Image-based facial recognition in the domain of high-order polynomial one-way mapping

@article{Dabbah2008ImagebasedFR,
  title={Image-based facial recognition in the domain of high-order polynomial one-way mapping},
  author={Mohammad A. Dabbah and Wai lok Woo and Satnam Singh Dlay},
  journal={Iet Image Processing},
  year={2008},
  volume={2},
  pages={139-149}
}
The authors present a secure facial recognition system. The biometric data are transformed to the cancellable domain using high-order polynomial functions and co-occurrence matrices. The proposed method has provided both high-recognition accuracy and biometric data protection. Protection of data relies on the polynomial functions, where the new reissued cancellable biometric can be obtained by changing the polynomial parameters. Besides the protection of data, the reconstructed co-occurrence… 
3 Citations

Figures and Tables from this paper

A New Approach to Predicting Physical Biometrics from Behavioural Biometrics
TLDR
A relationship between face and signature biometrics is established and the performance efficiencies of the new technique are demonstrated in terms of minimum error rates compared to published work.
Fingerprint Template Protection using Compact Minutiae Patterns
TLDR
This thesis is for research or private study purposes only, and the author's right to be identified as the author of this thesis is recognised.
Monitoring of high-power fiber laser welding based on principal component analysis of a molten pool configuration
There exists plenty of welding quality information on a molten pool during high-power fiber laser welding. An approach for monitoring the high-power fiber laser welding status based on the principal

References

SHOWING 1-10 OF 33 REFERENCES
Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault
TLDR
Based on the preliminary experimental results, it is confirmed that the proposed approach can align fingerprint features automatically in the domain of the fuzzy vault and can be integrated with any fuzzy fingerprint vault systems.
How to protect biometric templates
TLDR
This paper examines and shows how to apply a recently proposed secure sketch scheme in order to protect the biometric templates and studies the trade-off between the performance of the scheme and the bound of the entropy loss from the secure sketch.
A Non-uniform Quantizing Approach to Protect Biometric Templates
  • Q. Han, Zhifang Wang, X. Niu
  • Computer Science
    2006 International Conference on Intelligent Information Hiding and Multimedia
  • 2006
TLDR
A novel methodology to achieve the security of the biometric templates in biometric systems is proposed using an adaptive non-uniform quantization (ANUQ) algorithm to eliminate the contradiction between the fuzziness of theBiometric information and the sensitive of the Hash function.
Biometric perils and patches
Cryptographic Key Generation from Biometric Data Using Lattice Mapping
TLDR
The proposed lattice mapping based fuzzy commitment method not only outputs high entropy keys, but also conceals the original biometric data such that it is impossible to recover the biometrics even when the stored information in the system is open to an attacker.
Enhancing security and privacy in biometrics-based authentication systems
TLDR
The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection
TLDR
A face recognition algorithm which is insensitive to large variation in lighting direction and facial expression is developed, based on Fisher's linear discriminant and produces well separated classes in a low-dimensional subspace, even under severe variations in lighting and facial expressions.
Eigenfaces for Recognition
TLDR
A near-real-time computer system that can locate and track a subject's head, and then recognize the person by comparing characteristics of the face to those of known individuals, and that is easy to implement using a neural network architecture.
...
...