Flexible images: matching and recognition using learned deformations
Computer Vision and Image Understanding - Special issue on physics-based modeling and reasoning in computer vision
Inside risks: the uses and abuses of biometrics
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Integrated Wavelet and Fourier-Mellin invariant feature in fingerprint verification system
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
An FFT-based technique for translation, rotation, and scale-invariant image registration
IEEE Transactions on Image Processing
An improved BioHashing for human authentication
Pattern Recognition
An analysis of BioHashing and its variants
Pattern Recognition
Cancellable biometrics and annotations on BioHash
Pattern Recognition
Cancellable face biometrics system by combining independent component analysis coefficients
IWCF'10 Proceedings of the 4th international conference on Computational forensics
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Journal of Network and Computer Applications
Revealing the secret of facehashing
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
An analysis on accuracy of cancelable biometrics based on biohashing
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
2^N discretisation of biophasor in cancellable biometrics
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
PalmHash Code vs. PalmPhasor Code
Neurocomputing
Hi-index | 0.10 |
In this paper we introduce a novel cancellable biometric realisation approach based on the iterated inner products between the tokenised pseudo-random number and the face feature to produce a set of user-specific compact binary code, coined as FaceHash. This approach enables straightforward revocation of FaceHash via token replacement and there is no deterministic way to reveal FaceHash without having both tokenised random number and face feature, thus offers strong protection against biometrics fabrication. In addition, FaceHashing has significant functional advantages over contemporary biometrics like zero error rate and clean separation of the genuine and imposter populations.