Abstract
Two-dimensional PalmPhasor Code (2DPPC) was proposed as a means of cancelable palmprint coding scheme for secure palmprint template protection. 2DPPC is generated from Gabor features, whereby palmprint image and 2DGabor filters are convoluted. However, vertical correlation (VC), which is a notion of inherent correlation between the vertically adjacent entries in 2DPPC, can weaken the robustness against statistical analysis attacks. When the orientation of 2DGabor filter approaches vertical orientation, the real and imaginary parts of Gabor features can be transposed to suppress the VC in 2DPPC. Yet, the VC analysis and orientation range of transposition for 2DPPC generation are remained unsolved. In this paper, we attempt to bridge the relation between the orientation of 2DGabor filter and the VC in 2DPPC. By following the analysis, we determine the exact orientation range of transposition for VC suppression.








Similar content being viewed by others
References
Bhatnagar G, Wu QMJ, Raman B (2012) A new fractional random wavelet transform for fingerprint security. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 42(1):262–275
Blondel VD, Tsitsiklis JN (2000) A survey of computational complexity results in systems and control. Automatica 36(9):1249–1274
Cheung KH, Kong A, Zhang D et al (2005) An analysis on accuracy of cancelable biometrics based on BioHashing. Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes In Computer Science 3683:1168–1172
Cheung KH, Kong A, Zhang D (2005) An analysis on invertibility of cancelable biometrics based on BioHashing. Int. Conf. Imaging Science, Systems, and Technology:40–45
Connie T, Teoh ABJ, Goh M et al (2005) PalmHashing: a novel approach for cancelable biometrics. Inf Process Lett 93(1):1–5
Cui JR, Wen JJ, Fan ZZ (2014) Appearance-based bidirectional representation for palmprint recognition. Multimed Tools Appl. doi:10.1007/s11042-014-1887-4
Guo ZH, Zhang D, Zhang L et al (2009) Palmprint verification using binary orientation co-occurrence vector. Pattern Recogn Lett 30(13):1219–1227
Hammami M, Jemaa SB, Ben-Abdallah H (2014) Selection of discriminative sub-regions for palmprint recognition. Multimed Tools Appl 68(3):1023–1050
Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP Journal on Advances Signal Processing, Special Issue on Biometrics:1–20
Jia W, Huang DS, Zhang D (2007) Palmprint verification based on robust line orientation code. Pattern Recogn 41(5):1504–1513
Kong A, Cheung KH, Zhang D et al (2006) An analysis of BioHashing and its variants. Pattern Recogn 39(7):1359–1368
Kong AWK, Zhang D (2004) Feature-level fusion for effective palmprint authentication. 1st Int. Conf. Biometric Authentication:761–767
Kong AWK, Zhang D (2004) Competitive coding scheme for palmprint verification. 17th Int. Conf. Pattern Recognition:520–523
Kong A, Zhang D, Kamel M (2009) A survey of palmprint recognition. Pattern Recogn 42(7):1408–1418
Leng L, Teoh ABJ, Li M et al. (2013) Orientation range for transposition according to the correlation analysis of 2DPalmHash Code. IEEE Int. Symp. Biometrics & Security Technologies:230–234
Leng L, Teoh ABJ, Li M et al (2013) Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition. Neurocomputing 131:377–387
Leng L, Zhang JS (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34(6):1979–1989
Leng L, Zhang JS (2013) PalmHash Code vs PalmPhasor Code. Neurocomputing 108:1–12
Leng L, Zhang JS, Chen G et al. (2011) Two dimensional PalmPhasor enhanced by multi-orientation score level fusion. 8th FTRA Int. Conf. Secure and Trust Computing, Data Management, and Applications:122–129
Leng L, Zhang JS, Khan MK et al (2011) Cancelable PalmCode generated from randomized Gabor filters for palmprint template protection. Sci Res Essays 6(4):784–792
Li HJ, Zhang JS, Wang LH (2012) Robust palmprint identification based on directional representations and compressed sensing. Multimed Tools and Appl. doi:10.1007/s11042-012-1240-8
Ma B, Wang YH, Li CL et al (2013) Secure multimodal biometric authentication with wavelet quantization based fingerprint. Multimed Tools Appl. doi:10.1007/s11042-013-1372-5
Marsico MD, Nappi M, Riccio D (2012) ES-RU: an entropy based rule to select representative templates in face surveillance. Multimed Tools Appl. doi:10.1007/s11042-012-1279-6
Peng JL, Li Q, El-Latif AAA et al (2013) Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics. Multimed Tools Appl. doi:10.1007/s11042-013-1817-x
Ratha N, Connell J, Bolle R (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM System J 40(3):614–634
Rathgeb C, Uhl A (2012) A Statistical attack against fuzzy commitment scheme. IET Biometrics 1(2):94–104
Shannon CE (1949) Communication theory of secrecy system. Bell System Technical J 28–4:656–715
Sun ZN, Tan T, Wang Y et al. (2005) Ordinal palmprint representation for personal identification. IEEE Int. Conf. Computer Vision Pattern Recognition:279–284
Teoh ABJ, Lim MH (2010) Cancelable biometrics. Scholarpedia 5(1):9201–9201
Teoh ABJ, Ngo DCL (2005) Cancellable biometrics featuring with tokenised random number. Pattern Recogn Lett 26(10):1454–1460
Teoh ABJ, Ngo DCL (2006) Biophasor: token supplemented cancellable biometrics. 9th Int. Conf. Control, Automation, Robotics and Vision:1–5
Teoh ABJ, Ngo DCL, Goh A (2004) BioHashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(1):2245–2255
Teoh ABJ, Toh KA, Yip WK (2007) 2N discretisation of BioPhasor in cancellable biometric. Int. Conf. Biometrics:435–444
Teoh ABJ, Yuang CT (2007) Cancelable biometrics realization with multispace random projections. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 37(5):1096–1106
Zhang D, Kong AWK, You J et al (2003) Online palmprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(9):1041–1050
Zhang L, Li HY, Niu JY (2012) Fragile bits in palmprint recognition. IEEE Sig Process Lett 19(10):663–666
Acknowledgements
This work has been supported by Institute of BioMed-IT, Energy-IT and Smart-IT Technology (BEST), a Brain Korea 21 Plus Program, Yonsei University, and by Basic Science Research Program through the National Research Foundation (NRF) of Korea funded by Ministry of Science, ICT and Future Planning (2013006574).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Leng, L., Teoh, A.B.J., Li, M. et al. Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code. Multimed Tools Appl 74, 11683–11701 (2015). https://doi.org/10.1007/s11042-014-2255-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2255-0