PalmHash Code vs. PalmPhasor Code

  • Authors:
  • Lu Leng;Jiashu Zhang

  • Affiliations:
  • Sichuan Province Key Lab of Signal & Information Processing, Southwest Jiaotong University, Chengdu, Sichuan, 610031, PR China and School of Electrical and Electronic Engineering, College Engineer ...;Sichuan Province Key Lab of Signal & Information Processing, Southwest Jiaotong University, Chengdu, Sichuan, 610031, PR China

  • Venue:
  • Neurocomputing
  • Year:
  • 2013

Quantified Score

Hi-index 0.01

Visualization

Abstract

The existing palmprint protection schemes without verification degrading do not strictly meet non-invertible requirement; while non-invertible palmprint protection schemes do not meet verification performance requirement in stolen-token scenario. PalmHash Code and PalmPhasor Code, as two cancelable palmprint coding schemes, are proposed in this paper to balance the conflict between security and verification performance. In order to reduce computational complexity and storage cost, cancelable palmprint coding frameworks are extended from one dimension to two dimensions. Besides, two measures, perpendicular orientation transposition and multi-orientation score level fusion, are employed to further improve the performance of two dimensional (2D) cancelable palmprint codes. PalmHash Code and PalmPhasor Code are compared extensively in this paper. The experimental results and analysis confirm that 2D PalmHash Code and 2D PalmPhasor Code enhanced by the two measures are effective and secure even in stolen-token scenario.