Biometric Quantization through Detection Rate Optimized Bit Allocation

被引:34
作者
Chen, C. [1 ]
Veldhuis, R. N. J. [1 ]
Kevenaar, T. A. M. [2 ]
Akkermans, A. H. M. [2 ]
机构
[1] Univ Twente, Signals & Syst Grp, Fac Elect Engn, NL-7500 AE Enschede, Netherlands
[2] Philips Res, NL-5656 AE Eindhoven, Netherlands
关键词
Detection Rate; Rate Optimize; Binary String; Discriminative Feature; Face Database;
D O I
10.1155/2009/784834
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for each single feature component, yet the binary string-concatenation of all coded feature components-is not optimal. In this paper, we present a detection rate optimized bit allocation (DROBA) principle, which assigns more bits to discriminative features and fewer bits to nondiscriminative features. We further propose a dynamic programming (DP) approach and a greedy search (GS) approach to achieve DROBA. Experiments of DROBA on the FVC2000 fingerprint database and the FRGC face database show good performances. As a universal method, DROBA is applicable to arbitrary biometric modalities, such as fingerprint texture, iris, signature, and face. DROBA will bring significant benefits not only to the template protection systems but also to the systems with fast matching requirements or constrained storage capability. Copyright (C) 2009 C. Chen et al.
引用
收藏
页数:16
相关论文
共 21 条
[1]  
[Anonymous], 2005, PROC CVPR IEEE, DOI DOI 10.1109/CVPR.2005.268
[2]  
[Anonymous], INFORM MANAGEMENT CO
[3]  
[Anonymous], 2007, P 2 ACM S INF COMP C, DOI DOI 10.1145/1229285.1229325
[4]   Likelihood-ratio-based biometric verification [J].
Bazen, AM ;
Veldhuis, RNJ .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004, 14 (01) :86-94
[5]  
Chang EC, 2007, LECT NOTES COMPUT SC, V4642, P750
[6]   Biometrics-based cryptographic key generation [J].
Chang, YJ ;
Zhang, WD ;
Chen, TS .
2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, :2203-2206
[7]  
Chen C.L., 2007, International Conference on Intelligent Systems Applications to Power Systems (ISAP), IEEE, Toki Messe, Niigata, P1, DOI [DOI 10.1109/HPSR.2007.4281233, 10.1109/HICSS.2007.298, DOI 10.1109/HICSS.2007.298]
[8]  
Cormen T.H., 2001, Introduction To Algorithms, Vsecond
[9]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[10]   Combining crypto with biometrics effectively [J].
Hao, Feng ;
Anderson, Ross ;
Daugman, John .
IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (09) :1081-1088