Skip to main content
Log in

PalmHashing: a novel approach for dual-factor authentication

  • Theoretical Advances
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

Many systems require a reliable personal authentication infrastructure to recognise the identity of a claimant before granting access to him/her. Conventional secure measures include the possession of an identity card or special knowledge like password and personal identification numbers (PINs). These methods are insecure as they can be lost, forgotten and potentially be shared among a group of co-workers for a long time without change. The fact that biometric authentication is convenient and non-refutable makes it a popular approach for a personal identification system. Nevertheless, biometric methods suffer from some inherent limitations and security threats. A more practical approach is to combine two-factor or more authenticators to achieve a higher level of security. This paper proposes a novel dual-factor authenticator based on the iterated inner product between tokenised pseudo-random numbers and user-specific palmprint features. This process generates a set of user-specific compact code called PalmHash, which is highly tolerant of data offset. There is no deterministic way to get the user-specific code without having both PalmHash and the user palmprint feature. This offers strong protection against biometric fabrication. Furthermore, the proposed PalmHashing technique is able to produce zero equal error rate (EER) and yields clean separation of the genuine and imposter populations. Hence, the false acceptance rate (FAR) can be eliminated without suffering from the increased occurrence of the false rejection rate (FRR).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8a–d
Fig. 9a, b
Fig. 10a–e
Fig. 11a, b

Similar content being viewed by others

References

  1. Bolle RM, Connel JH, Ratha NK (2002) Biometric perils and patches. Pattern Recognit 35:2727–2738

    Article  MATH  Google Scholar 

  2. Daugman J (2000) Biometric decision landscapes. Technical report no. TR482, Cambridge University Computer Laboratory, Cambridge, UK, p 482

  3. Daugman J (2004) How iris recognition works. IEEE Trans Circuits Syst Video Technol 14(1):21–30

    Article  Google Scholar 

  4. Bolle RM, Pakanti S, Ratha NK (2000) Evaluating techniques for biometrics based authentication systems (FRR). In: Proceedings of the 15th IAPR international conference on pattern recognition, Barcelona, Spain, September 2000, vol 2, pp 835–841

  5. Luciano R (2002) Denial of access in biometrics-based authentication systems. In: Proceedings of the international conference on infrastructure security (InfraSec 2002), Bristol, UK, October 2002, pp 19–29

  6. Ross A, Jain AK, Qian JZ (2001) Information fusion in biometrics. In: Proceedings of the 3rd international conference on audio- and video-based biometric person authentication (AVBPA 2001), Halmstad, Sweden, June 2001, pp 354–359

  7. Marcialis GL, Fabio R (2003) Experimental results on fusion of multiple fingerprint matchers. In: Proceedings of the 4th international conference on audio- and video-based biometric person authentication (AVBPA 2003), Guildford, Surrey, UK, June 2003, pp 814–820

  8. Wang Y, Tan T, Jain AK (2003) Combining face and iris biometrics for identity verification. In: Proceedings of the 4th international conference on audio- and video-based biometric person authentication (AVBPA 2003), Guildford, Surrey, UK, June 2003, pp 805–813

  9. Isobe Y, Seto Y, Kataoka M (2001) Development of personal authentication system using fingerprint with digital signature technologies. In: Proceedings of the 34th annual Hawaii international conference on system sciences (HICSS-34), Maui, Hawaii, January 2001, pp 4039–4047

  10. Armington J, Purdy H, Paul K, Richard M (2002) Biometric authentication in infrastructure security. In: Proceedings of the international conference on infrastructure security (InfraSec 2002), Bristol, UK, October 2002, pp 1–18

  11. Raul SR (2001) Including biometric authentication in a smart card operating system. In: Proceedings of the 3rd international conference on audio- and video-based biometric personal authentication (AVBPA 2001), Halmstad, Sweden, June 2001, pp 342–347

  12. Purdy H, John A (2003) A dual-factor authentication system featuring speaker verification and token technology. In: Proceedings of the 4th international conference on audio- and video-based biometric person authentication (AVBPA 2003), Guildford, Surrey, UK, June 2003, pp 814–820

  13. Lu G, David Z, Wang K (2003) Palmprint recognition using eigenpalms features. Pattern Recognit Lett 24(9–10):1473–1477

    Google Scholar 

  14. Wu X, David Z, Wang K (2003) Fisherpalms based on palmprint recognition. Pattern Recognit Lett 24(15):2829–2838

    Article  MATH  Google Scholar 

  15. Kong WK, Zhang D, Li W (2003) Palmprint feature extraction using 2-D Gabor filters. Pattern Recognit Lett 36(10):2339–2347

    Article  Google Scholar 

  16. Funada J, Ohta N, Mizoguchi M, Temma T, Nakanishi K, Murai A, Sugiuchi T, Wakabayashi T, Yamada Y (1998) Feature extraction method for palmprint considering elimination of creases. In: Proceedings of the 14th international conference on pattern recognition (ICPR’98), Brisbane, Australia, August 1998, vol 2, pp 1849–1854

  17. Zhang D, Shu W (1999) Two novel characteristics in palmprint verification: datum point invariance and line feature matching. Pattern Recognit 32:691–702

    Article  Google Scholar 

  18. Duta N, Jain AK, Mardia KV (2002) Matching of palmprint. Pattern Recognit Lett 23:477–485

    Article  MATH  Google Scholar 

  19. Turk MA, Pentland AP (1991) Eigenfaces for recognition. J Cogn Neuro-Sci 3(1):71–86

    Google Scholar 

  20. Wang X, Kuldip KP (2003) Feature extraction and dimensionality reduction algorithms and their applications in vowel recognition. Pattern Recognit 36(10):2429–2439

    Article  MATH  Google Scholar 

  21. Menezes A, Oorschot PV, Vanstone S (1996) Handbook of applied cryptography. CRC Press, Boca Raton, Florida

    Google Scholar 

  22. Tee C, Goh M, Teoh A, Ngo D (2003) An automated biometric palmprint verification system. In: Proceedings of the 3rd international symposium on information and communications technologies (ISICT 2003), Songkla, Thailand, September 2003, vol 2, pp 714–719

  23. Tee C, Teoh BJ, Goh M, Ngo CL (2003) Palmprint verification using PCA on wavelet subband. In: Proceedings of the 3rd international conference on advances in strategic technologies (ICAST 2003), Kuala Lumpur, Malaysia, August 2003, vol 2, pp 737–742

  24. Belhumeur PN, Hespanha JP, Kriegman DJ (1997) Eigenfaces vs. Fisherfaces: recognition using class specific linear projection. IEEE Trans Pattern Anal Machine Intell 19:711–720

    Google Scholar 

  25. Mallat S (1998) A wavelet tour of signal processing. Academic Press, San Diego

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tee Connie.

Appendices

Appendix

1.1 Subspace projection techniques

In this appendix, we provide a brief review of basic PCA, FDA and wavelet transformation theories. For a more detailed explanation, please refer to [19, 24, 25] for a comprehensive understanding on the topics.

1.2 Principal component analysis (PCA)

Let us consider a set of M palmprint images i 1, i 2,..., i M . The average palm of the set is defined as:

$$ \ifmmode\expandafter\bar\else\expandafter\=\fi{i} = \frac{1} {M}{\sum\limits_{j = 1}^M {i_{j} } } $$
(4)

Each palmprint image differs from the average palm \( \ifmmode\expandafter\bar\else\expandafter\=\fi{i} \) by the vector \( \phi _{n} = i_{n} - \ifmmode\expandafter\bar\else\expandafter\=\fi{i}. \) A covariance matrix is constructed where:

$$ C = {\sum\limits_{j = 1}^M {\phi _{j} \phi ^{{\text{T}}}_{j} } } $$
(5)

Then, eigenvectors v k and eigenvalues λ k with symmetric matrix C are calculated. v k determines the linear combination of M difference images with φ to form the eigenbases:

$$ b_{l} = {\sum\limits_{k = 1}^M {v_{{lk}} \phi _{k} } },\quad l = 1, \ldots ,\;M $$
(6)

From these eigenbases, K(<M) bases are selected to correspond to the K highest eigenvalues.

The set of palmprint images {i} is transformed into its eigenbase components (projected into the palm space) by the operation:

$$ \omega _{{nk}} = b_{k} {\left( {i_{n} - \ifmmode\expandafter\bar\else\expandafter\=\fi{i}} \right)} $$
(7)

where n=1,..., M and k=1, ..., K.

The weights obtained form a vector Ω n =[ω n1, ω n2,..., ω nK ], which describes the contribution of each eigenbase in representing the input palm image, treating the eigenbases as a basis set for the palm images.

1.3 Fisher discriminant analysis (FDA)

Consider a set of M palmprint images having c classes of images, with each class containing n set images, i 1, i 2,..., i n . Let the mean of the images in each class and the total mean of all images be represented by \( \ifmmode\expandafter\tilde\else\expandafter\~\fi{m}_{c} \) and m, respectively. The images in each class are centred as:

$$ \phi ^{c}_{n} = i^{c}_{n} - \ifmmode\expandafter\tilde\else\expandafter\~\fi{m}_{c} $$
(8)

and the class mean is centred as:

$$ \omega _{c} = \ifmmode\expandafter\tilde\else\expandafter\~\fi{m}_{c} - m $$
(9)

The centred images are then combined side by side into a data matrix. By using this data matrix, an orthonormal base U is obtained by calculating the full set of eigenvectors of the covariance matrix \(\phi ^{{c{\text{T}}}}_{n} \phi ^{c}_{n}\) The centred images are then projected into this orthonormal base as follows:

$$ \ifmmode\expandafter\hat\else\expandafter\^\fi{\phi }^{c}_{n} = U^{{\text{T}}} \phi ^{c}_{n} $$
(10)

The centred means are also projected into the orthonormal base as:

$$ \ifmmode\expandafter\hat\else\expandafter\^\fi{\omega }_{c} = U^{{\text{T}}} \omega _{c} $$
(11)

Based on this information, the within-class scatter matrix S W is calculated as:

$$ S_{{\text{W}}} = {\sum\limits_{j = 1}^c {{\sum\limits_{k = 1}^{n_{j} } {\widehat{{\phi ^{j}_{k} }}\widehat{{\phi ^{j}_{k} }}^{{\text{T}}} } }} } $$
(12)

and the between-class scatter matrix S B is calculated as:

$$ S_{{\text{B}}} = {\sum\limits_{j = 1}^c {n_{j} \ifmmode\expandafter\tilde\else\expandafter\~\fi{\omega }_{j} \ifmmode\expandafter\tilde\else\expandafter\~\fi{\omega }^{{\text{T}}}_{j} } } $$
(13)

The generalised eigenvectors V and eigenvalues λ of the within-class and between-class scatter matrices are solved as follows:

$$ S_{{\text{B}}} V = \lambda S_{{\text{W}}} V $$
(14)

The eigenvectors are sorted according to their associated eigenvalues. The first c−1 eigenvectors are kept as the Fisher basis vectors, W. The rotated images α M , where α M =U T i M , are projected into the Fisher base by:

$$ \ifmmode\expandafter\bar\else\expandafter\=\fi{\omega }_{{nk}} = W^{{\text{T}}} \alpha _{M} $$
(15)

where n=1,..., M and k=1,..., M−1.

The weights obtained is used to form a vector \( \Upsilon _{n} = {\left[ {\ifmmode\expandafter\bar\else\expandafter\=\fi{\omega }_{{n1}} ,\;\ifmmode\expandafter\bar\else\expandafter\=\fi{\omega }_{{n2}} , \ldots ,\;\ifmmode\expandafter\bar\else\expandafter\=\fi{\omega }_{{nK}} } \right]} \) that describes the contribution of each Fisherpalm in representing the input palm image by treating Fisherpalms as a basis set for the palm images.

1.4 Wavelet transformation

The wavelet decomposition of a signal f(x) can be obtained by the convolution of a signal with a family of real orthonormal bases, ψ a,b (x):

$$ {\left( {W_{\psi } f{\left( x \right)}} \right)}{\left( {a,\;b} \right)} = {\left| a \right|}^{{ - \frac{1} {2}}} {\int\limits_\mathbb{R} {f{\left( x \right)}\psi {\left( {\frac{{x - b}} {a}} \right)}} }{\text{d}}x\quad f{\left( x \right)} \in L^{2} {\left( \mathbb{R} \right)} $$
(16)

where a, b∈ℝ and a≠0 are the dilation and translation parameters, respectively. The basis function ψ a,b (x) is obtained through the translation and dilation of a kernel function ψ(x), known as mother wavelet, as defined below:

$$ \psi _{{a,b}} {\left( x \right)} = 2^{{ - a \mathord{\left/ {\vphantom {a 2}} \right. \kern-\nulldelimiterspace} 2}} \psi {\left( {2^{{ - a}} x - b} \right)} $$
(17)

The mother wavelet ψ(x) can be constructed from a scaling function, ϕ(x). The scaling function ϕ(x) satisfies the following two-scale difference equation:

$$ \phi {\left( x \right)} = {\sqrt 2 }{\sum\limits_n {h{\left( n \right)}\phi {\left( {2x - n} \right)}} } $$
(18)

where h(n) is the impulse response of a discrete filter which has to meet several conditions for the set of basis wavelet functions to be orthonormal and unique. The scaling function ϕ(x) is related to the mother wavelet ψ(x) via:

$$ \psi {\left( x \right)} = {\sqrt 2 }{\sum\limits_n {g{\left( n \right)}\phi {\left( {2x - n} \right)}} } $$
(19)

The coefficients of the filter g(n) are conveniently extracted from filter h(n) from the following relation:

$$ g{\left( n \right)} = {\left( { - 1} \right)}^{n} h{\left( {l - n} \right)} $$
(20)

The discrete filters h(n) and g(n) are the quadrature mirror filters (QMF), and can be used to implement a wavelet transform instead of explicitly using a wavelet function.

For 2-D signal such as images, there exists an algorithm similar to the 1-D case for 2-D wavelets and scaling functions obtained from 1-D ones by the tensiorial product. This kind of 2-D WT leads to a decomposition of the approximation coefficients at level j−1 in four components: the approximations at level j and the details in three orientations (horizontal, vertical and diagonal):

$$ L_{j} {\left( {m,\;n} \right)} = {\left[ {H_{x} * {\left[ {H_{y} * L_{{j - 1}} } \right]}_{{ \downarrow 2,1}} } \right]}_{{ \downarrow 1,2}} {\left( {m,\;n} \right)} $$
(21)
$$ D_{{j{\text{vertical}}}} {\left( {m,\;n} \right)} = {\left[ {H_{x} * {\left[ {G_{y} * L_{{j - 1}} } \right]}_{{ \downarrow 2,1}} } \right]}_{{ \downarrow 1,2}} {\left( {m,\;n} \right)} $$
(22)
$$ D_{{j{\text{horizontal}}}} {\left( {m,\;n} \right)} = {\left[ {G_{x} * {\left[ {H_{y} * L_{{j - 1}} } \right]}_{{ \downarrow 2,1}} } \right]}_{{ \downarrow 1,2}} {\left( {m,\;n} \right)} $$
(23)
$$ D_{{j{\text{diagonal}}}} {\left( {m,\;n} \right)} = {\left[ {G_{x} * {\left[ {G_{y} * L_{{j - 1}} } \right]}_{{ \downarrow 2,1}} } \right]}_{{ \downarrow 1,2}} {\left( {m,\;n} \right)} $$
(24)

where, * denotes the convolution operator \( \downarrow 2,1\;{\left( { \uparrow 2,1} \right)} \) subsampling along the rows (columns) and H and G are a low-pass and bandpass filter, respectively. Similarly, two levels of the wavelet decomposition are obtained by applying WT on the low-frequency band sequentially.

Originality and contribution

Traditional identity authenticators that use ID- or password-based techniques are not secure as IDs and passwords can be lost, forgotten and potentially be shared in a workgroup for a long time without change. Using biometric features is a reliable personal authentication method as it can positively link the system usage to the actual user. However, biometrics suffer from some inherent biometric threats and limitations. For example, biometric data cannot be re-issued once it is compromised; and the performance of the system requires a tradeoff between the FAR and FRR variable factors. There is suggestion to employ multimodal biometrics fusion to improve the overall performance as it can reduce FRR without sacrificing the FAR criteria. Nonetheless, the non-revocable biometric issue still remains unsolved. A more practical approach is to combine two-factor or more authenticators. This paper proposes a dual-factor authenticator based on the iterated inner product between tokenised pseudo-random numbers and user-specific palmprint features. This process generates a set of user-specific compact code called PalmHash. PalmHash is highly tolerant of data offset, thus, resulting in highly correlated bitstrings for palmprints from the same user. Moreover, there is no deterministic way to get the user-specific code without having both the pseudo-random number and the user palmprint feature. This offers strong protection against biometric fabrication. Furthermore, the proposed PalmHashing technique has significant advantages over a sole biometric factor. For example, it is able to produce a zero EER and yield clean separation of the genuine and imposter populations. These accomplishments offer the benefit of elimination of FAR without suffering from the increased occurrence of FRR.

Biographies of the authors

Tee Connie obtained her B.IT (Hons) Information Systems Engineering in 2002 from Multimedia University (MMU), Malaysia. Upon graduation, she joined the Faculty of Information Science and Technology, MMU as a tutor and researcher. Currently, she is a member of the Center of Excellent in Biometrics and Bioinformatics at the same university. Her research interests include biometrics, image processing and Web 3D.

Andrew Teoh Beng Jin obtained his B.Eng (Electronics) in 1999 and his Ph.D degree in 2003 from the National University of Malaysia. He is currently a lecturer and an associate Dean of the Faculty of Information Science and Technology, Multimedia University. He held the post of co-chair (Biometrics Division) in the Center of Excellent in Biometrics and Bioinformatics at the same university. His research interest is in multimodal biometrics, pattern recognition, multimedia signal processing and Internet security.

Goh Kah Ong Michael received his Bachelor of Information Technology (Software Engineering) from Multimedia University, Malaysia in 2002. Upon graduation, he joined MMU as an assistant lecturer for the Center of Affiliate and Diploma Programme (CADP). A few months later, he transferred to the Faculty of Information Science & Technology (FIST) as a tutor and researcher. Currently, he is a member of Center of Biometrics and Bioinformatics (CBB). His research interests include biometrics, Web 3D and artificial intelligent agent technology.

David Chek Ling Ngo is an associate Professor and the Dean of the Faculty of Information Science and Technology at Multimedia University, Malaysia. He has worked there since 1999. Ngo was awarded a B.AI in Microelectronics and Electrical Engineering and a Ph.D in Computer Science in 1990 and 1995 respectively, both from Trinity College, Dublin. Ngo’s research interests lie in the area of automatic screen design, aesthetic systems, biometric encryption and knowledge management. He is an author and co-author of over 20 invited and refereed papers. He is a member of the Review Committee of Displays and Multimedia Cyberscape.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Connie, T., Teoh, A., Goh, M. et al. PalmHashing: a novel approach for dual-factor authentication. Pattern Anal Applic 7, 255–268 (2004). https://doi.org/10.1007/s10044-004-0223-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-004-0223-4

Keywords

Navigation