Discriminative binary feature learning and quantization in biometric key generation

Abstract Biometric key generation based on facial features is far more complicated than face recognition, the problem being that there is no relevant information saved in databases for matching facial features in the key generation system, contrary to the face recognition system. In this paper, first, we develop an efficient unified framework for generating stable, robust and secure cryptography keys based on facial features, without the need to save information related to facial features in the database. Second, the facial features are extracted using a proposed equalized local binary pattern which shows promising results when simulated on standard face databases. Third, to cater for variations and provide flexibility in error tolerance, we propose a quantization scheme which not only cater for the variations, it also aids in providing security and reducing the size of the features. Fourth, a secure key generation mechanism is developed based on the facial features in which keys can be periodically updated. Fifth, the robustness and security of the generated keys are evaluated on a set of standard statistical tests comprising three requirements: randomness, weak biometric privacy and strong biometric privacy. Lastly, comparing our approach with several state-of-the-art methods, it exhibited superior performance.

[1]  Wen Gao,et al.  Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.

[2]  Alex Pentland,et al.  Bayesian face recognition , 2000, Pattern Recognit..

[3]  Yi-Ping Phoebe Chen,et al.  Cell morphology based classification for red cells in blood smear images , 2014, Pattern Recognit. Lett..

[4]  Weiguo Sheng,et al.  A Biometric Key Generation Method Based on Semisupervised Data Clustering , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[5]  Wen Gao,et al.  Histogram of Gabor Phase Patterns (HGPP): A Novel Object Representation Approach for Face Recognition , 2007, IEEE Transactions on Image Processing.

[6]  Raymond N. J. Veldhuis,et al.  Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[7]  Chengjun Liu,et al.  Gabor feature based classification using the enhanced fisher linear discriminant model for face recognition , 2002, IEEE Trans. Image Process..

[8]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[9]  Chulhan Lee,et al.  Changeable Biometrics for Appearance Based Face Recognition , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[10]  Mohammed Yakoob Siyal,et al.  A Noisy Channel Tolerant Image Encryption Scheme , 2014, Wireless Personal Communications.

[11]  Hamed Haddadi,et al.  A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics , 2017, IEEE Internet of Things Journal.

[12]  Domingo Mery,et al.  Face Recognition with Decision Tree-Based Local Binary Patterns , 2010, ACCV.

[13]  Pascal Vincent,et al.  Contractive Auto-Encoders: Explicit Invariance During Feature Extraction , 2011, ICML.

[14]  Andy Harter,et al.  Parameterisation of a stochastic model for human face identification , 1994, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision.

[15]  Xudong Jiang,et al.  Noise-Resistant Local Binary Pattern With an Embedded Error-Correction Mechanism , 2013, IEEE Transactions on Image Processing.

[16]  David J. Kriegman,et al.  From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[17]  B. Chen,et al.  Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).

[18]  Adil Masood Siddiqui,et al.  Chaotic substitution for highly autocorrelated data in encryption algorithm , 2014, Commun. Nonlinear Sci. Numer. Simul..

[19]  Simon Lucey,et al.  Convolutional Sparse Coding for Trajectory Reconstruction , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[20]  Hyeonjoon Moon,et al.  The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[21]  Yoshua Bengio,et al.  Greedy Layer-Wise Training of Deep Networks , 2006, NIPS.

[22]  Matti Pietikäinen,et al.  Learning Discriminant Face Descriptor , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[23]  Francisco Javier González-Serrano,et al.  Training Support Vector Machines with privacy-protected data , 2017, Pattern Recognit..

[24]  Yi-Ping Phoebe Chen,et al.  GHT-based associative memory learning and its application to Human action detection and classification , 2013, Pattern Recognit..

[25]  David G. Lowe,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004, International Journal of Computer Vision.

[26]  Paul A. Watters,et al.  A Novel Face Hashing Method with Feature Fusion for Biometric Cryptosystems , 2007, Fourth European Conference on Universal Multiservice Networks (ECUMN'07).

[27]  Ming Yang,et al.  DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[28]  Josef Kittler,et al.  3D Assisted Face Recognition: A Survey of 3D Imaging, Modelling and Recognition Approachest , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops.

[29]  Fawad Ahmed,et al.  Hash-Based Authentication of Digital Images in Noisy Channels , 2015 .

[30]  Marios Savvides,et al.  Spartans: Single-Sample Periocular-Based Alignment-Robust Recognition Technique Applied to Non-Frontal Scenarios , 2015, IEEE Transactions on Image Processing.

[31]  Stan Z. Li,et al.  Face Recognition with Local Gabor Textons , 2007, ICB.

[32]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[33]  Vitaly Shmatikov,et al.  Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[34]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[35]  Matti Pietikäinen,et al.  A comparative study of texture measures with classification based on featured distributions , 1996, Pattern Recognit..

[36]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[37]  Frédéric Jurie,et al.  Face Recognition using Local Quantized Patterns , 2012, BMVC.

[38]  Michael K. Reiter,et al.  The Practical Subtleties of Biometric Key Generation , 2008, USENIX Security Symposium.

[39]  David Zhang,et al.  Hand-Geometry Recognition Using Entropy-Based Discretization , 2007, IEEE Transactions on Information Forensics and Security.

[40]  Andrew Beng Jin Teoh,et al.  An efficient dynamic reliability-dependent bit allocation for biometric discretization , 2012, Pattern Recognit..

[41]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[42]  Weiguo Sheng,et al.  Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering , 2008, IEEE Transactions on Information Forensics and Security.

[43]  Mohammed Yakoob Siyal,et al.  Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..

[44]  Gang Hua,et al.  Labeled Faces in the Wild: A Survey , 2016 .

[45]  Baochang Zhang,et al.  Local Derivative Pattern Versus Local Binary Pattern: Face Recognition With High-Order Local Pattern Descriptor , 2010, IEEE Transactions on Image Processing.

[46]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[47]  Alice Caplier,et al.  Enhanced Patterns of Oriented Edge Magnitudes for Face Recognition and Image Matching , 2012, IEEE Transactions on Image Processing.

[48]  Yongsheng Gao,et al.  Low-rank double dictionary learning from corrupted data for robust image classification , 2017, Pattern Recognit..

[49]  Lior Wolf,et al.  Using Biologically Inspired Features for Face Processing , 2007, International Journal of Computer Vision.

[50]  Ngoc-Son Vu,et al.  Exploring Patterns of Gradient Orientations and Magnitudes for Face Recognition , 2013, IEEE Transactions on Information Forensics and Security.

[51]  Matti Pietikäinen,et al.  Face Recognition by Exploring Information Jointly in Space, Scale and Orientation , 2011, IEEE Transactions on Image Processing.

[52]  Ibrahim A. Al-Kadit Origins of Cryptology: the Arab Contributions , 1992, Cryptologia.

[53]  Josef Kittler,et al.  Class-Specific Kernel Fusion of Multiple Descriptors for Face Verification Using Multiscale Binarised Statistical Image Features , 2014, IEEE Transactions on Information Forensics and Security.

[54]  Libor Spacek,et al.  Distinctive Descriptions for Face Processing , 1997, BMVC.

[55]  Domingo Mery,et al.  Learning discriminative local binary patterns for face recognition , 2011, Face and Gesture 2011.

[56]  Wen Gao,et al.  Local Visual Primitives (LVP) for Face Modelling and Recognition , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[57]  Jiwen Lu,et al.  Learning Compact Binary Face Descriptor for Face Recognition , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[58]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[59]  Zheng-Hua Tan,et al.  Privacy protection performance of De-identified face images with and without background , 2016, 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[60]  Peyman Milanfar,et al.  Face Verification Using the LARK Representation , 2011, IEEE Transactions on Information Forensics and Security.

[61]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[62]  Mohammed Yakoob Siyal,et al.  A secure and robust hash-based scheme for image authentication , 2010, Signal Process..

[63]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..