Changeable Biometrics for Appearance Based Face Recognition

To enhance security and privacy in biometrics, changeable (or cancelable) biometrics have recently been introduced. The idea is to transform a biometric signal or feature into a new one for enrollment and matching. In this paper, we proposed changeable biometrics for face recognition using an appearance based approach. PCA and ICA coefficient vectors extracted from an input face image are normalized using their norm. The two normalized vectors are scrambled randomly and a new transformed face coefficient vector (transformed template) is generated by addition of the two normalized vectors. When a transformed template is compromised, it is replaced by using a new scrambling rule. Because the transformed template is generated by the addition of two vectors, the original PCA and ICA coefficients cannot be recovered from the transformed coefficients. In our experiment, we compared the performance between the cases when PCA and ICA coefficient vectors are used for verification and when the transformed coefficient vectors are used for verification.

[1]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[2]  Bruce A. Draper,et al.  Recognizing faces with PCA and ICA , 2003, Comput. Vis. Image Underst..

[3]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[4]  Marian Stewart Bartlett,et al.  Face recognition by independent component analysis , 2002, IEEE Trans. Neural Networks.

[5]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[6]  Andrew Beng Jin Teoh,et al.  Cancellable biometerics featuring with tokenised random number , 2005, Pattern Recognit. Lett..

[7]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[8]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[9]  Andrew Beng Jin Teoh,et al.  Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..

[10]  A. Martínez,et al.  The AR face databasae , 1998 .

[11]  KyungHee Lee,et al.  Two Factor Face Authentication Scheme with Cancelable Feature , 2005, IWBRS.