Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs

被引:277
作者
Teoh, Andrew B. J.
Goh, Alwyn
Ngo, David C. L.
机构
[1] Corentix Technol Sdn Bhd, Petaling Jaya 47301, Selangor, Malaysia
[2] Multimedia Univ, Fac Informat Sci & Technol, Melaka 75450, Malaysia
关键词
cancellable biometrics; BioHashing; random multispace quantization; face recognition;
D O I
10.1109/TPAMI.2006.250
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Biometric analysis for identity verification is becoming a widespread reality. Such implementations necessitate large-scale capture and storage of biometric data, which raises serious issues in terms of data privacy and (if such data is compromised) identity theft. These problems stem from the essential permanence of biometric data, which (unlike secret passwords or physical tokens) cannot be refreshed or reissued if compromised. Our previously presented biometric-hash framework prescribes the integration of external (password or token-derived) randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics (i.e., noninvertibility) comparable to cryptographic ciphers or hashes. The resultant BioHashes are hence cancellable, i.e., straightforwardly revoked and reissued (via refreshed password or reissued token) if compromised. BioHashing furthermore enhances recognition effectiveness, which is explained in this paper as arising from the Random Multispace Quantization (RMQ) of biometric and external random inputs.
引用
收藏
页码:1892 / 1901
页数:10
相关论文
共 32 条
[21]  
Monrose F, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P73, DOI 10.1145/319709.319720
[22]   Cryptographic key generation from voice [J].
Monrose, F ;
Reiter, MK ;
Li, Q ;
Wetzel, S .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :202-213
[23]  
NGO CLD, 2004, FRONT VIEW FACIAL FE
[24]   The FERET evaluation methodology for face-recognition algorithms [J].
Phillips, PJ ;
Moon, H ;
Rauss, P ;
Rizvi, SA .
1997 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, PROCEEDINGS, 1997, :137-143
[25]  
Savvides M., 2005, P INT C PATT REC, V3, P922
[26]  
Soutar C., 1999, ICSA Guide to Cryptography, V22, P649
[27]   Cancellable biometerics featuring with tokenised random number [J].
Teoh, ABJ ;
Ngo, DCL .
PATTERN RECOGNITION LETTERS, 2005, 26 (10) :1454-1460
[28]   Personalised cryptographic key generation based on FaceHashing [J].
Teoh, ABJ ;
Ngo, DCL ;
Goh, A .
COMPUTERS & SECURITY, 2004, 23 (07) :606-614
[29]  
Tulyakov S, 2005, LECT NOTES COMPUT SC, V3687, P30
[30]   EIGENFACES FOR RECOGNITION [J].
TURK, M ;
PENTLAND, A .
JOURNAL OF COGNITIVE NEUROSCIENCE, 1991, 3 (01) :71-86