Privacy-preserving and tokenless chaotic revocable face authentication scheme

被引:0
作者
Muhammad Khurram Khan
Khaled Alghathbar
Jiashu Zhang
机构
[1] King Saud University,Center of Excellence in Information Assurance (CoEIA)
[2] King Saud University,Information Systems Department, College of Computer and Information Sciences
[3] Southwest Jiaotong University,Sichuan Key Lab of Signal & Information Processing
来源
Telecommunication Systems | 2011年 / 47卷
关键词
Face; Biometrics; Chaos; Authentication; FaceHash; Security; Privacy;
D O I
暂无
中图分类号
学科分类号
摘要
With the large-scale proliferation of biometric systems, privacy and irrevocability issues of their data have become a hot research issue. Recently, some researchers proposed a couple of schemes to generate BioHash, e.g. PalmHash, however, in this paper, we point out that the previous schemes are costly in terms of computational complexity and possession of USB tokens to generate pseudorandom numbers. To overcome the problems, we propose a novel chaotic FaceHashing scheme which preserves privacy of a biometric user. The presented scheme does not need users to posses USB tokens in generating pseudorandom sequences, which is a cost-effective solution. Besides, our scheme minimizes the system complexity with simple operations to attain the FaceHash. Experimental results show that the proposed scheme is efficient, secure, and revocable in case FaceHash is theft or compromised.
引用
收藏
页码:227 / 234
页数:7
相关论文
共 44 条
[1]  
Jain A. K.(2004)An introduction to biometric recognition IEEE Transactions on Circuits and Systems for Video Technology 14 4-20
[2]  
Ross A.(2004)PalmHashing: a novel approach for dual-factor authentication Pattern Analysis Applications 7 255-268
[3]  
Prabhakar S.(2005)PalmHashing: a novel approach to cancelable biometrics Information Processing Letters 93 1-5
[4]  
Connie T.(2004)BioHashing: two factor authentication featuring fingerprint data and tokenized random number Pattern Recognition 37 2245-2255
[5]  
Teoh T.(2005)Cancellable biometrics featuring with tokenised random number Pattern Recognition Letters 26 1454-1460
[6]  
Goh M.(2005)MultiHashing human authentication featuring biometrics data and tokenised random number: a case study FVC2004 Neurocomputing 69 242-249
[7]  
Ngo D.(2006)Human, authentication featuring signatures and tokenized random numbers Neurocomputing 69 858-861
[8]  
Connie T.(2006)Biometric hash: high confidence face recognition IEEE Transactions on Circuits and Systems for Video Technology 16 771-775
[9]  
Teoh T.(1991)Eignefaces for recognition Journal of Cognitive Neuroscience 3 71-86
[10]  
Goh M.(2001)PCA versus LDA IEEE Transactions on Pattern Analysis and Machine Intelligence 23 228-233