Skip to main content

Eigen-Model Projections for Protected On-line Signature Recognition

  • Conference paper
Biometrics and ID Management (BioID 2011)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 6583))

Included in the following conference series:

  • 831 Accesses

Abstract

The protection of the templates stored in a biometric recognition system represents an issue of paramount importance for the security and privacy of the enrolled users, and directly affects the successful deployment of the system itself. In this paper we propose a protected on-line signature recognition system where the properties of Universal Background Models are exploited to provide a small dimensionality and a limited intra-class variability signature representation. The reported experimental results show that the employed signature representation and protection scheme allow to reach high recognition accuracy while providing protection to the considered biometric data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric Recognition: Security and Privacy Concerns. IEEE Security & Privacy Magazine 1(2), 33–42 (2003)

    Article  Google Scholar 

  2. Ratha, N.K., Connell, J.H., Bolle, R.: Enhancing Security and Privacy of Biometric-based Authentication Systems. IBM Systems Journal 40(3), 614–634 (2001)

    Article  Google Scholar 

  3. Cappelli, R., Lumini, A., Maio, D., Maltoni, D.: Fingerprint Image Reconstruction from Standard Templates. IEEE Transactions on PAMI 29(9), 1489–1503 (2007)

    Article  Google Scholar 

  4. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Sign. Proc., Special Issue on Biometrics (2008)

    Google Scholar 

  5. Goh, A., Ngo, D.C.L.: Computation of Cryptographic Keys from Face Biometrics. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 1–13. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Ratha, N., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancelable Fingerprint Templates. IEEE Transactions on PAMI 29(4), 561–572 (2007)

    Article  Google Scholar 

  7. Maiorana, E., Campisi, P., Fierrez, J., Ortega-Garcia, J., Neri, A.: Cancelable templates for sequence-based biometrics with application to on-line signature recognition. Transactions on System Man and Cybernetics Part A 40(3), 525–538 (2010)

    Article  Google Scholar 

  8. Vielhauer, C., Steinmetz, R.: Handwriting: Feature Correlation Analysis for Biometric Hashes. EURASIP Journal on Applied Signal Processing, Special Issue on Biometric, 542–558 (2004)

    Google Scholar 

  9. Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: 6th ACM Conf. Computer and Communication Security, Singapore (1999)

    Google Scholar 

  10. Tuyls, P., Akkermans, A., Kevenaar, T., Schrijen, G.J., Bazen, A., Veldhuis, R.: Practical biometric template protection system based on reliable components. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 436–446. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Van der Veen, M., Kevenaar, T., Schrijen, G.-J., Akkermans, T.H., Zuo, F.: Face biometrics with renewable templates. In: SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents (2006)

    Google Scholar 

  12. Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers 55(9), 1081–1088 (2006)

    Article  Google Scholar 

  13. Reynolds, D.A., Quatieri, T.F., Dunn, R.B.: Speaker verification using adapted gaussian mixture models. Digital Signal Processing 10(1-3), 1941 (2000)

    Article  Google Scholar 

  14. Alba-Castro, J.L., GonzĂĄlez-JimĂ©nez, D., Argones-RĂșa, E., GonzĂĄlez-Agulla, E., Otero-Muras, E., GarcĂœa-Mateo, C.: Pose-corrected face processing on video sequences for webcam-based remote biometric authentication. Journal of Electronic Imaging 17(1) (2008)

    Google Scholar 

  15. Argones RĂșa, E., PĂ©rez-Piñar LĂłpez, D., Alba Castro, J.L.: Ergodic HMM-UBM system for on-line signature verification. In: Fierrez, J., Ortega-Garcia, J., Esposito, A., Drygajlo, A., Faundez-Zanuy, M. (eds.) BioID MultiComm2009. LNCS, vol. 5707, pp. 340–347. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  16. Baum, L.E., Petrie, T., Soules, G., Weiss, N.: A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains. The Annals of Mathematical Statistics 41(1), 164–171 (1970)

    Article  MathSciNet  MATH  Google Scholar 

  17. Linde, Y., Buzo, A., Gray, R.: An Algorithm for Vector Quantizer Design. IEEE Transactions on Communications 28(1), 84–94 (1980)

    Article  Google Scholar 

  18. Gauvain, J.-L., Lee, C.-H.: Maximum A Posteriori Estimation for Multivariate Gaussian Mixture Observations of Markov Chains. IEEE Transactions on Speech and Audio Processing 2(2), 291–298 (1994)

    Article  Google Scholar 

  19. Huang, X., Acero, A., Hon, H.: Spoken Language Processing: A Guide to Theory, Algorithm, and System Development, ch. 3, pp. 111–113. Prentice Hall PTR, Upper Saddle River (2001)

    Google Scholar 

  20. Kuhn, R., Nguyen, P., Junqua, J.C., Goldwasser, L.: Eigenfaces and Eigenvoices: Dimensionality Reduction for Specialized Pattern Recognition. In: IEEE Second Workshop on Multimedia Signal Processing (1998)

    Google Scholar 

  21. Kenny, P., Boulianne, G., Dumouchel, P.: Eigenvoice Modeling With Sparse Training Data. IEEE Transactions on Speech and Audio Processing 13(3), 345–354 (2005)

    Article  Google Scholar 

  22. Li, Q., Guo, M., Chang, E.-C.: Fuzzy Extractors for Asymmetric Biometric Representation. In: IEEE CVPR (June 2008)

    Google Scholar 

  23. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  24. Ignatenko, T., Willems, F.M.J.: Biometric Systems: Privacy and Secrecy Aspects. IEEE Transactions on Information Forensics and Security 4(4), 956–973 (2009)

    Article  Google Scholar 

  25. Ignatenko, T., Willems, F.M.J.: Information Leakage in Fuzzy Commitment Schemes. IEEE Transactions on Information Forensics and Security 5(2), 337–348 (2010)

    Article  Google Scholar 

  26. Ortega-Garcia, J., et al.: MCYT baseline corpus: A bimodal biometric database. In: IEE Conference on Vision, Image and Signal Processing (2003)

    Google Scholar 

  27. Purser, M.: Introduction to Error-Correcting Codes. Artech House, Boston (1995)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Maiorana, E., Argones RĂșa, E., Alba Castro, J.L., Campisi, P. (2011). Eigen-Model Projections for Protected On-line Signature Recognition. In: Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C., Fairhurst, M.C. (eds) Biometrics and ID Management. BioID 2011. Lecture Notes in Computer Science, vol 6583. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19530-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19530-3_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19529-7

  • Online ISBN: 978-3-642-19530-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics