNITION, 2002, 35 (12) :2727-2738
[4]   Performance evaluation of fingerprint verification systems [J].
Cappelli, R ;
Maio, D ;
Maltoni, D ;
Wayman, JL ;
Jain, AK .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2006, 28 (01) :3-18
[5]   Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition [J].
Cappelli, Raffaele ;
Ferrara, Matteo ;
Maltoni, Davide .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2010, 32 (12) :2128-2141
[6]  
Charikar M.S., 2002, PROC ACM S THEORY CO, P380, DOI DOI 10.1145/509907.509965
[7]   Histograms of oriented gradients for human detection [J].
Dalal, N ;
Triggs, B .
2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, :886-893
[8]   Random Forest Algorithm Based on Linear Privacy Budget Allocation [J].
Dong, Yanling ;
Zhang, Shufen ;
Xu, Jingcheng ;
Wang, Haoshi ;
Liu, Jiqiang .
JOURNAL OF DATABASE MANAGEMENT, 2022, 33 (02)
[9]   General Framework to Evaluate Unlinkability in Biometric Template Protection Systems [J].
Gomez-Barrero, Marta ;
Galbally, Javier ;
Rathgeb, Christian ;
Busch, Christoph .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) :1406-1420
[10]   Biometric template security [J].
Jain, Anil K. ;
Nandakumar, Karthik ;
Nagar, Abhishek .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008, 2008