Secure Palmprint Verification Using Random Measure and Permutations

Compared with the traditional verification schemes, the cancelability and re-issueability of biometric system is the inherent shortages. Therefore, problem of palmprint template security must be considered and solved in a real biometric system. To handle these problems, a hybrid palprint template protection scheme using random measure and permutations is proposed in this paper. Firstly, the Gabor is employed to convolute with preprocessed palmprint image. Then, the obtained Gabor representation is compared with a chaotic random matrix to generate cancelable palmprint template. The random measure can improve the template’s discriminablity. At last, the cancelable palmprint template is scrambled to strengthen the security of the template. The publicly available HongKong PolyU Palmprint Database is employed for evaluation. The experimental results show that our proposed scheme can separate the imposter and genuine population very well, that is also to say that, the EER is zero. And the re-usability of the proposed template protection scheme is very large to brute force attack.

[1]  David Zhang,et al.  Three measures for secure palmprint identification , 2008, Pattern Recognit..

[2]  John Daugman,et al.  The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..

[3]  Muhammad Khurram Khan,et al.  Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion , 2011, STA.

[4]  Hengjian Li,et al.  Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes , 2010, Inf. Sci..

[5]  Anil K. Jain,et al.  Latent Palmprint Matching , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  David Zhang,et al.  On-Line Palmprint Identification , 2005 .

[7]  Bernadette Dorizzi,et al.  Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.

[8]  Xuanqin Mou,et al.  Chaotic encryption scheme for real-time digital video , 2002, IS&T/SPIE Electronic Imaging.

[9]  Muhammad Khurram Khan,et al.  Challenge-response-based biometric image scrambling for secure personal identification , 2011, Future Gener. Comput. Syst..

[10]  Salwani Abdullah,et al.  Great Deluge Algorithm for Rough Set Attribute Reduction , 2010, FGIT-DTA/BSBT.

[11]  Zhong Jin,et al.  Normalized Direct Linear Discriminant Analysis with its Application to Face Recognition , 2010, J. Digit. Content Technol. its Appl..

[12]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[13]  David Zhang,et al.  A survey of palmprint recognition , 2009, Pattern Recognit..

[14]  David Zhang,et al.  Fisherpalms based palmprint recognition , 2003, Pattern Recognit. Lett..

[15]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[16]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[18]  David Zhang,et al.  Competitive coding scheme for palmprint verification , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[19]  David Zhang,et al.  Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[20]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[21]  Cai Guoqiang,et al.  A Method of Face Recognition under Movement Condition , 2011 .

[22]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[23]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[24]  Yue Zeng,et al.  The Face Recognition Method of the Two-direction Variation of 2DPCA , 2011 .

[25]  Chao Wang,et al.  Palmprint Recognition Based on 2-Dimension PCA , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[26]  Rama Chellappa,et al.  Secure and Robust Iris Recognition Using Random Projections and Sparse Representations , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.