[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Binary Discriminant Analysis for Generating Binary Face Template

Published: 01 April 2012 Publication History

Abstract

Although biometrics is more reliable, robust and convenient than traditional methods, security and privacy concerns are growing. Biometric templates stored in databases are vulnerable to attacks if they are not protected. To solve this problem, a biometric cryptosystem approach that combines cryptography and biometrics has been proposed. Under this approach, helper data is stored in a database rather than the original reference biometric templates. The helper data is generated from the original reference biometric templates and a cryptographic key with error-correcting coding schemes. During decoding, the same cryptographic key can be released from the helper data if and only if the input query data is close enough to the reference. It is assumed that the helper data does not reveal any information about the original reference biometric templates. Thus, the biometric cryptosystem approach can protect the original reference templates. However, error-correcting coding algorithms (e.g., the fuzzy commitment scheme and fuzzy vault) normally require finite input. As most face templates are real-valued templates, a binarization scheme transforming the original real-valued face templates into binary templates is required. Most existing binarization schemes are performed in an ad hoc manner and do not consider the discriminability of the binary template. The recognition accuracy based on the binary templates is thus degraded. In view of this limitation, we propose a new binarization scheme by optimizing binary template discriminability. A novel binary discriminant analysis is developed to transform a real-valued template into a binary template. Differentiation is hard to perform in binary space and direct optimization is difficult. To solve this problem, we construct a continuous function based on the perceptron to optimize binary template discriminability. Our experimental results show that the proposed algorithm improves binary template discriminability.

Cited By

View all
  • (2024)Eyes See Hazy while Algorithms Recognize Who You AreACM Transactions on Privacy and Security10.1145/363229227:1(1-23)Online publication date: 10-Jan-2024
  • (2024)TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High AccuracyIEEE Transactions on Mobile Computing10.1109/TMC.2023.326507123:4(2832-2848)Online publication date: 1-Apr-2024
  • (2024)Cross-Layer AKA Protocol for Industrial Control Based on Channel State InformationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.344364719(8263-8274)Online publication date: 1-Jan-2024
  • Show More Cited By
  1. Binary Discriminant Analysis for Generating Binary Face Template

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Information Forensics and Security
    IEEE Transactions on Information Forensics and Security  Volume 7, Issue 2
    April 2012
    493 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 April 2012

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Eyes See Hazy while Algorithms Recognize Who You AreACM Transactions on Privacy and Security10.1145/363229227:1(1-23)Online publication date: 10-Jan-2024
    • (2024)TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High AccuracyIEEE Transactions on Mobile Computing10.1109/TMC.2023.326507123:4(2832-2848)Online publication date: 1-Apr-2024
    • (2024)Cross-Layer AKA Protocol for Industrial Control Based on Channel State InformationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.344364719(8263-8274)Online publication date: 1-Jan-2024
    • (2023)An PPG signal and body channel based encryption method for WBANsFuture Generation Computer Systems10.1016/j.future.2022.11.020141:C(704-712)Online publication date: 1-Apr-2023
    • (2023)AuthConFormerComputers and Security10.1016/j.cose.2023.103122127:COnline publication date: 1-Apr-2023
    • (2022)Artificial Intelligence Meets Kinesthetic IntelligenceProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security10.1145/3488932.3523257(1034-1048)Online publication date: 30-May-2022
    • (2022)Fundamental Limits-Achieving Polar Code Designs for Biometric Identification and AuthenticationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.313774917(180-195)Online publication date: 1-Jan-2022
    • (2022)Machine vision gait-based biometric cryptosystem using a fuzzy commitment schemeJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2019.10.01134:2(204-217)Online publication date: 1-Feb-2022
    • (2022)Biometric cryptosystems: a comprehensive surveyMultimedia Tools and Applications10.1007/s11042-022-13817-982:11(16635-16690)Online publication date: 30-Sep-2022
    • (2021)Face Template Protection through Residual Learning Based Error-Correcting CodesProceedings of the 4th International Conference on Control and Computer Vision10.1145/3484274.3484292(112-118)Online publication date: 13-Aug-2021
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media