Skip to main content
Log in

Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Two-dimensional PalmPhasor Code (2DPPC) was proposed as a means of cancelable palmprint coding scheme for secure palmprint template protection. 2DPPC is generated from Gabor features, whereby palmprint image and 2DGabor filters are convoluted. However, vertical correlation (VC), which is a notion of inherent correlation between the vertically adjacent entries in 2DPPC, can weaken the robustness against statistical analysis attacks. When the orientation of 2DGabor filter approaches vertical orientation, the real and imaginary parts of Gabor features can be transposed to suppress the VC in 2DPPC. Yet, the VC analysis and orientation range of transposition for 2DPPC generation are remained unsolved. In this paper, we attempt to bridge the relation between the orientation of 2DGabor filter and the VC in 2DPPC. By following the analysis, we determine the exact orientation range of transposition for VC suppression.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Bhatnagar G, Wu QMJ, Raman B (2012) A new fractional random wavelet transform for fingerprint security. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 42(1):262–275

    Article  Google Scholar 

  2. Blondel VD, Tsitsiklis JN (2000) A survey of computational complexity results in systems and control. Automatica 36(9):1249–1274

    Article  MathSciNet  MATH  Google Scholar 

  3. Cheung KH, Kong A, Zhang D et al (2005) An analysis on accuracy of cancelable biometrics based on BioHashing. Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes In Computer Science 3683:1168–1172

    Google Scholar 

  4. Cheung KH, Kong A, Zhang D (2005) An analysis on invertibility of cancelable biometrics based on BioHashing. Int. Conf. Imaging Science, Systems, and Technology:40–45

  5. Connie T, Teoh ABJ, Goh M et al (2005) PalmHashing: a novel approach for cancelable biometrics. Inf Process Lett 93(1):1–5

    Article  MathSciNet  Google Scholar 

  6. Cui JR, Wen JJ, Fan ZZ (2014) Appearance-based bidirectional representation for palmprint recognition. Multimed Tools Appl. doi:10.1007/s11042-014-1887-4

    Google Scholar 

  7. Guo ZH, Zhang D, Zhang L et al (2009) Palmprint verification using binary orientation co-occurrence vector. Pattern Recogn Lett 30(13):1219–1227

    Article  Google Scholar 

  8. Hammami M, Jemaa SB, Ben-Abdallah H (2014) Selection of discriminative sub-regions for palmprint recognition. Multimed Tools Appl 68(3):1023–1050

    Article  Google Scholar 

  9. http://www4.comp.polyu.edu.hk/%7Ebiometrics/

  10. Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP Journal on Advances Signal Processing, Special Issue on Biometrics:1–20

  11. Jia W, Huang DS, Zhang D (2007) Palmprint verification based on robust line orientation code. Pattern Recogn 41(5):1504–1513

    Article  Google Scholar 

  12. Kong A, Cheung KH, Zhang D et al (2006) An analysis of BioHashing and its variants. Pattern Recogn 39(7):1359–1368

    Article  MATH  Google Scholar 

  13. Kong AWK, Zhang D (2004) Feature-level fusion for effective palmprint authentication. 1st Int. Conf. Biometric Authentication:761–767

  14. Kong AWK, Zhang D (2004) Competitive coding scheme for palmprint verification. 17th Int. Conf. Pattern Recognition:520–523

  15. Kong A, Zhang D, Kamel M (2009) A survey of palmprint recognition. Pattern Recogn 42(7):1408–1418

    Article  Google Scholar 

  16. Leng L, Teoh ABJ, Li M et al. (2013) Orientation range for transposition according to the correlation analysis of 2DPalmHash Code. IEEE Int. Symp. Biometrics & Security Technologies:230–234

  17. Leng L, Teoh ABJ, Li M et al (2013) Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition. Neurocomputing 131:377–387

    Article  Google Scholar 

  18. Leng L, Zhang JS (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34(6):1979–1989

    Article  Google Scholar 

  19. Leng L, Zhang JS (2013) PalmHash Code vs PalmPhasor Code. Neurocomputing 108:1–12

    Article  MathSciNet  Google Scholar 

  20. Leng L, Zhang JS, Chen G et al. (2011) Two dimensional PalmPhasor enhanced by multi-orientation score level fusion. 8th FTRA Int. Conf. Secure and Trust Computing, Data Management, and Applications:122–129

  21. Leng L, Zhang JS, Khan MK et al (2011) Cancelable PalmCode generated from randomized Gabor filters for palmprint template protection. Sci Res Essays 6(4):784–792

    Google Scholar 

  22. Li HJ, Zhang JS, Wang LH (2012) Robust palmprint identification based on directional representations and compressed sensing. Multimed Tools and Appl. doi:10.1007/s11042-012-1240-8

    Google Scholar 

  23. Ma B, Wang YH, Li CL et al (2013) Secure multimodal biometric authentication with wavelet quantization based fingerprint. Multimed Tools Appl. doi:10.1007/s11042-013-1372-5

    Google Scholar 

  24. Marsico MD, Nappi M, Riccio D (2012) ES-RU: an entropy based rule to select representative templates in face surveillance. Multimed Tools Appl. doi:10.1007/s11042-012-1279-6

    Google Scholar 

  25. Peng JL, Li Q, El-Latif AAA et al (2013) Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics. Multimed Tools Appl. doi:10.1007/s11042-013-1817-x

    Google Scholar 

  26. Ratha N, Connell J, Bolle R (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM System J 40(3):614–634

    Article  Google Scholar 

  27. Rathgeb C, Uhl A (2012) A Statistical attack against fuzzy commitment scheme. IET Biometrics 1(2):94–104

    Article  Google Scholar 

  28. Shannon CE (1949) Communication theory of secrecy system. Bell System Technical J 28–4:656–715

    Article  MathSciNet  Google Scholar 

  29. Sun ZN, Tan T, Wang Y et al. (2005) Ordinal palmprint representation for personal identification. IEEE Int. Conf. Computer Vision Pattern Recognition:279–284

  30. Teoh ABJ, Lim MH (2010) Cancelable biometrics. Scholarpedia 5(1):9201–9201

    Article  Google Scholar 

  31. Teoh ABJ, Ngo DCL (2005) Cancellable biometrics featuring with tokenised random number. Pattern Recogn Lett 26(10):1454–1460

    Article  Google Scholar 

  32. Teoh ABJ, Ngo DCL (2006) Biophasor: token supplemented cancellable biometrics. 9th Int. Conf. Control, Automation, Robotics and Vision:1–5

  33. Teoh ABJ, Ngo DCL, Goh A (2004) BioHashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(1):2245–2255

    Google Scholar 

  34. Teoh ABJ, Toh KA, Yip WK (2007) 2N discretisation of BioPhasor in cancellable biometric. Int. Conf. Biometrics:435–444

  35. Teoh ABJ, Yuang CT (2007) Cancelable biometrics realization with multispace random projections. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 37(5):1096–1106

    Article  Google Scholar 

  36. Zhang D, Kong AWK, You J et al (2003) Online palmprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(9):1041–1050

    Article  Google Scholar 

  37. Zhang L, Li HY, Niu JY (2012) Fragile bits in palmprint recognition. IEEE Sig Process Lett 19(10):663–666

    Article  Google Scholar 

Download references

Acknowledgements

This work has been supported by Institute of BioMed-IT, Energy-IT and Smart-IT Technology (BEST), a Brain Korea 21 Plus Program, Yonsei University, and by Basic Science Research Program through the National Research Foundation (NRF) of Korea funded by Ministry of Science, ICT and Future Planning (2013006574).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrew Beng Jin Teoh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Leng, L., Teoh, A.B.J., Li, M. et al. Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code. Multimed Tools Appl 74, 11683–11701 (2015). https://doi.org/10.1007/s11042-014-2255-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2255-0

Keywords