A Biometric Key Generation Method Based on Semisupervised Data Clustering

被引:28
作者
Sheng, Weiguo [1 ]
Chen, Shengyong [1 ]
Xiao, Gang [1 ]
Mao, Jiafa [1 ]
Zheng, Yujun [1 ]
机构
[1] Zhejiang Univ Technol, Hangzhou 310023, Zhejiang, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2015年 / 45卷 / 09期
基金
中国国家自然科学基金;
关键词
Biometric authentication; feature evaluation; handwritten signature; memetic algorithm; semisupervised clustering; TEMPLATES; FUSION; SCHEME;
D O I
10.1109/TSMC.2015.2389768
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Storing biometric templates and/or encryption keys, as adopted in traditional biometrics-based authentication methods, has raised a matter of serious concern. To address such a concern, biometric key generation, which derives encryption keys directly from statistical features of biometric data, has emerged to be a promising approach. Existing methods of this approach, however, are generally unable to appropriately model user variations, making them difficult to produce consistent and discriminative keys of high entropy for authentication purposes. This paper develops a semisupervised clustering scheme, which is optimized through a niching memetic algorithm, to effectively and simultaneously model both intra- and interuser variations. The developed scheme is employed to model the user variations on both single features and feature subsets with the purpose of recovering a large number of consistent and discriminative feature elements for key generation. Moreover, the scheme is designed to output a large number of clusters, thus further assisting in producing long while consistent and discriminative keys. Based on this scheme, a biometric key generation method is finally proposed. The performance of the proposed method has been evaluated on the biometric modality of handwritten signatures and compared with existing methods. The results show that our method can deliver consistent and discriminative keys of high entropy, outperforming-related methods.
引用
收藏
页码:1205 / 1217
页数:13
相关论文
共 76 条
  • [51] Fingerprint-based fuzzy vault: Implementation and performance
    Nandakumar, Karthik
    Jain, Anil K.
    Pankanti, Sharath
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (04) : 744 - 757
  • [52] Extraction and fusion of partial face features for cancelable identity verification
    Oh, Beom-Seok
    Toh, Kar-Ann
    Choi, Kwontaeg
    Teoh, Andrew Beng Jin
    Kim, Jaihie
    [J]. PATTERN RECOGNITION, 2012, 45 (09) : 3288 - 3303
  • [53] BioEncoding: A Reliable Token less Cancelable Biometrics Scheme for Protecting Iris Codes
    Ouda, Osama
    Tsumura, Norimichi
    Nakaguchi, Toshiya
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (07): : 1878 - 1888
  • [54] ON CLUSTER VALIDITY FOR THE FUZZY C-MEANS MODEL
    PAL, NR
    BEZDEK, JC
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 1995, 3 (03) : 370 - 379
  • [55] Decision Fusion for Multimodal Biometrics Using Social Network Analysis
    Paul, Padma Polash
    Gavrilova, Marina L.
    Alhajj, Reda
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2014, 44 (11): : 1522 - 1533
  • [56] Secure Biometrics [Concepts, authentication architectures, and challenges]
    Rane, Shantanu
    Wang, Ye
    Draper, Stark C.
    Ishwar, Prakash
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (05) : 51 - 64
  • [57] Privacy-Preserving Nearest Neighbor Methods
    Rane, Shantanu
    Boufounos, Petros T.
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 18 - 28
  • [58] Generating cancelable fingerprint templates
    Ratha, Nalini K.
    Chikkerur, Sharat
    Connell, Jonathan H.
    Bolle, Ruud M.
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2007, 29 (04) : 561 - 572
  • [59] A survey on biometric cryptosystems and cancelable biometrics
    Rathgeb C.
    Uhl A.
    [J]. Eurasip Journal on Information Security, 2011, 2011 (1)
  • [60] From template to image: Reconstructing fingerprints from minutiae points
    Ross, Arun
    Shah, Jidnya
    Jain, Anil K.
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2007, 29 (04) : 544 - 560