A Hybrid Approach for Generating Secure and Discriminating Face Template

@article{Feng2010AHA,
  title={A Hybrid Approach for Generating Secure and Discriminating Face Template},
  author={Yi C. Feng and Pong Chi Yuen and Anil K. Jain},
  journal={IEEE Transactions on Information Forensics and Security},
  year={2010},
  volume={5},
  pages={103-117}
}
Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store the template in its original form, have been reported in recent years. They can be categorized into two approaches, namely biometric cryptosystem and transform-based. However, most (if not all) algorithms in both approaches offer a trade-off between the template security and matching performance. Moreover, we believe that no… Expand
Securing Biometric Template using a Hybrid Scheme
TLDR
A novel approach which combines two different approaches namely biohashing and fuzzy extractor is proposed which provides security and privacy to the biometric templates and also it provides revocable and non-invertible properties to theBiometric templates. Expand
A Novel Scheme for Generating Secure Face Templates Using BDA
TLDR
The proposed novel scheme enhances the discriminability and recognition accuracy in terms of matching score of the face images for each stage and provides high security against potential attacks namely brute force and smart attacks. Expand
A Novel Approach to Generate Face Biometric Template Using Binary Discriminating Analysis
TLDR
A novel technique for face biometric template generation and protection is proposed to provide security and accuracy in new user enrolment as well as verification process and provides high security. Expand
Non-Invertibility for Random Projection based Biometric Template Protection Scheme
TLDR
This paper introduces a hybrid scheme of biometric template protection using random projection merged with fuzzy commitment and tries to limit their own drawbacks and take full advantages of these techniques at the same time. Expand
Biometric Template Protection Using Spiral Cube: Performance and Security Analysis
TLDR
The objective is to build a non-invertible transformation, based on random projection, which meets the requirements of revocability, diversity, security and performance, and uses the chaotic behavior of logistic map to build the projection vectors using a methodology that makes the construction of the projection matrix depend on the biometric template and its identity. Expand
Securing templates in a face recognition system using Error-Correcting Output Code and chaos theory
TLDR
Experimental results show that the proposed method improves discriminability, as well as privacy and security of the system, compared to the existing face template protection algorithms. Expand
A Novel Approach For Generating Face Template Using Bda
TLDR
The proposed novel technique for face template generation and protection enhances the discriminability and recognition accuracy by 80% in terms of matching score of the face images and provides high security. Expand
Binary Discriminant Analysis for Generating Binary Face Template
  • Yi C. Feng, P. Yuen
  • Computer Science
  • IEEE Transactions on Information Forensics and Security
  • 2012
TLDR
A novel binary discriminant analysis is developed to transform a real-valued template into a binary template and a continuous function based on the perceptron is constructed to optimize binary template discriminability. Expand
A Hybrid Approach to Protect Palmprint Templates
TLDR
A hybrid approach that combines random projection and fuzzy vault to improve the performances at these three points and Palmprint database based experimental results well support the theoretical analyses and demonstrate the effectiveness of proposed hybrid approach. Expand
Masquerade attack on transform-based binary-template protection based on perceptron learning
TLDR
It is proved in this paper that, irrespective of whether the algorithm of transform-based approach is revealed, a synthetic face image can be constructed from the binary template and the stolen token to obtain a highly-probable positive authentication response. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 61 REFERENCES
A hybrid approach for face template protection
Biometric template protection is one of the important issues in deploying a practical biometric system. To tackle this problem, many algorithms have been reported in recent years, most of them beingExpand
Selection of Distinguish Points for Class Distribution Preserving Transform for Biometric Template Protection
TLDR
The proposed scheme transforms a real-value biometric template to a binary string such that the class distribution is preserved and proved mathematically and can preserve the original template discriminant power, but also improve the performance if the original templates is not fully optimized. Expand
Protecting Face Biometric Data on Smartcard with Reed-Solomon Code
  • Yi C. Feng, P. Yuen
  • Computer Science
  • 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06)
  • 2006
TLDR
The proposed method is developed based on the Reed-Solomon codes, with two modifications, and since the dimension of the face feature vector is relatively large, it is found that it will not only affect the performance, but also the security of the encoding algorithm. Expand
Securing Fingerprint Template: Fuzzy Vault with Helper Data
  • U. Uludag, Anil K. Jain
  • Computer Science
  • 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06)
  • 2006
TLDR
This paper presents an implementation of the fuzzy fingerprint vault based on orientation field based helper data that is automatically extracted from the fingerprints and shows that this helper data does not leak any information about fingerprint minutiae, hence complementing the increased user privacy afforded by the fuzzy fingerprints vault. Expand
Biometric Key Binding: Fuzzy Vault Based on Iris Images
TLDR
This work proposes a new method of applying iris data to the fuzzy vault using the iris feature extraction algorithm based on ICA (Independent Component Analysis), and introduces a pattern clustering method for extracting iris features. Expand
Combining cryptography with biometrics effectively
TLDR
The first practical and secure way to integrate the iris biometric into cryptographic applications is proposed, and an error-free key can be reproduced reliably from genuine iris codes with a 99.5% success rate. Expand
Biometric cryptosystems: issues and challenges
TLDR
This work presents various methods that monolithically bind a cryptographic key with the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication. Expand
Biometric Template Security
TLDR
This work presents a high-level categorization of the various vulnerabilities of a biometric system and discusses countermeasures that have been proposed to address these vulnerabilities. Expand
Class-Distribution Preserving Transform for Face Biometric Data Security
  • Yi C. Feng, P. Yuen
  • Computer Science
  • 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07
  • 2007
TLDR
A new class-distribution preserving transform to biometric cryptosystems is introduced to transform a real value face feature vector to a binary feature vector using a random points set. Expand
Privacy & Security Issues Related to Match Scores
TLDR
It is shown that even match scores carries sufficient information for reconstruction of the original face templates, and a novel non-iterative scheme to reconstruct face templates from match scores is proposed. Expand
...
1
2
3
4
5
...