Abstract
Biometric encryption is the basis for biometric template protection and information security. While existing methods are based on iris or fingerprint modality, face has so far been considered not reliable enough to meet the requirement for error correcting ability. In this paper, we present a novel biometric key binding method based on near infrared (NIR) face biometric. An enhanced BioHash algorithm is developed by imposing an NXOR mask onto the input to the subsequent error correcting code (ECC). This way, when combined with ECC and NIR face features, it enables reliable binding of face biometric features and the biometric key. Its ability for template protection and information cryptography is guarantied by the theory of encryption. The security level of NIR face recognition system is thereby improved. Experimental results show that the security benefit is gained with a sacrifice of 1-2% drop in the recognition performance.
Chapter PDF
Similar content being viewed by others
References
Alabbadi, M., Wicker, S.B.: A digital signature scheme based on linear error-correcting block codes (1995)
Bakhtiari, S., Pieprzyk, J.: On the weakness of gongs collisionful hash function. Journal of Universal Computer Science 3, 185–196 (1997)
Bakhtiari, S., Safavi-naini, R., Pieprzyk, J.: On password-based authenticated key exchange using collisionful hash functions (1996)
Berson, T., Gong, L., Lomas, T.: Secure, keyed, and collisionful hash functions. December 1993. Included in Technical Report SRI-CSL-94-08, Computer Science Laboratory, SRI International, Menlo Park, California (May 1994)
Bodo, A.: Method for producing a digital signature with aid of a biometric feature, German Patent, DE 4243908A1 (1994)
Cheung, K.H., Kong, A.W.-K., Zhang, D., Kamel, M., You, J.: Revealing the secret of facehashing. In: Zhang, D., Jain, A.K. (eds.) ICB 2006. LNCS, vol. 3832, pp. 106–112. Springer, Heidelberg (2006)
Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication (2003)
Crepeau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions (1988) (extended abstract)
Daugman, J.: How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology 14, 21–30 (2004)
Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through off-line biometric identification. In: 1998 IEEE Symposium on Security and Privacy, Proceedings, May 1998, pp. 148–157 (1998)
Davida, G.I., Frankel, Y., Matt, B.J., Peralta, R.: On the relation of error correction and cryptography to an offline biometric based identification scheme (1999)
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)
Feldmeier, D.C., Karn, P.R.: Unix password security - ten years later (1990)
Garrett, P.B.: Making, Breaking Codes: Introduction to Cryptology. Prentice Hall PTR, Upper Saddle River (2000)
Goh, A., Ling, D.N.C., Goh, A.: Computation of cryptographic keys from face biometrics. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 1–13. Springer, Heidelberg (2003)
Gong, L.: Collisionful keyed hash functions with selectable collisions. Inf. Process. Lett. 55(3), 167–170 (1995)
Jin, A.T.B., Ling, D.N.C., Goh, A.: Personalised cryptographic key generation based on facehashing. Computers & Security 23(7), 606–614 (2004)
Juels, A.: A fuzzy vault scheme (2002)
Juels, A.: Fuzzy vaults: Toward secure client-side matching (2002)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme (1999)
Li, S., Chu, R., Liao, S., Zhang, L.: Illumination invariant face recognition using near-infrared images. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 627–639 (2007)
Liao, S., Zhu, X., Lei, Z., Zhang, L., Li, S.Z.: Learning multi-scale block local binary patterns for face recognition. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 828–837. Springer, Heidelberg (2007)
Lumini, A., Nanni, L.: An improved biohashing for human authentication. Pattern Recogn. 40(3), 1057–1065 (2007)
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Network Progress Report 44, 114–116 (1978)
Nanni, L., Lumini, A.: Empirical tests on biohashing. Neurocomputing 69(16-18), 2390–2395 (2006)
Nanni, L., Lumini, A.: Random subspace for an improved biohashing for face authentication. Pattern Recogn. Lett. 29(3), 295–300 (2008)
Nichols, R.K.: ICSA Guide to Cryptography. McGraw-Hill Professional, New York (1998)
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.: Biometric encryption: enrollment and verification procedures, vol. 3386, pp. 24–35. SPIE (1998)
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Encryption using image processing (April 1998)
Stern, J.: A new identification scheme based on syndrome decoding (1994)
Teoh, A., Jin, B., Connie, T., Ngo, D., Ling, C.: Remarks on biohash and its mathematical foundation. Inf. Process. Lett. 100(4), 145–150 (2006)
Teoh, A.B.J., Kuan, Y.W., Lee, S.: Cancellable biometrics and annotations on biohash. Pattern Recogn. 41(6), 2034–2044 (2008)
Wikipedia. Error detection and correction — Wikipedia, the free encyclopedia (2008) (Online; accessed November 6, 2008)
Zhao, W., Chellappa, R., Phillips, P., Rosenfeld, A.: Face recognition: A literature survey. ACM Computing Surveys, 399–458 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ao, M., Li, S.Z. (2009). Near Infrared Face Based Biometric Key Binding. In: Tistarelli, M., Nixon, M.S. (eds) Advances in Biometrics. ICB 2009. Lecture Notes in Computer Science, vol 5558. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01793-3_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-01793-3_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01792-6
Online ISBN: 978-3-642-01793-3
eBook Packages: Computer ScienceComputer Science (R0)