Binary Biometric Representation through Pairwise Polar Quantization

  • Chun Chen
  • Raymond Veldhuis
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5558)


Binary biometric representations have great significance for data compression and template protection. In this paper, we introduce pairwise polar quantization. Furthermore, aiming to optimize the discrimination between the genuine Hamming distance (GHD) and the imposter Hamming distance (IHD), we propose two feature pairing strategies: the long-short (LS) strategy for phase quantization, as well as the long-long (LL) strategy for magnitude quantization. Experimental results for the FRGC face database and the FVC2000 fingerprint database show that phase bits provide reasonably good performance, whereas magnitude bits obtain poor performance.


Polar quantization pairing face fingerprint recognition 


  1. 1.
    Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP Journal on Advances in Signal Processing 8(2) (2008)Google Scholar
  2. 2.
    Vielhauer, C., Steinmetz, R., Mayerhofer, A.: Biometric hash based on statistical features of online signatures. In: Proc. 16th International Conference on Pattern Recognition (ICPR 2002), Quebec, Canada, vol. 1, pp. 123–126 (2002)Google Scholar
  3. 3.
    Hao, F., Wah, C.C.: Private key generation from on-line handwritten signatures. Information Management & Computer Security 10(4), 159–164 (2002)Google Scholar
  4. 4.
    Chang, Y., Zhang, W., Chen, T.: Biometrics-based cryptographic key generation. In: Proc. IEEE International Conference on Multimedia and Expo. (ICME 2004), Taipei, Taiwan, vol. 3, pp. 2203–2206 (2004)Google Scholar
  5. 5.
    Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.J., Bazen, A.M., Veldhuis, R.N.J.: Practical biometric authentication with template protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 436–446. Springer, Heidelberg (2005)Google Scholar
  6. 6.
    Kevenaar, T.A.M., Schrijen, G.J., van der Veen, M., Akkermans, A.H.M., Zuo, F.: Face recognition with renewable and privacy preserving binary templates. In: Proc. IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), NY, USA, pp. 21–26 (2005)Google Scholar
  7. 7.
    Chen, C., Veldhuis, R.N.J., Kevenaar, T.A.M., Akkermans, A.H.M.: Multi-bits biometric string generation based on the likelihood ratio. In: Proc. IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS 2007) (2007)Google Scholar
  8. 8.
    Chen, C., Veldhuis, R.N.J., Kevenaar, T.A.M., Akkermans, A.H.M.: Biometric binary string generation with detection rate optimized bit allocation. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPR 2008) (2008)Google Scholar
  9. 9.
    Pobloth, H., Vafin, R., Kleijn, W.B.: Multivariate block polar quantization. IEEE Transactions on Communications 53(12), 2043–2053 (2005)Google Scholar
  10. 10.
    Phillips, P.J., Flynn, P.J., Scruggs, W.T., Bowyer, K.W., Chang, J., Hoffman, K., Marques, J., Min, J., Worek, W.J.: Overview of the face recognition grand challenge. In: Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), MD, USA, pp. 947–954 (2005)Google Scholar
  11. 11.
    Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC 2000: Fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(3), 402–412 (2002)Google Scholar
  12. 12.
    Veldhuis, R.N.J., Bazen, A., Kauffman, J., Hartel, P.: Biometric verification based on grip-pattern recognition. In: Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents VI (SSWMC 2004), CA, USA, vol. 5306, pp. 634–641 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Chun Chen
    • 1
  • Raymond Veldhuis
    • 1
  1. 1.Signals and Systems Group, Electrical EngineeringUniversity of TwenteEnschedeThe Netherlands

Personalised recommendations