A Novel Cross Folding Algorithm for Multimodal Cancelable Biometrics

Multimodal biometric systems have emerged as highly successful new approach to combat problems of unimodal biometric system such as intraclass variability, interclass similarity, data quality, non-universality, and sensitivity to noise. However, one major issue pertinent to unimodal system remains, which has to do with actual biometric characteristics of users being permanent and their number being limited. Thus, if a user's biometric is compromised, it might be impossible or highly difficult to replace it in a particular system. The concept of cancelable biometric or cancelability is to transform a biometric data or feature into a new one so that the stored biometric template can be easily changed in a biometric security system. In this paper, the authors present a novel solution for cancelable biometrics in a multimodal system. They develop a new cancelable biometric template generation algorithm using random projection and transformation-based feature extraction and selection. Performance of the proposed algorithm is validated on a virtual multi-modal face and ear database.

[1]  Andy Adler Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[2]  Andrew Beng Jin Teoh,et al.  Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[3]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[4]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[5]  Yingxu Wang,et al.  A novel fuzzy multimodal information fusion technology for human biometric traits identification , 2011, IEEE 10th International Conference on Cognitive Informatics and Cognitive Computing (ICCI-CC'11).

[6]  Milt Statheropoulos,et al.  Noise reduction of fast, repetitive GC/MS measurements using principal component analysis (PCA) , 1999 .

[7]  Anders Eriksson,et al.  How flexible is the human voice? - a case study of mimicry , 1997, EUROSPEECH.

[8]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[9]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[10]  Yingxu Wang,et al.  A formal knowledge representation system for the cognitive learning engine , 2011, IEEE 10th International Conference on Cognitive Informatics and Cognitive Computing (ICCI-CC'11).

[11]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[12]  Tony R. Martinez,et al.  The general inefficiency of batch training for gradient descent learning , 2003, Neural Networks.

[13]  Pong C. Yuen,et al.  A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.

[14]  Yingxu Wang,et al.  A Formal Knowledge Representation System (FKRS) for the Intelligent Knowledge Base of a Cognitive Learning Engine , 2011, Int. J. Softw. Sci. Comput. Intell..

[15]  Marina L. Gavrilova,et al.  Rotation Invariant Multiview Face Detection Using Skin Color Regressive Model and Support Vector Regression , 2010, Int. J. Pattern Recognit. Artif. Intell..

[16]  Sargur N. Srihari,et al.  Image Pattern Recognition - Synthesis and Analysis in Biometrics , 2007, Image Pattern Recognition.

[17]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[18]  Marina L. Gavrilova,et al.  FES: A System for Combining Face, Ear and Signature Biometrics Using Rank Level Fusion , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).

[19]  Wilson R. Harrison,et al.  Suspect Documents: Their Scientific Examination , 1958 .

[20]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[21]  Marina L. Gavrilova,et al.  Multimodal Cancelable Biometrics , 2012, 2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing.

[22]  Svetlana N. Yanuschkevich Image Pattern Recognition: Synthesis and Analysis in Biometrics (Series in Machine Perception & Artifical Intelligence) , 2006 .

[23]  Andy Harter,et al.  Parameterisation of a stochastic model for human face identification , 1994, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision.

[24]  Arun Ross,et al.  From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[25]  Arun Ross,et al.  Handbook of Biometrics , 2007 .

[26]  F. Gianfelici,et al.  Nearest-Neighbor Methods in Learning and Vision (Shakhnarovich, G. et al., Eds.; 2006) [Book review] , 2008 .

[27]  Witold Pedrycz,et al.  Cognitive Informatics and Cognitive Computing in Year 10 and Beyond , 2011, Int. J. Cogn. Informatics Nat. Intell..

[28]  Kuldip K. Paliwal,et al.  Polynomial features for robust face authentication , 2002, Proceedings. International Conference on Image Processing.

[29]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[30]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.