CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
FVC2000: Fingerprint Verification Competition
IEEE Transactions on Pattern Analysis and Machine Intelligence
Biometric Hash based on Statistical Features of Online Signatures
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 1 - Volume 1
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Overview of the Face Recognition Grand Challenge
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 1 - Volume 01
Face Recognition with Renewable and Privacy Preserving Binary Templates
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
Designs, Codes and Cryptography
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Robust, short and sensitive authentication tags using secure sketch
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
IEEE Transactions on Pattern Analysis and Machine Intelligence
An improved BioHashing for human authentication
Pattern Recognition
An analysis of BioHashing and its variants
Pattern Recognition
Fuzzy extractors for continuous distributions
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Random subspace for an improved BioHashing for face authentication
Pattern Recognition Letters
EURASIP Journal on Advances in Signal Processing
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Secure sketch for biometric templates
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Practical biometric authentication with template protection
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Fingerprint-Based Fuzzy Vault: Implementation and Performance
IEEE Transactions on Information Forensics and Security
Protecting Biometric Templates With Sketch: Theory and Practice
IEEE Transactions on Information Forensics and Security - Part 2
Robust extraction of secret bits from minutiae
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hi-index | 0.08 |
Extracting binary strings from real-valued biometric templates is a fundamental step in template compression and protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch and helper data systems. Quantization and coding are the straightforward way to extract binary representations from arbitrary real-valued biometric modalities. Afterwards, the binary strings can be compared by means of a Hamming distance classifier (HDC). One of the problems of the binary biometric representations is the allocation of quantization bits to the features. In this paper, we first give a theoretical model of the HDC, based on the features' bit error probabilities after the quantization. This model predicts the false acceptance rate (FAR) and the false rejection rate (FRR) as a function of the Hamming distance threshold. Additionally, we propose the area under the FRR curve optimized bit allocation (AUF-OBA) principle. Given the features' bit error probabilities, AUF-OBA assigns variable numbers of quantization bits to features, in such way that the analytical area under the FRR curve for the HDC is minimized. Experiments of AUF-OBA on the FVC2000 fingerprint database and the FRGC face database yield good verification performances. AUF-OBA is applicable to arbitrary biometric modalities, such as fingerprint texture, iris, signature and face.