Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code

Two-dimensional PalmPhasor Code (2DPPC) was proposed as a means of cancelable palmprint coding scheme for secure palmprint template protection. 2DPPC is generated from Gabor features, whereby palmprint image and 2DGabor filters are convoluted. However, vertical correlation (VC), which is a notion of inherent correlation between the vertically adjacent entries in 2DPPC, can weaken the robustness against statistical analysis attacks. When the orientation of 2DGabor filter approaches vertical orientation, the real and imaginary parts of Gabor features can be transposed to suppress the VC in 2DPPC. Yet, the VC analysis and orientation range of transposition for 2DPPC generation are remained unsolved. In this paper, we attempt to bridge the relation between the orientation of 2DGabor filter and the VC in 2DPPC. By following the analysis, we determine the exact orientation range of transposition for VC suppression.

[1]  Lu Leng,et al.  Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security , 2011, J. Netw. Comput. Appl..

[2]  Andrew Beng Jin Teoh,et al.  2Ns Discretisation of BioPhasor in Cancellable Biometrics , 2007, ICB.

[3]  Tieniu Tan,et al.  Ordinal palmprint represention for personal identification [represention read representation] , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[4]  L. Leng,et al.  Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection , 2010, 2010 25th International Conference of Image and Vision Computing New Zealand.

[5]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[6]  John N. Tsitsiklis,et al.  A survey of computational complexity results in systems and control , 2000, Autom..

[7]  Lu Leng,et al.  PalmHash Code vs. PalmPhasor Code , 2013, Neurocomputing.

[8]  Andrew Beng Jin Teoh,et al.  Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[9]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[10]  Andrew Beng Jin Teoh,et al.  Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition , 2014, Neurocomputing.

[11]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[12]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[13]  Ming Li,et al.  Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code , 2013, 2013 International Symposium on Biometrics and Security Technologies.

[14]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[15]  Bin Ma,et al.  Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking , 2013, Multimedia Tools and Applications.

[16]  David Zhang,et al.  Palmprint verification based on robust line orientation code , 2007, Pattern Recognit..

[17]  Jiajun Wen,et al.  Appearance-based bidirectional representation for palmprint recognition , 2014, Multimedia Tools and Applications.

[18]  Hengjian Li,et al.  Robust palmprint identification based on directional representations and compressed sensing , 2012, Multimedia Tools and Applications.

[19]  Ahmed A. Abd El-Latif,et al.  Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics , 2013, Multimedia Tools and Applications.

[20]  Andrew Beng Jin Teoh,et al.  Biophasor: Token Supplemented Cancellable Biometrics , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.

[21]  David Zhang,et al.  A survey of palmprint recognition , 2009, Pattern Recognit..

[22]  Hanêne Ben-Abdallah,et al.  Selection of discriminative sub-regions for palmprint recognition , 2012, Multimedia Tools and Applications.

[23]  Muhammad Khurram Khan,et al.  Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion , 2011, STA.

[24]  Zhenhua Guo,et al.  Palmprint verification using binary orientation co-occurrence vector , 2009, Pattern Recognit. Lett..

[25]  C. Rathgeb,et al.  Statistical attack against fuzzy commitment scheme , 2012, IET Biom..

[26]  Junyu Niu,et al.  Fragile Bits in Palmprint Recognition , 2012, IEEE Signal Processing Letters.

[27]  David Zhang,et al.  An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing , 2005, KES.

[28]  Michele Nappi,et al.  ES-RU: an entropy based rule to select representative templates in face surveillance , 2012, Multimedia Tools and Applications.

[29]  Andrew Beng Jin Teoh,et al.  Cancellable biometerics featuring with tokenised random number , 2005, Pattern Recognit. Lett..

[30]  David Zhang,et al.  Feature-Level Fusion for Effective Palmprint Authentication , 2004, ICBA.

[31]  David Zhang,et al.  Competitive coding scheme for palmprint verification , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[32]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[33]  Andy Adler Cancelable Biometrics , 2015, Encyclopedia of Biometrics.

[34]  David Zhang,et al.  An Analysis on Invertibility of Cancelable Biometrics based on BioHashing , 2005, CISST.

[35]  David Zhang,et al.  Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[36]  Gaurav Bhatnagar,et al.  A New Fractional Random Wavelet Transform for Fingerprint Security , 2012, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.