Face recognition with renewable and privacy preserving binary templates

This paper considers generating binary feature vectors from biometric face data such that their privacy can be protected using recently introduced helper data systems. We explain how the binary feature vectors can be derived and investigate their statistical properties. Experimental results for a subset of the FERET and Caltech databases show that there is only a slight degradation in classification results when using the binary rather than the real-valued feature vectors. Finally, the scheme to extract the binary vectors is combined with a helper data scheme leading to renewable and privacy preserving facial templates with acceptable classification results provided that the within-class variation is not too large.

[1]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[2]  Hyeonjoon Moon,et al.  The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[3]  Pim Tuyls,et al.  Information-theoretic approach to privacy protection of biometric templates , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[4]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[5]  Peter H. N. de With,et al.  Fast facial feature extraction using a deformable shape model with Haar-wavelet based local texture attributes , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[6]  Soren Bisgaard,et al.  Statistics for Engineering Problem Solving , 1995 .

[7]  Michael Purser Introduction to error-correcting codes , 1994 .

[8]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[9]  Peter H. N. de With,et al.  Toward fast feature adaptation and localization for real-time face recognition systems , 2003, Visual Communications and Image Processing.

[10]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[11]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[12]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[13]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[14]  John Daugman,et al.  The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..

[15]  Yevgeniy Dodis,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.

[16]  Yevgeniy Dodis,et al.  Fuzzy Extractors and Cryptography, or How to Use Your Fingerprints , 2003 .

[17]  Stephen B. Vardeman,et al.  Statistics for Engineering Problem Solving. , 1996 .

[18]  Norbert Krüger,et al.  Face Recognition by Elastic Bunch Graph Matching , 1997, CAIP.