Abstract
The protection of the templates stored in a biometric recognition system represents an issue of paramount importance for the security and privacy of the enrolled users, and directly affects the successful deployment of the system itself. In this paper we propose a protected on-line signature recognition system where the properties of Universal Background Models are exploited to provide a small dimensionality and a limited intra-class variability signature representation. The reported experimental results show that the employed signature representation and protection scheme allow to reach high recognition accuracy while providing protection to the considered biometric data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric Recognition: Security and Privacy Concerns. IEEE Security & Privacy Magazine 1(2), 33â42 (2003)
Ratha, N.K., Connell, J.H., Bolle, R.: Enhancing Security and Privacy of Biometric-based Authentication Systems. IBM Systems Journal 40(3), 614â634 (2001)
Cappelli, R., Lumini, A., Maio, D., Maltoni, D.: Fingerprint Image Reconstruction from Standard Templates. IEEE Transactions on PAMIÂ 29(9), 1489â1503 (2007)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Sign. Proc., Special Issue on Biometrics (2008)
Goh, A., Ngo, D.C.L.: Computation of Cryptographic Keys from Face Biometrics. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 1â13. Springer, Heidelberg (2003)
Ratha, N., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancelable Fingerprint Templates. IEEE Transactions on PAMIÂ 29(4), 561â572 (2007)
Maiorana, E., Campisi, P., Fierrez, J., Ortega-Garcia, J., Neri, A.: Cancelable templates for sequence-based biometrics with application to on-line signature recognition. Transactions on System Man and Cybernetics Part AÂ 40(3), 525â538 (2010)
Vielhauer, C., Steinmetz, R.: Handwriting: Feature Correlation Analysis for Biometric Hashes. EURASIP Journal on Applied Signal Processing, Special Issue on Biometric, 542â558 (2004)
Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: 6th ACM Conf. Computer and Communication Security, Singapore (1999)
Tuyls, P., Akkermans, A., Kevenaar, T., Schrijen, G.J., Bazen, A., Veldhuis, R.: Practical biometric template protection system based on reliable components. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 436â446. Springer, Heidelberg (2005)
Van der Veen, M., Kevenaar, T., Schrijen, G.-J., Akkermans, T.H., Zuo, F.: Face biometrics with renewable templates. In: SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents (2006)
Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers 55(9), 1081â1088 (2006)
Reynolds, D.A., Quatieri, T.F., Dunn, R.B.: Speaker verification using adapted gaussian mixture models. Digital Signal Processing 10(1-3), 1941 (2000)
Alba-Castro, J.L., GonzĂĄlez-JimĂ©nez, D., Argones-RĂșa, E., GonzĂĄlez-Agulla, E., Otero-Muras, E., GarcĂœa-Mateo, C.: Pose-corrected face processing on video sequences for webcam-based remote biometric authentication. Journal of Electronic Imaging 17(1) (2008)
Argones RĂșa, E., PĂ©rez-Piñar LĂłpez, D., Alba Castro, J.L.: Ergodic HMM-UBM system for on-line signature verification. In: Fierrez, J., Ortega-Garcia, J., Esposito, A., Drygajlo, A., Faundez-Zanuy, M. (eds.) BioID MultiComm2009. LNCS, vol. 5707, pp. 340â347. Springer, Heidelberg (2009)
Baum, L.E., Petrie, T., Soules, G., Weiss, N.: A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains. The Annals of Mathematical Statistics 41(1), 164â171 (1970)
Linde, Y., Buzo, A., Gray, R.: An Algorithm for Vector Quantizer Design. IEEE Transactions on Communications 28(1), 84â94 (1980)
Gauvain, J.-L., Lee, C.-H.: Maximum A Posteriori Estimation for Multivariate Gaussian Mixture Observations of Markov Chains. IEEE Transactions on Speech and Audio Processing 2(2), 291â298 (1994)
Huang, X., Acero, A., Hon, H.: Spoken Language Processing: A Guide to Theory, Algorithm, and System Development, ch. 3, pp. 111â113. Prentice Hall PTR, Upper Saddle River (2001)
Kuhn, R., Nguyen, P., Junqua, J.C., Goldwasser, L.: Eigenfaces and Eigenvoices: Dimensionality Reduction for Specialized Pattern Recognition. In: IEEE Second Workshop on Multimedia Signal Processing (1998)
Kenny, P., Boulianne, G., Dumouchel, P.: Eigenvoice Modeling With Sparse Training Data. IEEE Transactions on Speech and Audio Processing 13(3), 345â354 (2005)
Li, Q., Guo, M., Chang, E.-C.: Fuzzy Extractors for Asymmetric Biometric Representation. In: IEEE CVPR (June 2008)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523â540. Springer, Heidelberg (2004)
Ignatenko, T., Willems, F.M.J.: Biometric Systems: Privacy and Secrecy Aspects. IEEE Transactions on Information Forensics and Security 4(4), 956â973 (2009)
Ignatenko, T., Willems, F.M.J.: Information Leakage in Fuzzy Commitment Schemes. IEEE Transactions on Information Forensics and Security 5(2), 337â348 (2010)
Ortega-Garcia, J., et al.: MCYT baseline corpus: A bimodal biometric database. In: IEE Conference on Vision, Image and Signal Processing (2003)
Purser, M.: Introduction to Error-Correcting Codes. Artech House, Boston (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Maiorana, E., Argones RĂșa, E., Alba Castro, J.L., Campisi, P. (2011). Eigen-Model Projections for Protected On-line Signature Recognition. In: Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C., Fairhurst, M.C. (eds) Biometrics and ID Management. BioID 2011. Lecture Notes in Computer Science, vol 6583. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19530-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-19530-3_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19529-7
Online ISBN: 978-3-642-19530-3
eBook Packages: Computer ScienceComputer Science (R0)