PCA Authentication of Facial Biometric in the Secure Randomized Mapping Domain

被引:0
|
作者
Dabbah, M. A. [1 ]
Dlay, S. S. [1 ]
Woo, W. L. [1 ]
机构
[1] Newcastle Univ, Sch Elect Elect & Comp Engn, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
关键词
cancellable biometric; security; face Recognition; eigenface;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Without sufficient protection during the entire authentication procedure, biometrics cannot supersede traditional authentication methods. In this paper a new method of cancellable biometric transformation is presented. Random finite spaces are utilized to map the original facial biometrics into a secure domain, in which authentication can be accurately performed using PCA. Each face is mapped up using independent random spaces to generate a secure (cancellable) template. Replacing the previous random spaces results in a new cancellable template, this is issued from the same original image. Evaluation has shown significant accuracy and security improvements. Genuine and impostor distributions separation has been improved by 203.78%, leading to a 99.94% success rate, which also means that the error rate has been improved by 99.53%. The cancellable templates do not carry any visual information.
引用
收藏
页码:1191 / 1195
页数:5
相关论文
共 50 条
  • [31] Appearance-based biometric recognition: Secure authentication and cancellability
    Dabbah, M. A.
    Woo, W. L.
    Dlay, S. S.
    PROCEEDINGS OF THE 2007 15TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING, 2007, : 479 - +
  • [32] Blind Authentication: A Secure Crypto-Biometric Verification Protocol
    Upmanyu, Maneesh
    Namboodiri, Anoop M.
    Srinathan, Kannan
    Jawahar, C. V.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) : 255 - 268
  • [33] Secure biometric template generation for multi-factor authentication
    Khan, Salman H.
    Akbar, M. Ali
    Shahzad, Farrukh
    Farooq, Mudassar
    Khan, Zeashan
    PATTERN RECOGNITION, 2015, 48 (02) : 458 - 472
  • [34] A hardware implementation of fingerprint verification for secure biometric authentication systems
    Chung, YW
    Moon, D
    Pan, SB
    Kim, M
    Kim, K
    IMAGE ANALYSIS AND RECOGNITION, PT 2, PROCEEDINGS, 2004, 3212 : 770 - 777
  • [35] Secure Methods for Fuzzy Key Binding in Biometric Authentication Applications
    Bui, Francis Minhthang
    Hatzinakos, Dimitrios
    2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 1363 - 1367
  • [36] Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication
    Sy, Bon
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5376 : 143 - 154
  • [37] Design and Implementation of an IoT Based Secure Biometric Authentication System
    Joshy, Annies
    Jalaja, M. J.
    2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, INFORMATICS, COMMUNICATION AND ENERGY SYSTEMS (SPICES), 2017,
  • [38] Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique
    Pal, Doyel
    Khethavath, Praveenkumar
    Thomas, Johnson P.
    Chen, Tingting
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 146 - 156
  • [39] iiCardiac Rhythm - Biometric based Secure Authentication for IEEE 802.15.6
    Belinda, Carmel Mary
    Sugumaran, Tolstoy
    Kannan, E.
    2014 INTERNATIONAL CONFERENCE ON SCIENCE ENGINEERING AND MANAGEMENT RESEARCH (ICSEMR), 2014,
  • [40] A Cancellable and Privacy-Preserving Facial Biometric Authentication Scheme
    Phillips, Tyler
    Zou, Xukai
    Li, Feng
    2017 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2017, : 545 - 549