Classification Based Revocable Biometric Identity Code Generation

The recent biometric template protection methods often propose salting or one-way transformation functions and biometric cryptosystems which are capable of key binding or key generation to provide the revocability of the templates. Moreover, the use of multiple instances of a biometric trait proposes more robust features which are then combined with the well-known template protection methods. In this study, a normal densities based linear classifier is proposed to distinguish the features associated with each user and cluster them to generate an identity code by mapping the center of the cluster to a N-dimensional quantized bin. The resulting code is converted to a bit stream by a hashing mechanism to let user revoke his biometric in case of key compromise. This method presents the advantage of representing an individual by using his plenty of features instead of a single one in a supervised manner.

[1]  A. J. Willis,et al.  A cost-effective fingerprint recognition system for use with low-quality prints and damaged fingertips , 2001, Pattern Recognit..

[2]  Tsuhan Chen,et al.  Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[3]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[4]  Ibrahim Sogukpinar,et al.  Fingerprint Hardening with Randomly Selected Chaff Minutiae , 2007, CAIP.

[5]  Weiguo Sheng,et al.  Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering , 2008, IEEE Transactions on Information Forensics and Security.

[6]  Farzin Deravi,et al.  Evaluating Biometric Encryption Key Generation , 2005 .

[7]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[8]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[9]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[10]  Nasir D. Memon,et al.  A secure biometric authentication scheme based on robust hashing , 2005, MM&Sec '05.

[11]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[12]  Kang Ryoung Park,et al.  A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[13]  Pieter H. Hartel,et al.  Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.

[14]  Yevgeniy Dodis,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.

[15]  Naohisa Komatsu,et al.  A secure communication system using biometric identity verification (マルチメディア情報処理,映像表現,ネットワーク映像メディア,画像情報システム第3回International Workshop on Advanced Image Technology(IWAIT2001)) , 2000 .

[16]  Aggelos Kiayias,et al.  Traceable Signatures , 2004, EUROCRYPT.

[17]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[18]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.