Abstract
Biometric template security and privacy are a great concern of biometric systems, because unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. In this paper we present a protection scheme for an identity verification system through biometrical face recognition based on a user dependent pseudo-random ordering of the DCT template coefficients and MPL and RBF Neural Networks for classification. In addition to privacy enhancement, because a hacker can hardly match a fake biometric sample without knowing the pseudo-random ordering this scheme, it also increases the biometric recognition performance.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Preneel, B.: ECRYPT: The Cryptographic Research Challenges for the Next Decade. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 1–15. Springer, Heidelberg (2005)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. Eurasip journal on Advances in Signal Processing. Special issue on Biometrics, 1–20 (January 2008)
Faundez Zanuy, M.: Biometric security technology. IEEE Aerospace and Electronic Systems Magazine 21(6), 15–26 (2006)
Hiltgen, A.P.L.: Constructions of feebly-one-way families of permutations. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 422–434. Springer, Heidelberg (1993)
Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)
Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancellable fingerprint templates. IEEE Trans. On Pattern Analysis and Machine Intelligence 29(4), 561–572 (2007)
Abate, A.F., Nappi, M., Riccio, D., Sabatino, G.: 2D and 3D Face Recognition: A Survey. Pattern Recognition Letters (December 4, 2006)
Grassi, M., Faundez-Zanuy, M.: Face Recognition with Facial Mask Application and Neural Networks. In: Sandoval, F., Prieto, A.G., Cabestany, J., Graña, M. (eds.) IWANN 2007. LNCS, vol. 4507, pp. 709–716. Springer, Heidelberg (2007)
Martinez, A.M.: Recognizing Imprecisely Localized, Partially Occluded, and Expression Variant Faces from a Single Sample per Class. IEEE Transaction On Pattern Analysis and Machine Intelligence 24(6), 748–763 (2002)
Martin, A.: The DET curve in assessment of detection task performance. In: European Speech Processing Conference Eurospeech 1997, vol. 4, pp. 1895–1898 (1997)
Zanuy, M.F.: Face Recognition in a Transformed Domain. In: Proceedings 37th Annual International Carnahan Conference On Security Tecnology, pp. 290–297 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Grassi, M., Faundez-Zanuy, M. (2009). Protecting DCT Templates for a Face Verification System by Means of Pseudo-random Permutations. In: Cabestany, J., Sandoval, F., Prieto, A., Corchado, J.M. (eds) Bio-Inspired Systems: Computational and Ambient Intelligence. IWANN 2009. Lecture Notes in Computer Science, vol 5517. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02478-8_152
Download citation
DOI: https://doi.org/10.1007/978-3-642-02478-8_152
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02477-1
Online ISBN: 978-3-642-02478-8
eBook Packages: Computer ScienceComputer Science (R0)