Near Infrared Face Based Biometric Key Binding

  • Meng Ao
  • Stan Z. Li
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5558)


Biometric encryption is the basis for biometric template protection and information security. While existing methods are based on iris or fingerprint modality, face has so far been considered not reliable enough to meet the requirement for error correcting ability. In this paper, we present a novel biometric key binding method based on near infrared (NIR) face biometric. An enhanced BioHash algorithm is developed by imposing an NXOR mask onto the input to the subsequent error correcting code (ECC). This way, when combined with ECC and NIR face features, it enables reliable binding of face biometric features and the biometric key. Its ability for template protection and information cryptography is guarantied by the theory of encryption. The security level of NIR face recognition system is thereby improved. Experimental results show that the security benefit is gained with a sacrifice of 1-2% drop in the recognition performance.


BioHash ECC Key Binding NIR Face Biometric Encryption 


  1. 1.
    Alabbadi, M., Wicker, S.B.: A digital signature scheme based on linear error-correcting block codes (1995)Google Scholar
  2. 2.
    Bakhtiari, S., Pieprzyk, J.: On the weakness of gongs collisionful hash function. Journal of Universal Computer Science 3, 185–196 (1997)Google Scholar
  3. 3.
    Bakhtiari, S., Safavi-naini, R., Pieprzyk, J.: On password-based authenticated key exchange using collisionful hash functions (1996)Google Scholar
  4. 4.
    Berson, T., Gong, L., Lomas, T.: Secure, keyed, and collisionful hash functions. December 1993. Included in Technical Report SRI-CSL-94-08, Computer Science Laboratory, SRI International, Menlo Park, California (May 1994)Google Scholar
  5. 5.
    Bodo, A.: Method for producing a digital signature with aid of a biometric feature, German Patent, DE 4243908A1 (1994)Google Scholar
  6. 6.
    Cheung, K.H., Kong, A.W.-K., Zhang, D., Kamel, M., You, J.: Revealing the secret of facehashing. In: Zhang, D., Jain, A.K. (eds.) ICB 2006. LNCS, vol. 3832, pp. 106–112. Springer, Heidelberg (2006)Google Scholar
  7. 7.
    Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication (2003)Google Scholar
  8. 8.
    Crepeau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions (1988) (extended abstract)Google Scholar
  9. 9.
    Daugman, J.: How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology 14, 21–30 (2004)Google Scholar
  10. 10.
    Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through off-line biometric identification. In: 1998 IEEE Symposium on Security and Privacy, Proceedings, May 1998, pp. 148–157 (1998)Google Scholar
  11. 11.
    Davida, G.I., Frankel, Y., Matt, B.J., Peralta, R.: On the relation of error correction and cryptography to an offline biometric based identification scheme (1999)Google Scholar
  12. 12.
    Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)Google Scholar
  13. 13.
    Feldmeier, D.C., Karn, P.R.: Unix password security - ten years later (1990)Google Scholar
  14. 14.
    Garrett, P.B.: Making, Breaking Codes: Introduction to Cryptology. Prentice Hall PTR, Upper Saddle River (2000)Google Scholar
  15. 15.
    Goh, A., Ling, D.N.C., Goh, A.: Computation of cryptographic keys from face biometrics. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 1–13. Springer, Heidelberg (2003)Google Scholar
  16. 16.
    Gong, L.: Collisionful keyed hash functions with selectable collisions. Inf. Process. Lett. 55(3), 167–170 (1995)Google Scholar
  17. 17.
    Jin, A.T.B., Ling, D.N.C., Goh, A.: Personalised cryptographic key generation based on facehashing. Computers & Security 23(7), 606–614 (2004)Google Scholar
  18. 18.
    Juels, A.: A fuzzy vault scheme (2002)Google Scholar
  19. 19.
    Juels, A.: Fuzzy vaults: Toward secure client-side matching (2002)Google Scholar
  20. 20.
    Juels, A., Wattenberg, M.: A fuzzy commitment scheme (1999)Google Scholar
  21. 21.
    Li, S., Chu, R., Liao, S., Zhang, L.: Illumination invariant face recognition using near-infrared images. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 627–639 (2007)Google Scholar
  22. 22.
    Liao, S., Zhu, X., Lei, Z., Zhang, L., Li, S.Z.: Learning multi-scale block local binary patterns for face recognition. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 828–837. Springer, Heidelberg (2007)Google Scholar
  23. 23.
    Lumini, A., Nanni, L.: An improved biohashing for human authentication. Pattern Recogn. 40(3), 1057–1065 (2007)Google Scholar
  24. 24.
    McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Network Progress Report 44, 114–116 (1978)Google Scholar
  25. 25.
    Nanni, L., Lumini, A.: Empirical tests on biohashing. Neurocomputing 69(16-18), 2390–2395 (2006)Google Scholar
  26. 26.
    Nanni, L., Lumini, A.: Random subspace for an improved biohashing for face authentication. Pattern Recogn. Lett. 29(3), 295–300 (2008)Google Scholar
  27. 27.
    Nichols, R.K.: ICSA Guide to Cryptography. McGraw-Hill Professional, New York (1998)Google Scholar
  28. 28.
    Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.: Biometric encryption: enrollment and verification procedures, vol. 3386, pp. 24–35. SPIE (1998)Google Scholar
  29. 29.
    Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Encryption using image processing (April 1998)Google Scholar
  30. 30.
    Stern, J.: A new identification scheme based on syndrome decoding (1994)Google Scholar
  31. 31.
    Teoh, A., Jin, B., Connie, T., Ngo, D., Ling, C.: Remarks on biohash and its mathematical foundation. Inf. Process. Lett. 100(4), 145–150 (2006)Google Scholar
  32. 32.
    Teoh, A.B.J., Kuan, Y.W., Lee, S.: Cancellable biometrics and annotations on biohash. Pattern Recogn. 41(6), 2034–2044 (2008)Google Scholar
  33. 33.
    Wikipedia. Error detection and correction — Wikipedia, the free encyclopedia (2008) (Online; accessed November 6, 2008)Google Scholar
  34. 34.
    Zhao, W., Chellappa, R., Phillips, P., Rosenfeld, A.: Face recognition: A literature survey. ACM Computing Surveys, 399–458 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Meng Ao
    • 1
  • Stan Z. Li
    • 1
  1. 1.Center for Biometrics and Security Research, Institute of AutomationChinese Academy of SciencesBeijingChina

Personalised recommendations