Secure authentication for face recognition

被引:20
作者
Dabbah, M. A. [1 ]
Woo, W. L. [1 ]
Dlay, S. S. [1 ]
机构
[1] Newcastle Univ, Sch Elect Elect & Comp Engn, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
来源
2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN IMAGE AND SIGNAL PROCESSING | 2007年
关键词
D O I
10.1109/CIISP.2007.369304
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a new technique to protect the face biometric during recognition, using the so called cancellable biometric. The technique is based on image-based (statistical) face recognition using the 2DPCA algorithm. The biometric data is transformed to its cancellable domain using polynomial functions and co-occurrence matrices. Original facial images are transformed non-linearly by a polynomial function whose parameters can be change accordingly to the issuing version of the secure cancellable template. Co-occurrence matrices are also used in the transform to generate a distinctive feature vector which is used for both security and recognition accuracy. The Hadamard product is used to construct the final cancellable template. It shows high flexibility in proving a new relationship between two independent covariance matrices, which is mathematically proven. The generated cancellable templates are used in the same fashion as the original facial images. The 2DPCA recognition algorithm has been used without any changes; the transformations are applied on the input images only and yet with higher recognition accuracy. Theoretical and experimental results have shown high irreversibility of data with improved accuracy of up to 3% from the original data.
引用
收藏
页码:121 / 126
页数:6
相关论文
共 13 条
[1]  
Acharya T, 2005, IMAGE PROCESSING: PRINCIPLES AND APPLICATIONS, P1, DOI 10.1002/0471745790
[2]  
[Anonymous], 1995, FDN CRYPTOGRAPHY
[3]   Biometric perils and patches [J].
Bolle, RM ;
Connell, JH ;
Ratha, NK .
PATTERN RECOGNITION, 2002, 35 (12) :2727-2738
[4]   HUMAN AND MACHINE RECOGNITION OF FACES - A SURVEY [J].
CHELLAPPA, R ;
WILSON, CL ;
SIROHEY, S .
PROCEEDINGS OF THE IEEE, 1995, 83 (05) :705-740
[5]  
Gonzalez R., 2019, Digital Image Processing, V2nd
[6]  
*OL RES LAB, 1994, OL DAT
[7]   Enhancing security and privacy in biometrics-based authentication systems [J].
Ratha, NK ;
Connell, JH ;
Bolle, RM .
IBM SYSTEMS JOURNAL, 2001, 40 (03) :614-634
[8]   Eigenspace-based face recognition: A comparative study of different approaches [J].
Ruiz-Del-Solar, J ;
Navarrete, P .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2005, 35 (03) :315-325
[9]   Texture as the basis for individual tree identification [J].
Samal, A ;
Brandle, JR ;
Zhang, DS .
INFORMATION SCIENCES, 2006, 176 (05) :565-576
[10]   Cancelable biometric filters for face recognition [J].
Savvides, M ;
Kumar, BVKV ;
Khosla, PK .
PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 3, 2004, :922-925