Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection
IEEE Transactions on Pattern Analysis and Machine Intelligence
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
A secure biometric authentication scheme based on robust hashing
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Face Recognition with Renewable and Privacy Preserving Binary Templates
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
Protecting Face Biometric Data on Smartcard with Reed-Solomon Code
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Privacy & Security Issues Related to Match Scores
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Securing Fingerprint Template: Fuzzy Vault with Helper Data
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Cancelable Biometrics: A Case Study in Fingerprints
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 04
IEEE Transactions on Pattern Analysis and Machine Intelligence
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
EURASIP Journal on Advances in Signal Processing
Symmetric hash functions for fingerprint minutiae
ICAPR'05 Proceedings of the Third international conference on Pattern Recognition and Image Analysis - Volume Part II
Cancelable key-based fingerprint templates
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Vulnerabilities in biometric encryption systems
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
Protecting Biometric Templates With Sketch: Theory and Practice
IEEE Transactions on Information Forensics and Security - Part 2
A touch of money [biometric authentication systems]
IEEE Spectrum
Biometric hash: high-confidence face recognition
IEEE Transactions on Circuits and Systems for Video Technology
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Fuzzy extractors for minutiae-based fingerprint authentication
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric key binding: fuzzy vault based on iris images
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
An embedded system for real-time facial expression recognition based on the extension theory
Computers & Mathematics with Applications
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Journal of Network and Computer Applications
An effective biometric cryptosystem combining fingerprints with error correction codes
Expert Systems with Applications: An International Journal
Orthogonal discriminant vector for face recognition across pose
Pattern Recognition
Distance entropy as an information measure for binary biometric representation
CCBR'12 Proceedings of the 7th Chinese conference on Biometric Recognition
PalmHash Code vs. PalmPhasor Code
Neurocomputing
Cancelable fusion using social network analysis
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
POSTER: Secure authentication from facial attributeswith no privacy loss
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Two-factor face authentication using matrix permutation transformation and a user password
Information Sciences: an International Journal
Hi-index | 0.00 |
Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store the template in its original form, have been reported in recent years. They can be categorized into two approaches, namely biometric cryptosystem and transform-based. However, most (if not all) algorithms in both approaches offer a trade-off between the template security and matching performance. Moreover, we believe that no single template protection method is capable of satisfying the security and performance simultaneously. In this paper, we propose a hybrid approach which takes advantage of both the biometric cryptosystem approach and the transform-based approach. A three-step hybrid algorithm is designed and developed based on random projection, discriminability-preserving (DP) transform, and fuzzy commitment scheme. The proposed algorithm not only provides good security, but also enhances the performance through the DP transform. Three publicly available face databases, namely FERET, CMU-PIE, and FRGC, are used for evaluation. The security strength of the binary templates generated from FERET, CMU-PIE, and FRGC databases are 206.3, 203.5, and 347.3 bits, respectively. Moreover, noninvertibility analysis and discussion on data leakage of the proposed hybrid algorithm are also reported. Experimental results show that, using Fisherface to construct the input facial feature vector (face template), the proposed hybrid method can improve the recognition accuracy by 4%, 11%, and 15% on the FERET, CMU-PIE, and FRGC databases, respectively. A comparison with the recently developed random multispace quantization biohashing algorithm is also reported.