Multibiometric Cryptosystems Based on Feature-Level Fusion

作者: Abhishek Nagar , Karthik Nandakumar , Anil K. Jain

DOI: 10.1109/TIFS.2011.2166545

关键词:

摘要: Multibiometric systems are being increasingly de- ployed in many large-scale biometric applications (e.g., FBI-IAFIS, UIDAI system India) because they have several advantages such as lower error rates and larger population coverage compared to unibiometric systems. However, multibiometric require storage of multiple templates fingerprint, iris, face) for each user, which results increased risk user privacy security. One method protect individual is store only the secure sketch generated from corresponding template using a cryptosystem. This requires sketches. In this paper, we propose feature-level fusion framework simultaneously single sketch. Our main contributions include: (1) practical implementation proposed two well-known cryptosystems, namery,fuzzy vault fuzzy commitment, (2) detailed analysis trade-off between matching accuracy security cryptosystems based on different databases (one real one virtual multimodal database), containing three most popular modalities, namely, face. Experimental show that both here higher performance their counterparts.

参考文章(45)
J. I. Hall, Notes on Coding Theory ,(2003)
T.A.M. Kevenaar, G.J. Schrijen, M. van der Veen, A.H.M. Akkermans, F. Zuo, Face recognition with renewable and privacy preserving binary templates Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05). pp. 21- 26 ,(2005) , 10.1109/AUTOID.2005.24
Andrew Beng Jin Teoh, Kar-Ann Toh, Wai Kuan Yip, 2^N discretisation of biophasor in cancellable biometrics international conference on biometrics. pp. 435- 444 ,(2007) , 10.1007/978-3-540-74549-5_46
Karthik Nandakumar, Arun A. Ross, Anil K. Jain, Handbook of Multibiometrics ,(2006)
Elwyn R. Berlekamp, Algebraic Coding Theory ,(1984)
Karthik Nandakumar, Abhishek Nagar, Anil K. Jain, Hardening fingerprint Fuzzy vault using password international conference on biometrics. pp. 927- 937 ,(2007) , 10.1007/978-3-540-74549-5_97
Walter J. Scheirer, Terrance E. Boult, Cracking Fuzzy Vaults and Biometric Encryption The Bulletin of the Center for Children's Books. pp. 1- 6 ,(2007) , 10.1109/BCC.2007.4430534
C. Chen, R. N. J. Veldhuis, T. A. M. Kevenaar, A. H. M. Akkermans, Biometric quantization through detection rate optimized bit allocation EURASIP Journal on Advances in Signal Processing. ,vol. 2009, pp. 29- ,(2009) , 10.1155/2009/784834
Ee-Chien Chang, Ren Shen, Francis Weijian Teo, Finding the original point set hidden among chaff Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06. pp. 182- 188 ,(2006) , 10.1145/1128817.1128845
A. Jain, Lin Hong, R. Bolle, On-line fingerprint verification IEEE Transactions on Pattern Analysis and Machine Intelligence. ,vol. 19, pp. 302- 314 ,(1997) , 10.1109/34.587996