CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
FVC2000: Fingerprint Verification Competition
IEEE Transactions on Pattern Analysis and Machine Intelligence
Introduction to Algorithms
Biometric Hash based on Statistical Features of Online Signatures
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 1 - Volume 1
Distance measures for PCA-based face recognition
Pattern Recognition Letters
Overview of the Face Recognition Grand Challenge
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 1 - Volume 01
Face Recognition with Renewable and Privacy Preserving Binary Templates
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
IEEE Transactions on Pattern Analysis and Machine Intelligence
Fuzzy extractors for continuous distributions
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Practical biometric authentication with template protection
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Likelihood-ratio-based biometric verification
IEEE Transactions on Circuits and Systems for Video Technology
Robust extraction of secret bits from minutiae
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Pitfall of the detection rate optimized bit allocation within template protection and a remedy
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Fast and Accurate 3D Face Recognition
International Journal of Computer Vision
Electronic Commerce Research and Applications
A secure biometric discretization scheme for face template protection
Future Generation Computer Systems
Biometric cryptosystem based on discretized fingerprint texture descriptors
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for each single feature component, yet the binary string--concatenation of all coded feature components--is not optimal. In this paper, we present a detection rate optimized bit allocation (DROBA) principle, which assigns more bits to discriminative features and fewer bits to nondiscriminative features. We further propose a dynamic programming (DP) approach and a greedy search (GS) approach to achieve DROBA. Experiments of DROBA on the FVC2000 fingerprint database and the FRGC face database show good performances. As a universal method, DROBA is applicable to arbitrary biometric modalities, such as fingerprint texture, iris, signature, and face. DROBA will bring significant benefits not only to the template protection systems but also to the systems with fast matching requirements or constrained storage capability.