A training algorithm for optimal margin classifiers
COLT '92 Proceedings of the fifth annual workshop on Computational learning theory
Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection
IEEE Transactions on Pattern Analysis and Machine Intelligence
Nonlinear component analysis as a kernel eigenvalue problem
Neural Computation
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
The FERET Evaluation Methodology for Face-Recognition Algorithms
IEEE Transactions on Pattern Analysis and Machine Intelligence
Computational Intelligence: An Introduction
Computational Intelligence: An Introduction
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Database-friendly random projections: Johnson-Lindenstrauss with binary coins
Journal of Computer and System Sciences - Special issu on PODS 2001
Local Non-Negative Matrix Factorization as a Visual Representation
ICDL '02 Proceedings of the 2nd International Conference on Development and Learning
Face recognition: A literature survey
ACM Computing Surveys (CSUR)
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
A secure biometric authentication scheme based on robust hashing
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
IEEE Transactions on Knowledge and Data Engineering
Performance Evaluation of Fingerprint Verification Systems
IEEE Transactions on Pattern Analysis and Machine Intelligence
Handbook of Multibiometrics (International Series on Biometrics)
Handbook of Multibiometrics (International Series on Biometrics)
Protecting Face Biometric Data on Smartcard with Reed-Solomon Code
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Securing Fingerprint Template: Fuzzy Vault with Helper Data
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
IEEE Transactions on Pattern Analysis and Machine Intelligence
Face recognition using spectral features
Pattern Recognition
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Speaker identification security improvement by means of speech watermarking
Pattern Recognition
Biometric scores fusion based on total error rate minimization
Pattern Recognition
Handbook of Biometrics
Journal of Cognitive Neuroscience
Cancellable biometrics and annotations on BioHash
Pattern Recognition
EURASIP Journal on Advances in Signal Processing
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
Face recognition across pose: A review
Pattern Recognition
Rapid and brief communication: Generalizing relevance weighted LDA
Pattern Recognition
A hybrid biometric cryptosystem for securing fingerprint minutiae templates
Pattern Recognition Letters
Cancelable Biometrics Realization With Multispace Random Projections
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Neural-network approximation of piecewise continuous functions: application to friction compensation
IEEE Transactions on Neural Networks
Face recognition by independent component analysis
IEEE Transactions on Neural Networks
2^N discretisation of biophasor in cancellable biometrics
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Robust extraction of secret bits from minutiae
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric key binding: fuzzy vault based on iris images
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Realtime training on mobile devices for face recognition applications
Pattern Recognition
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Journal of Network and Computer Applications
An integrated framework for biometrics security
iUBICOM'10 Proceedings of the 5th international conference on Ubiquitous and Collaborative Computing
PalmHash Code vs. PalmPhasor Code
Neurocomputing
Two-factor face authentication using matrix permutation transformation and a user password
Information Sciences: an International Journal
Hi-index | 0.01 |
In this paper, we propose a performance driven methodology for cancelable face templates generation. This is to address the issue of satisfying both the security and performance requirements at the same time. Essentially, the methodology consists of two transformations namely, an efficient feature extraction transformation and an error minimizing template transformation. The first transformation is achieved via a modified sparse random projection which extracts and transforms essential face features into cancelable templates. The second transformation is realized through a direct objective formulation to minimize the system's total error rate. In order to facilitate convergence of the resulted minimization search, a modified sigmoid is proposed for an error counting step function approximation. Using two publicly available face databases, we empirically show an improved verification performance in terms of the equal error rate while hiding the face identity simultaneously.