A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding

Biometric secret-key binding inherently requires signal processing and error correction schemes due to noisy measurement readings. Two previously proposed strategies, Quantization Index Modulation (QIM) andWyner-Ziv (WZ) coding, are studied in the context of biometric key binding. We characterize the tradeoff between key rateleakage and key rate-reconstruction distortion, showing that while WZ coding has a better rate-leakage tradeoff than QIM, the latter has a better rate-reconstruction tradeoff. A new strategy is proposed to combine the merits of these schemes. Known as distortion-enhanced Wyner-Ziv coding (DE-WZ), this scheme is demonstrated to exhibit improved flexibility based on numerical results for a uniform source model and scalar quantization.

[1]  Frans M. J. Willems,et al.  Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.

[2]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[3]  Haiping Lu,et al.  A Biometric Encryption System for the Self-Exclusion Scenario of Face Recognition , 2009, IEEE Systems Journal.

[4]  Haiping Lu,et al.  Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications , 2010, IEEE Transactions on Information Forensics and Security.

[5]  Zixiang Xiong,et al.  Layered Wyner-Ziv video coding , 2004, IS&T/SPIE Electronic Imaging.

[6]  H.V. Poor,et al.  Privacy-security tradeoffs in biometric security systems , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.