Skip to main content

Protecting DCT Templates for a Face Verification System by Means of Pseudo-random Permutations

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5517))

Abstract

Biometric template security and privacy are a great concern of biometric systems, because unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. In this paper we present a protection scheme for an identity verification system through biometrical face recognition based on a user dependent pseudo-random ordering of the DCT template coefficients and MPL and RBF Neural Networks for classification. In addition to privacy enhancement, because a hacker can hardly match a fake biometric sample without knowing the pseudo-random ordering this scheme, it also increases the biometric recognition performance.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Preneel, B.: ECRYPT: The Cryptographic Research Challenges for the Next Decade. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 1–15. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. Eurasip journal on Advances in Signal Processing. Special issue on Biometrics, 1–20 (January 2008)

    Google Scholar 

  3. Faundez Zanuy, M.: Biometric security technology. IEEE Aerospace and Electronic Systems Magazine 21(6), 15–26 (2006)

    Article  Google Scholar 

  4. Hiltgen, A.P.L.: Constructions of feebly-one-way families of permutations. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 422–434. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  5. Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancellable fingerprint templates. IEEE Trans. On Pattern Analysis and Machine Intelligence 29(4), 561–572 (2007)

    Article  Google Scholar 

  7. Abate, A.F., Nappi, M., Riccio, D., Sabatino, G.: 2D and 3D Face Recognition: A Survey. Pattern Recognition Letters (December 4, 2006)

    Google Scholar 

  8. Grassi, M., Faundez-Zanuy, M.: Face Recognition with Facial Mask Application and Neural Networks. In: Sandoval, F., Prieto, A.G., Cabestany, J., Graña, M. (eds.) IWANN 2007. LNCS, vol. 4507, pp. 709–716. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Martinez, A.M.: Recognizing Imprecisely Localized, Partially Occluded, and Expression Variant Faces from a Single Sample per Class. IEEE Transaction On Pattern Analysis and Machine Intelligence 24(6), 748–763 (2002)

    Article  Google Scholar 

  10. Martin, A.: The DET curve in assessment of detection task performance. In: European Speech Processing Conference Eurospeech 1997, vol. 4, pp. 1895–1898 (1997)

    Google Scholar 

  11. Zanuy, M.F.: Face Recognition in a Transformed Domain. In: Proceedings 37th Annual International Carnahan Conference On Security Tecnology, pp. 290–297 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Grassi, M., Faundez-Zanuy, M. (2009). Protecting DCT Templates for a Face Verification System by Means of Pseudo-random Permutations. In: Cabestany, J., Sandoval, F., Prieto, A., Corchado, J.M. (eds) Bio-Inspired Systems: Computational and Ambient Intelligence. IWANN 2009. Lecture Notes in Computer Science, vol 5517. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02478-8_152

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02478-8_152

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02477-1

  • Online ISBN: 978-3-642-02478-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics