A Biometric Key Generation Method Based on Semisupervised Data Clustering

被引:28
作者
Sheng, Weiguo [1 ]
Chen, Shengyong [1 ]
Xiao, Gang [1 ]
Mao, Jiafa [1 ]
Zheng, Yujun [1 ]
机构
[1] Zhejiang Univ Technol, Hangzhou 310023, Zhejiang, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2015年 / 45卷 / 09期
基金
中国国家自然科学基金;
关键词
Biometric authentication; feature evaluation; handwritten signature; memetic algorithm; semisupervised clustering; TEMPLATES; FUSION; SCHEME;
D O I
10.1109/TSMC.2015.2389768
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Storing biometric templates and/or encryption keys, as adopted in traditional biometrics-based authentication methods, has raised a matter of serious concern. To address such a concern, biometric key generation, which derives encryption keys directly from statistical features of biometric data, has emerged to be a promising approach. Existing methods of this approach, however, are generally unable to appropriately model user variations, making them difficult to produce consistent and discriminative keys of high entropy for authentication purposes. This paper develops a semisupervised clustering scheme, which is optimized through a niching memetic algorithm, to effectively and simultaneously model both intra- and interuser variations. The developed scheme is employed to model the user variations on both single features and feature subsets with the purpose of recovering a large number of consistent and discriminative feature elements for key generation. Moreover, the scheme is designed to output a large number of clusters, thus further assisting in producing long while consistent and discriminative keys. Based on this scheme, a biometric key generation method is finally proposed. The performance of the proposed method has been evaluated on the biometric modality of handwritten signatures and compared with existing methods. The results show that our method can deliver consistent and discriminative keys of high entropy, outperforming-related methods.
引用
收藏
页码:1205 / 1217
页数:13
相关论文
共 76 条
  • [1] Adams J, 2012, TRANS DISTRIB CONF
  • [2] [Anonymous], P 2 INT C BIOM THEOR
  • [3] [Anonymous], COMPUTER
  • [4] [Anonymous], 2024, P INT SCI CONFERENCE
  • [5] [Anonymous], 1991, F GENETIC ALGORITHMS
  • [6] [Anonymous], P 3 COST 274 WORKSH
  • [7] [Anonymous], 2008, ETHICAL LEGAL SOCIAL
  • [8] An extensive comparative study of cluster validity indices
    Arbelaitz, Olatz
    Gurrutxaga, Ibai
    Muguerza, Javier
    Perez, Jesus M.
    Perona, Inigo
    [J]. PATTERN RECOGNITION, 2013, 46 (01) : 243 - 256
  • [9] Biometric Template Protection Using Universal Background Models: An Application to Online Signature
    Argones Rua, Enrique
    Maiorana, Emanuele
    Alba Castro, Jose Luis
    Campisi, Patrizio
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 269 - 282
  • [10] Back T., 1996, Evolutionary Algorithms in Theory and Practice: Evolution Strategies, Evolutionary Programming, Genetic Algorithms