Extracting biometric binary strings with minimal area under the FRR curve for the hamming distance classifier

被引:13
作者
Chen, C. [1 ]
Veldhuis, R. [1 ]
机构
[1] Univ Twente, Dept Elect Engn Math & Comp Sci, NL-7500 AE Enschede, Netherlands
关键词
Area under the FRR curve; Hamming distance classifier; Quantization; Bit allocation; Biometric compression and protection; Dynamic programming; Fingerprint and face recognition; FUZZY VAULT;
D O I
10.1016/j.sigpro.2010.09.008
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Extracting binary strings from real-valued biometric templates is a fundamental step in template compression and protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch and helper data systems. Quantization and coding are the straightforward way to extract binary representations from arbitrary real-valued biometric modalities. Afterwards, the binary strings can be compared by means of a Hamming distance classifier (HDC). One of the problems of the binary biometric representations is the allocation of quantization bits to the features. In this paper, we first give a theoretical model of the HOC, based on the features' bit error probabilities after the quantization. This model predicts the false acceptance rate (FAR) and the false rejection rate (FRR) as a function of the Hamming distance threshold. Additionally, we propose the area under the FRR curve optimized bit allocation (AUF-OBA) principle. Given the features' bit error probabilities, AUF-OBA assigns variable numbers of quantization bits to features, in such way that the analytical area under the FRR curve for the HDC is minimized. Experiments of AUF-OBA on the FVC2000 fingerprint database and the FRGC face database yield good verification performances. AUF-OBA is applicable to arbitrary biometric modalities, such as fingerprint texture, iris, signature and face. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:906 / 918
页数:13
相关论文
共 40 条
  • [1] [Anonymous], CVPR
  • [2] [Anonymous], INFORM MANAGEMENT CO
  • [3] [Anonymous], Probability, Random Variables and Stochastic Processes
  • [4] [Anonymous], 1973, Pattern Classification and Scene Analysis
  • [5] [Anonymous], 2007, P 2 ACM S INF COMP C, DOI DOI 10.1145/1229285.1229325
  • [6] Chang EC, 2007, LECT NOTES COMPUT SC, V4642, P750
  • [7] Biometrics-based cryptographic key generation
    Chang, YJ
    Zhang, WD
    Chen, TS
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 2203 - 2206
  • [8] CHEN C, 2009, 17 EUR SIGN PROC C E
  • [9] CHEN C, 2007, P IEEE C BIOM THEOR
  • [10] PalmHashing: a novel approach for dual-factor authentication
    Connie, T
    Teoh, A
    Goh, M
    Ngo, D
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2004, 7 (03) : 255 - 268