Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition

Recently two-dimensional (2D) PalmHash Code, whose original features were extracted by 2D Gabor filter, was proposed as a cancelable palmprint coding scheme for secure palmprint verification. However, vertical correlation inherently found in 2DPalmHash Code is vulnerable to statistical analysis attack. It was empirically attested that the vertical correlation of 2DPalmHash Code was suppressed by transposing Gabor feature matrices that were tuned to vertical orientation. Unfortunately, the mechanism behind why it works remains open. In this paper, we first systematically analyze and reveal the horizontal and vertical correlations of 2DPalmHash Code. We then uncover the secret behind the transposition of Gabor feature matrices for vertical correlation suppression. Finally, the orientation range of Gabor feature matrices suitable for transposition is determined from the correlation analysis and verified by a series of experiments.

[1]  Daoqiang Zhang,et al.  (2D)2PCA: Two-directional two-dimensional PCA for efficient face representation and recognition , 2005, Neurocomputing.

[2]  David Zhang,et al.  An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing , 2005, KES.

[3]  David Zhang,et al.  Feature-Level Fusion for Effective Palmprint Authentication , 2004, ICBA.

[4]  Parinya Sanguansat Two-Dimensional Random Projection for Face Recognition , 2010, 2010 First International Conference on Pervasive Computing, Signal Processing and Applications.

[5]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[6]  Junyu Niu,et al.  Fragile Bits in Palmprint Recognition , 2012, IEEE Signal Processing Letters.

[7]  Tieniu Tan,et al.  Ordinal palmprint represention for personal identification [represention read representation] , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[8]  L. Leng,et al.  Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection , 2010, 2010 25th International Conference of Image and Vision Computing New Zealand.

[9]  Lu Leng,et al.  Two-dimensional cancelable biometric scheme , 2012, 2012 International Conference on Wavelet Analysis and Pattern Recognition.

[10]  Gaurav Bhatnagar,et al.  A New Fractional Random Wavelet Transform for Fingerprint Security , 2012, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[11]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[12]  Andrew Beng Jin Teoh,et al.  Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[13]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[14]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[15]  Lu Leng,et al.  PalmHash Code vs. PalmPhasor Code , 2013, Neurocomputing.

[16]  Chun Chen,et al.  Color-to-gray based on chance of happening preservation , 2013, Neurocomputing.

[17]  David Zhang,et al.  Competitive coding scheme for palmprint verification , 2004, ICPR 2004.

[18]  Palaiahnakote Shivakumara,et al.  (2D)2LDA: An efficient approach for face recognition , 2006, Pattern Recognit..

[19]  Alejandro F. Frangi,et al.  Two-dimensional PCA: a new approach to appearance-based face representation and recognition , 2004 .

[20]  Muhammad Khurram Khan,et al.  Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition , 2011, ICCSA.

[21]  David Zhang,et al.  A survey of palmprint recognition , 2009, Pattern Recognit..

[22]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[23]  Andrew Beng Jin Teoh,et al.  Cancellable biometerics featuring with tokenised random number , 2005, Pattern Recognit. Lett..

[24]  Ming Li,et al.  2D-LDA: A statistical linear discriminant analysis for image matrix , 2005, Pattern Recognit. Lett..

[25]  Hamid Abrishami Moghaddam,et al.  Two-dimensional random projection , 2011, Signal Process..

[26]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[27]  Andy Adler Cancelable Biometrics , 2015, Encyclopedia of Biometrics.

[28]  David Zhang,et al.  An Analysis on Invertibility of Cancelable Biometrics based on BioHashing , 2005, CISST.

[29]  David Zhang,et al.  Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[30]  Qi Zhao,et al.  Learning saliency-based visual attention: A review , 2013, Signal Process..

[31]  David Zhang,et al.  Palmprint verification based on robust line orientation code , 2007, Pattern Recognit..

[32]  Muhammad Khurram Khan,et al.  Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion , 2011, STA.

[33]  Zhenhua Guo,et al.  Palmprint verification using binary orientation co-occurrence vector , 2009, Pattern Recognit. Lett..

[34]  C. Rathgeb,et al.  Statistical attack against fuzzy commitment scheme , 2012, IET Biom..