Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications

被引:18
作者
Bui, Francis Minhthang [1 ]
Martin, Karl [1 ]
Lu, Haiping [1 ]
Plataniotis, Konstantinos N. [1 ]
Hatzinakos, Dimitrios [1 ]
机构
[1] Univ Toronto, Edward S Rogers Sr Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
关键词
Biometric encryption (BE); biometric security and privacy; facial recognition; fuzzy key binding; quantization index modulation (QIM); DIGITAL WATERMARKING;
D O I
10.1109/TIFS.2009.2037662
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Biometric encryption (BE) has recently been identified as a promising paradigm to deliver security and privacy, with unique technical merits and encouraging social implications. An integral component in BE is a key binding method, which is the process of securely combining a signal, containing sensitive information to be protected (i.e., the key), with another signal derived from physiological features (i.e., the biometric). A challenge to this approach is the high degree of noise and variability present in physiological signals. As such, fuzzy methods are needed to enable proper operations, with adequate performance results in terms of false acceptance rate and false rejection rate. In this work, the focus will be on a class of fuzzy key binding methods based on dirty paper coding known as quantization index modulation. While the methods presented are applicable to a wide range of biometric modalities, the face biometric is selected for illustrative purposes, in evaluating the QIM-based solutions for BE systems. Performance evaluation of the investigated methods is reported using data from the CMU PIE face database.
引用
收藏
页码:118 / 132
页数:15
相关论文
共 30 条
  • [1] [Anonymous], 1999, ICSA Guide to Cryptography
  • [2] Buhan I., 2007, TRCTIT0752 U 20 ENSC TRCTIT0752 U 20 ENSC, P1381
  • [3] Buhan I. R., 2008, 16 EUR SIGN PROC C E
  • [4] BUI FM, 2008, P AS C SIGN SYST COM, P1363
  • [5] Busch Christoph, 2008, Proceedings of the 2008 International Conference on Security & Management (SAM 2008), P350
  • [6] Cavoukian A., 2007, Biometric encryption: a positive-sum technol- ogy that achieves strong authentication, security and privacy
  • [7] Quantization index modulation methods for digital watermarking and information embedding of multimedia
    Chen, B
    Wornell, GW
    [J]. JOURNAL OF VLSI SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2001, 27 (1-2): : 7 - 33
  • [8] Dither modulation: a new approach to digital watermarking and information embedding
    Chen, B
    Wornell, GW
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 : 342 - 353
  • [9] CHEN C, 2008, P COMP VIS PATT REC, P23
  • [10] Chen C.L., 2007, International Conference on Intelligent Systems Applications to Power Systems (ISAP), IEEE, Toki Messe, Niigata, P1, DOI [DOI 10.1109/HPSR.2007.4281233, 10.1109/HICSS.2007.298, DOI 10.1109/HICSS.2007.298]