Image hashing enabled technique for biometric template protection

The individual privacy linking to the widespread use of personal information appears to be a new phenomenon for networked society. In a conventional biometrics enabled authentication system, the privacy remains a controversial topic. Biometric characteristics are indisputable and unique to an individual hence the compromise of the biometric template is permanent. Cancelable biometrics was introduced to address this problem by constructing revocable biometric template that allows multiple templates to be associated to the same biometric trait. This concept gains advantages over the traditional authentication for its superiority in security. In this paper, we proposed a method that adopts the notion of image hashing by transforming the iris biometrics into a short bit string irreversibly. The experiments are tested on CASIA iris data set with promising result.

[1]  Andrew Beng Jin Teoh,et al.  Dynamic Handwritten Signature Verification Based on Statistical Quantization Mechanism , 2009, 2009 International Conference on Computer Engineering and Technology.

[2]  Sheng Tang,et al.  Compact and Robust Image Hashing , 2005, ICCSA.

[3]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[4]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Min Wu,et al.  Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[6]  Min Wu,et al.  Security of feature extraction in image hashing , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[7]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[8]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[9]  D J Field,et al.  Relations between the statistics of natural images and the response properties of cortical cells. , 1987, Journal of the Optical Society of America. A, Optics and image science.

[10]  Qi Wang,et al.  Random-data perturbation techniques and privacy-preserving data mining , 2005, Knowledge and Information Systems.