An analysis on equal width quantization and linearly separable subcode encoding-based discretization and its performance resemblances

Biometric discretization extracts a binary string from a set of real-valued features per user. This representative string can be used as a cryptographic key in many security applications upon error correction. Discretization performance should not degrade from the actual continuous features-based classification performance significantly. However, numerous discretization approaches based on ineffective encoding schemes have been put forward. Therefore, the correlation between such discretization and classification has never been made clear. In this article, we aim to bridge the gap between continuous and Hamming domains, and provide a revelation upon how discretization based on equal-width quantization and linearly separable subcode encoding could affect the classification performance in the Hamming domain. We further illustrate how such discretization can be applied in order to obtain a highly resembled classification performance under the general Lp distance and the inner product metrics. Finally, empirical studies conducted on two benchmark face datasets vindicate our analysis results.

[1]  Julian Fierrez,et al.  Fingerprint liveness detection based on quality measures , 2009, 2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS).

[2]  David Zhang,et al.  Hand-Geometry Recognition Using Entropy-Based Discretization , 2007, IEEE Transactions on Information Forensics and Security.

[3]  Julian Fierrez,et al.  Hill-climbing attack to an Eigenface-based face verification system , 2009, 2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS).

[4]  Tsuhan Chen,et al.  Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[5]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[6]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[7]  Chun Chen,et al.  Biometric Quantization through Detection Rate Optimized Bit Allocation , 2009, EURASIP J. Adv. Signal Process..

[8]  Anton H. M. Akkermans,et al.  Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[9]  Aleix M. Martinez,et al.  The AR face database , 1998 .

[10]  Yixin Chen,et al.  Image Categorization by Learning and Reasoning with Regions , 2004, J. Mach. Learn. Res..

[11]  K. Pearson NOTES ON THE HISTORY OF CORRELATION , 1920 .

[12]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[13]  R.N.J. Veldhuis,et al.  Multi-Bits Biometric String Generation based on the Likelihood Ratio , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[14]  Martin D. Buhmann,et al.  Radial Basis Functions: Theory and Implementations: Preface , 2003 .

[15]  Qi Li,et al.  Using voice to generate cryptographic keys , 2001, Odyssey.

[16]  Peter E. Hart,et al.  Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.

[17]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[18]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[19]  A. Martínez,et al.  The AR face databasae , 1998 .

[20]  Claudio Gutierrez,et al.  Survey of graph database models , 2008, CSUR.

[21]  James Ze Wang,et al.  Image retrieval: Ideas, influences, and trends of the new age , 2008, CSUR.

[22]  Andrew Beng Jin Teoh,et al.  Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures , 2006, ICB.

[23]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[24]  Andrew Beng Jin Teoh,et al.  Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..

[25]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[26]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[27]  Meng-Hui Lim,et al.  Linearly Separable SubCode: A novel output label with high separability for biometric discretization , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.

[28]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and user-dependent multi-state discretization in BioHash , 2009, Pattern Analysis and Applications.

[29]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[30]  Evgeny Verbitskiy,et al.  RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION , 2007 .

[31]  Chun Chen,et al.  Extracting biometric binary strings with minimal area under the FRR curve for the hamming distance classifier , 2009, 2009 17th European Signal Processing Conference.

[32]  Hyeonjoon Moon,et al.  The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[33]  Xudong Jiang,et al.  Eigenfeature Regularization and Extraction in Face Recognition , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[34]  Hyeonjoon Moon,et al.  The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[35]  Fabrizio Sebastiani,et al.  Machine learning in automated text categorization , 2001, CSUR.