Skip to main content

A Fuzzy Vault Scheme for Feature Fusion

  • Conference paper
Biometric Recognition (CCBR 2011)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 7098))

Included in the following conference series:

Abstract

Widespread application of biometric authentication brings about new problem of privacy. Biometric template protection is becoming a hot research. Efficient feature fusion is deemed to have good performance possibly. In this paper we proposed a fuzzy vault scheme for feature fusion. In our scheme, two facial features Multi-Block Local Binary Pattern (MB-LBP) and Principal Component Analysis (PCA) coefficients are extracted. A key is split into two overlapped subkeys. One is utilized to generate a set of helper data from MB-LBP. The other is utilized to generate another set of helper data from PCA coefficients. Two sets of helper data are submerged into the chaff points set and the final fuzzy vault is generated. In the fuzzy vault decoding, the MB-LBP and PCA coefficients of the query face image are utilized to recover two subkeys from the fuzzy vault. The final key is obtained from two subkeys. Because two subkeys are overlapped and complementary to each other, our scheme can obtain good authentication performance. It is confirmed by the experimental results.

This paper is partially supported by the Beijing municipal Nature Science Foundation under Grant No 4091004 and program of Beijing Municipality excellent under Grant No 2009D005015000010.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Signal Processing, Special Issue on Biometrics, 1–20 (January 2008)

    Google Scholar 

  2. Hong, L., Jain, A.: Integrating Faces and Fingerprints for Personal Identification. IEEE Trans. PAMI 20, 1295–1307 (1998)

    Article  Google Scholar 

  3. Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: IEEE International Symposium on Information Theory, pp. 408–426 (2002)

    Google Scholar 

  4. Nandakumar, K., Jain, A.K.: Muitibiometric Template Security Using Fuzzy Vault. In: 2nd IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2008, pp. 1–6 (2008)

    Google Scholar 

  5. Zhang, L., Chu, R., Xiang, S., Liao, S., Li, S.Z.: Face Detection Based on Multi-Block LBP Representation. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 11–18. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Zhang, S.C., Wu, L.F., Wang, Y.: Cascade MR-ASM for location facial feature points. In: Biometrics International Conference, pp. 683–691 (2007)

    Google Scholar 

  7. Turk, M.A., Pentland, A.P.: Eigenfaces for recognition. Journal of Cognitive Neuroscience 3(1), 71–86 (1991)

    Article  Google Scholar 

  8. ORL face database, http://www.cl.cam.ac.uk/research/dtg/attarchive/facedata-base.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, L., Xiao, P., Jiang, S., Yang, X. (2011). A Fuzzy Vault Scheme for Feature Fusion. In: Sun, Z., Lai, J., Chen, X., Tan, T. (eds) Biometric Recognition. CCBR 2011. Lecture Notes in Computer Science, vol 7098. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25449-9_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25449-9_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25448-2

  • Online ISBN: 978-3-642-25449-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics