skip to main content
10.1145/2492517.2492598acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Cancelable fusion using social network analysis

Published: 25 August 2013 Publication History

Abstract

In this paper, novel cancelable biometric template generation algorithm using Social Network Analysis is presented. Two sets of features are fused using Social Network. Proposed fusion technique is cancelable. Eigenvector centrality is used to generate final sets of features from the Virtual Social Network (VSN). The domain transformation of features using VSN confirms the cancelability in biometric template generation.

References

[1]
A. Ross, K. Nandakumar and A. K. Jain, Handbook of Multibiometrics, New York: Springer-Verlag, 2006.
[2]
T. Matsumoto, M. Hirabayashi and K. Sato, "A vulnerability evaluation of iris matching," in Proceed-ings of the Symposium on Cryptography and Information Security, Iwate, Japan, 2004.
[3]
Y. C. Feng, P. C. Yuen and A. K. Jain, "A Hybrid Approach for Generating Secure and Discriminating Face Template," IEEE Trans. On Information Forensics and Security, vol. 5, no. 1, pp. 103--117, 2010.
[4]
N. Ratha, S. Chikkerur, J. Connell and R. Bolle, "Generating cancelable fingerprint templates," IEEE Trans. Pattern Anal. Mach. Intell, vol. 29, no. 4, pp. 561--572, 2007.
[5]
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy and B. V. K. Vijaya K., "Biometric Encryption using image processing," in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, 1998.
[6]
N. Memon, R. Alhajj "Social Networks: A Powerful Model for Serving a Wide Range of Domains", From Sociology to Computing in Social Networks, Part-1, Springer Vienna, pp. 1--9, 2010.
[7]
A. Alder, "Sample images can be independently restored from face recognition templates," Elect. Comput. Eng, vol. 2, pp. 1163--1166, 2003.
[8]
A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in Proc. Sixth ACM Conf. Comp. and Commun. Security, 1999.
[9]
A. Juels and M. Sudan, "A fuzzy vault scheme," in IEEE International Symposium on Information Theory, 2002.
[10]
M. Newman, "Networks: An Introduction," Oxford University Press., Oxford, UK, 2010.
[11]
Freeman and Linton, "A set of measures of centrality based upon betweenness," Sociometry, vol. 40, p. 35--41, 1977.
[12]
Brandes and Ulrik, "A faster algorithm for betweenness centrality," Journal of Mathematical Sociology, vol. 25, p. 163--177, 2001.
[13]
D. Maltoni, D. Maio, A. K. Jain and S. Prabhakar, Handbook of Fingerprint Recognition, Berlin, Germany: Springer, 2003.
[14]
A. K. Jain, K. Nandakumar and A. Nagar, "Biometric Template Security," EURASIP Journal on Advances in Signal Processing, vol. 2008: 579416, 2008.
[15]
F. Samaria and A. Harter, "Parameterization of a stochastic model for human face identification," in 2nd IEEE Workshop Appl. Comput. Vis., Sarasota, FL, 1994.
[16]
M. Zhichun, X. Zhengguang, L. Yuan and Z. Wang, "A New Technology of Biometric Indentification-Ear Recognition.," in The 4th Chinese Conference on Biometric Recognition, Beijing, 2003.
[17]
J. P. Phillips, H. Wechsler and P. Rauss, "The FERET database and evaluation procedure for face-recognition algorithms," Image and Vision Computing, vol. 16, no. 5, pp. 295--306, 1998.
[18]
U. Brandes and C. Pich, "Centrality estimation in large networks," International Journal of Bifurcation and Chaos, vol. 17, no. 7, pp. 2303--2318, 2007.
[19]
P. Bonacich, "Some unique properties of eigenvector centrality," Social Networks, vol. 29, p. 555--564, 2007.
[20]
L. Freeman, "Centrality in networks conceptual clarification," Social Networks, vol. 1, no. 1, p. 215--239, 1979.
[21]
P. Bonacich, "Factoring and weighting approaches to clique identification," Journal of Mathematical Sociology, vol. 2, p. 113--120, 1972.
[22]
C. Sanderson and K. Paliwal, "Polynomial Features for Robust Face Authentication," IEEE International Conference on Image Processing, vol. 3, pp. 997--1000, 2002.

Cited By

View all
  • (2019)Cancelable Biometrics: a comprehensive surveyArtificial Intelligence Review10.1007/s10462-019-09767-8Online publication date: 9-Oct-2019
  • (2017)Crisis Management Using Centrality Measurement in Social NetworksInternational Journal of Mobile Computing and Multimedia Communications10.4018/IJMCMC.20170101028:1(19-33)Online publication date: Jan-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASONAM '13: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
August 2013
1558 pages
ISBN:9781450322409
DOI:10.1145/2492517
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 August 2013

Check for updates

Author Tags

  1. cancelable biometric
  2. cancelable fusion
  3. eigenvector centrality
  4. social network analysis
  5. template protection

Qualifiers

  • Research-article

Conference

ASONAM '13
Sponsor:
ASONAM '13: Advances in Social Networks Analysis and Mining 2013
August 25 - 28, 2013
Ontario, Niagara, Canada

Acceptance Rates

Overall Acceptance Rate 116 of 549 submissions, 21%

Upcoming Conference

KDD '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Cancelable Biometrics: a comprehensive surveyArtificial Intelligence Review10.1007/s10462-019-09767-8Online publication date: 9-Oct-2019
  • (2017)Crisis Management Using Centrality Measurement in Social NetworksInternational Journal of Mobile Computing and Multimedia Communications10.4018/IJMCMC.20170101028:1(19-33)Online publication date: Jan-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media