Binary biometric representation through pairwise adaptive phase quantization

被引:10
作者
Chen C. [1 ]
Veldhuis R. [1 ]
机构
[1] Department of Electrical Engineering Mathematics and Computer Science, University of Twente
关键词
Binary String; False Acceptance Rate; False Rejection Rate; Feature Pair; Biometric Template;
D O I
10.1155/2011/543106
中图分类号
学科分类号
摘要
Extracting binary strings from real-valued biometric templates is a fundamental step in template compression and protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Quantization and coding is the straightforward way to extract binary representations from arbitrary real-valued biometric modalities. In this paper, we propose a pairwise adaptive phase quantization (APQ) method, together with a long-short (LS) pairing strategy, which aims to maximize the overall detection rate. Experimental results on the FVC2000 fingerprint and the FRGC face database show reasonably good verification performances. © 2011 Chun Chen and Raymond Veldhuis.
引用
收藏
相关论文
共 26 条
[1]  
Jain A.K., Nandakumar K., Nagar A., Biometric template security, EURASIP Journal on Advances in Signal Processing, 2008, (2008)
[2]  
Ratha N.K., Connell J.H., Bolle R.M., Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, 40, 3, pp. 614-634, (2001)
[3]  
Ratha N.K., Chikkerur S., Connell J.H., Bolle R.M., Generating cancelable fingerprint templates, IEEE Transactions on Pattern Analysis and Machine Intelligence, 29, 4, pp. 561-572, (2007)
[4]  
Juels A., Sudan M., A fuzzy vault scheme, Designs, Codes, and Cryptography, 38, 2, pp. 237-257, (2006)
[5]  
Nandakumar K., Jain A.K., Pankanti S., Fingerprint-based fuzzy vault: Implementation and performance, IEEE Transactions on Information Forensics and Security, 2, 4, pp. 744-757, (2007)
[6]  
Juels A., Wattenberg M., Fuzzy commitment scheme, Proceedings of the 6th ACM Conference on Computer and Communications Security (ACM CCS '99), pp. 28-36
[7]  
Dodis Y., Reyzin L., Smith A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, 3027, pp. 523-540
[8]  
Chang E.C., Roy S., Robust extraction of secret bits from minutiae, Proceedings of the 2nd International Conference on Biometrics (ICB '07), 4642, pp. 750-759, (2007)
[9]  
Linnartz J.-P., Tuyls P., New shielding functions to enhance privacy and prevent misuse of biometrie templates, Proceedings of Audio-and Video-Based Biometrie Person Authentication (AVBPA '03), 2688, pp. 393-402, (2003)
[10]  
Tuyls P., Akkermans A.H.M., Kevenaar T.A.M., Schrijen G.-J., Bazen A.M., Veldhuis R.N.J., Practical biometric authentication with template protection, Proceedings of the 5th International Conference on Audio-and Video-Based Biometric Person Authentication (AVBPA '05), 3546, pp. 436-446