PCA Authentication of Facial Biometric in the Secure Randomized Mapping Domain

被引:0
|
作者
Dabbah, M. A. [1 ]
Dlay, S. S. [1 ]
Woo, W. L. [1 ]
机构
[1] Newcastle Univ, Sch Elect Elect & Comp Engn, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
关键词
cancellable biometric; security; face Recognition; eigenface;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Without sufficient protection during the entire authentication procedure, biometrics cannot supersede traditional authentication methods. In this paper a new method of cancellable biometric transformation is presented. Random finite spaces are utilized to map the original facial biometrics into a secure domain, in which authentication can be accurately performed using PCA. Each face is mapped up using independent random spaces to generate a secure (cancellable) template. Replacing the previous random spaces results in a new cancellable template, this is issued from the same original image. Evaluation has shown significant accuracy and security improvements. Genuine and impostor distributions separation has been improved by 203.78%, leading to a 99.94% success rate, which also means that the error rate has been improved by 99.53%. The cancellable templates do not carry any visual information.
引用
收藏
页码:1191 / 1195
页数:5
相关论文
共 50 条
  • [1] On privacy in secure biometric authentication systems
    Ignatenko, Tanya
    Willems, Frans
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 121 - +
  • [2] Secure Authentication Using Biometric Methods
    Rejman-Greene, Marek
    Information Security Technical Report, 2002, 7 (03): : 30 - 40
  • [3] Secure biometric authentication with improved accuracy
    Barbosa, Manuel
    Brouard, Thierry
    Cauchie, Stephane
    de Sousa, Simao Melo
    INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 21 - +
  • [4] A secure biometric authentication based on PEKS
    Zhang, Yue
    Qin, Jing
    Du, Lihua
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1111 - 1123
  • [5] Secure Behavioral Biometric Authentication with Leap Motion
    Xiao, Grady
    Milanova, Mariofanna
    Xie, Mengjun
    2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, : 112 - 118
  • [6] Private Eyes: Secure Remote Biometric Authentication
    Syta, Ewa
    Fischer, Michael J.
    Wolinsky, David
    Silberschatz, Abraham
    Gallegos-Garcia, Gina
    Ford, Bryan
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 243 - 250
  • [7] ECG BASED BIOMETRIC FOR DOUBLY SECURE AUTHENTICATION
    Safie, Sairul I.
    Soraghan, John J.
    Petropoulakis, Lykourgos
    19TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO-2011), 2011, : 2274 - 2278
  • [8] Secure remote authentication using biometric data
    Boyen, X
    Dodis, Y
    Katz, J
    Ostrovsky, R
    Smith, A
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 147 - 163
  • [9] Secure Hamming Distance based Biometric Authentication
    Kulkarni, Rohan
    Namboodiri, Anoop
    2013 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2013,
  • [10] Secure biometric authentication for weak computational devices
    Atallah, MJ
    Frikken, KB
    Goodrich, MT
    Tamassia, R
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 357 - 371