06.02.2013 Views

Abstract book (pdf) - ICPR 2010

Abstract book (pdf) - ICPR 2010

Abstract book (pdf) - ICPR 2010

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

09:40-10:00, Paper TuAT7.3<br />

Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes<br />

Ouda, Osama, Chiba Univ.<br />

Tsumura, Norimichi, Chiba Univ.<br />

Nakaguchi, Toshiya, Chiba Univ.<br />

In order to satisfy the requirements of the cancelable biometrics construct, cancelable biometrics techniques rely on other<br />

authentication factors such as password keys and/or user specific tokens in the transformation process. However, such<br />

multi-factor authentication techniques suffer from the same issues associated with traditional knowledge-based and tokenbased<br />

authentication systems. This paper presents a new one-factor cancelable biometrics scheme for protecting Iris Codes.<br />

The proposed method is based solely on Iris Codes; however, it satisfies the requirements of revocability, diversity and<br />

noninvertibility without deteriorating the recognition performance. Moreover, the transformation process is easy to implement<br />

and can be integrated simply with current iris matching systems. The impact of the proposed transformation<br />

process on the the recognition accuracy is discussed and its noninvertibility is analyzed. The effectiveness of the proposed<br />

method is confirmed experimentally using CASIA-IrisV3-Interval dataset.<br />

10:00-10:20, Paper TuAT7.4<br />

A Novel Fingerprint Template Protection Scheme based on Distance Projection Coding<br />

Wang, Ruifang, Chinese Acad. of Sciences<br />

Yang, Xin, Chinese Acad. of Sciences<br />

Liu, Xia, Harbin University of Science and Technology<br />

Zhou, Sujing, Chinese Acad. of Sciences<br />

Li, Peng, Chinese Acad. of Sciences<br />

Cao, Kai, Chinese Acad. of Sciences<br />

Tian, Jie, Chinese Acad. of Sciences<br />

The biometric template, which is stored in the form of raw data, has become the greatest potential threat to the security of<br />

biometric authentication system. As the compromise of the biometric data is permanent, the protection of biometric data<br />

is particularly important. Consequently, biometric template protection technologies have aroused research highlights recently.<br />

One of the most popular template protection methods is biometric cryptosystem method. In this paper, we design<br />

a code<strong>book</strong> named distance projection for biometric coding to generate secured biometric template, and propose a novel<br />

fingerprint biometric cryptosystem scheme based on the code<strong>book</strong>. Experimental results on FVC2002 DB2 show that the<br />

proposed scheme can obtain positive results on both security and authentication accuracy.<br />

10:20-10:40, Paper TuAT7.5<br />

Combination of Symmetric Hash Functions for Secure Fingerprint Matching<br />

Kumar, Gaurav, State Univ. of New York at Buffalo<br />

Tulyakov, Sergey, Univ. at Buffalo<br />

Govindaraju, Venu, Univ. at Buffalo<br />

Fingerprint based secure biometric authentication systems have received considerable research attention lately, where the<br />

major goal is to provide an anonymous, multipliable and easily revocable methodology for fingerprint verification. In our<br />

previous work, we have shown that symmetric hash functions are very effective in providing such secure fingerprint representation<br />

and matching since they are independent of order of minutiae triplets as well as location of singular points<br />

(e.g. core and delta). In this paper, we extend our prior work by generating a combination of symmetric hash functions,<br />

which increases the security of fingerprint matching by an exponential factor. Firstly, we extract kplets from each fingerprint<br />

image and generate a unique key for combining multiple hash functions up to an order of (k-1). Each of these keys is generated<br />

using the features extracted from minutiae k-plets such as bin index of smallest angles in each k-plet. This combination<br />

provides us an extra security in the face of brute force attacks, where the compromise of few hash functions as well<br />

do not compromise the overall matching. Our experimental results suggest that the EER obtained using the combination<br />

of hash functions (4.98%) is comparable with the baseline system (3.0%), with the added advantage of being more secure.<br />

- 80 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!