Abstract book (pdf) - ICPR 2010
Abstract book (pdf) - ICPR 2010
Abstract book (pdf) - ICPR 2010
- TAGS
- abstract
- icpr
- icpr2010.org
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
09:40-10:00, Paper TuAT7.3<br />
Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes<br />
Ouda, Osama, Chiba Univ.<br />
Tsumura, Norimichi, Chiba Univ.<br />
Nakaguchi, Toshiya, Chiba Univ.<br />
In order to satisfy the requirements of the cancelable biometrics construct, cancelable biometrics techniques rely on other<br />
authentication factors such as password keys and/or user specific tokens in the transformation process. However, such<br />
multi-factor authentication techniques suffer from the same issues associated with traditional knowledge-based and tokenbased<br />
authentication systems. This paper presents a new one-factor cancelable biometrics scheme for protecting Iris Codes.<br />
The proposed method is based solely on Iris Codes; however, it satisfies the requirements of revocability, diversity and<br />
noninvertibility without deteriorating the recognition performance. Moreover, the transformation process is easy to implement<br />
and can be integrated simply with current iris matching systems. The impact of the proposed transformation<br />
process on the the recognition accuracy is discussed and its noninvertibility is analyzed. The effectiveness of the proposed<br />
method is confirmed experimentally using CASIA-IrisV3-Interval dataset.<br />
10:00-10:20, Paper TuAT7.4<br />
A Novel Fingerprint Template Protection Scheme based on Distance Projection Coding<br />
Wang, Ruifang, Chinese Acad. of Sciences<br />
Yang, Xin, Chinese Acad. of Sciences<br />
Liu, Xia, Harbin University of Science and Technology<br />
Zhou, Sujing, Chinese Acad. of Sciences<br />
Li, Peng, Chinese Acad. of Sciences<br />
Cao, Kai, Chinese Acad. of Sciences<br />
Tian, Jie, Chinese Acad. of Sciences<br />
The biometric template, which is stored in the form of raw data, has become the greatest potential threat to the security of<br />
biometric authentication system. As the compromise of the biometric data is permanent, the protection of biometric data<br />
is particularly important. Consequently, biometric template protection technologies have aroused research highlights recently.<br />
One of the most popular template protection methods is biometric cryptosystem method. In this paper, we design<br />
a code<strong>book</strong> named distance projection for biometric coding to generate secured biometric template, and propose a novel<br />
fingerprint biometric cryptosystem scheme based on the code<strong>book</strong>. Experimental results on FVC2002 DB2 show that the<br />
proposed scheme can obtain positive results on both security and authentication accuracy.<br />
10:20-10:40, Paper TuAT7.5<br />
Combination of Symmetric Hash Functions for Secure Fingerprint Matching<br />
Kumar, Gaurav, State Univ. of New York at Buffalo<br />
Tulyakov, Sergey, Univ. at Buffalo<br />
Govindaraju, Venu, Univ. at Buffalo<br />
Fingerprint based secure biometric authentication systems have received considerable research attention lately, where the<br />
major goal is to provide an anonymous, multipliable and easily revocable methodology for fingerprint verification. In our<br />
previous work, we have shown that symmetric hash functions are very effective in providing such secure fingerprint representation<br />
and matching since they are independent of order of minutiae triplets as well as location of singular points<br />
(e.g. core and delta). In this paper, we extend our prior work by generating a combination of symmetric hash functions,<br />
which increases the security of fingerprint matching by an exponential factor. Firstly, we extract kplets from each fingerprint<br />
image and generate a unique key for combining multiple hash functions up to an order of (k-1). Each of these keys is generated<br />
using the features extracted from minutiae k-plets such as bin index of smallest angles in each k-plet. This combination<br />
provides us an extra security in the face of brute force attacks, where the compromise of few hash functions as well<br />
do not compromise the overall matching. Our experimental results suggest that the EER obtained using the combination<br />
of hash functions (4.98%) is comparable with the baseline system (3.0%), with the added advantage of being more secure.<br />
- 80 -