We use cookies to improve your experience with our site.
Ying-Han Pang, Andrew T. B. J., David N. C. L. Two-Factor Cancelable Biometrics Authenticator[J]. Journal of Computer Science and Technology, 2007, 22(1): 54-59.
Citation: Ying-Han Pang, Andrew T. B. J., David N. C. L. Two-Factor Cancelable Biometrics Authenticator[J]. Journal of Computer Science and Technology, 2007, 22(1): 54-59.

Two-Factor Cancelable Biometrics Authenticator

More Information
  • Received Date: April 14, 2005
  • Revised Date: March 09, 2006
  • Published Date: January 14, 2007
  • Biometrics-based authentication system offersadvantages of providing high reliability and accuracy. However, thecontemporary authentication system is impuissance to compromise. If abiometrics data is compromised, it cannot be replaced and renderedunusable. In this paper, a cancelable biometrics-based authenticator isproposed to solve this irrevocability issue. The proposed approach is atwo-factor authentication system, which requires both of the randomdata and facial feature in order to access the system. In this system,tokenized pseudo-random data is coupled with moment-based facialfeature via inner product algorithm. The output of the product is thendiscretized to generate a set of private binary code, coined as2factor-Hashing code, which is acted as verification key. If thisbiometrics-based verification key is compromised, a new one can beissued by replacing a different set of random number via tokenreplacement. Then, the compromised one is rendered completely useless.This feature offers an extra protection layer against biometricsfabrication since the verification code is replaceable. Experimentalresults demonstrate that the proposed system provides zero Equal ErrorRate in which there is a clear separation in between the genuine andthe imposter distribution populations.
  • [1]
    Schneier B. Secret \& Lies: Digital Security in a Networked World, New York: John Wiley \& Sons, 2000, pp.141--145.
    [2]
    Braithwaite M, Ulf Cahn von Seelen, Cambier J -\it et al}. Application-specific biometrics templates. In -\it Proc. IEEE Workshop on Automatic Identification Advanced Technologies}, Tarrytown, NY, 2002, pp.167--171.
    [3]
    Bolle R M, Connel J H, Ratha N K. Biometric perils and patches. -\it Pattern Recognition}, 2002, 35: 2727--2738.
    [4]
    Daugman J. Biometric decision landscapes. Technical Report, No.482, Cambridge University Computer Laboratory, 2002.
    [5]
    Umut U, Sharah P, Salil P -\it et al}. Biometric cryptosystems: Issues and challenges. -\it Proc. the IEEE}, 2004, 92(6): 948--960.
    [6]
    Goh A, Ngo D. Computation of cryptographic keys from face biometrics. In -\it Proc. 7th IFIP Communications and Multimedia Security}, Torino, 2003, pp.1--13.
    [7]
    Ratha N, Connell J, Bolle R M. Enhancing security and privacy in biometrics-based authentication systems. -\it IBM Syst. J}., 2001, 40(3): 614--634.
    [8]
    Davida G I, Frankel Y, Matt B J. On enabling secure applications through off-line biometric identification. In -\it Proc. IEEE Symp. Privacy and Security}, 1998, pp.148--157.
    [9]
    Mukundan R, Ramakrishnan K R. Moment Functions in Image Analysis---Theory and Applications. World Scientific Publishing, 1998.
    [10]
    Teh C H, Chin R T. On image analysis by the methods of moments. -\it IEEE Trans. Pattern Anal. Machine Intell}., 1998, 10: 496--512.
    [11]
    Khotanzad A. Invariant image recognition by Zernike moments. -\it IEEE Trans. Pattern. Anal. Machine Intell}., 1990, 12(5): 489--497.
    [12]
    Menezes A, Oorschot P V, Vanstone S. Handbook of Applied Cryptography. Boca Raton: CRC Press, 1996.
    [13]
    Vision Group of Essex University----Face Database, http:// cswww.essex.ac.uk/allfaces/index.html.
  • Related Articles

    [1]Xin Geng, Zhi-Hua Zhou. Image Region Selection and Ensemble for Face Recognition[J]. Journal of Computer Science and Technology, 2006, 21(1): 116-125.
    [2]Pin Liao, Li Shen, Yi-Qiang Chen, Shu-Chang Liu. Unified Model in Identity Subspace for Face Recognition[J]. Journal of Computer Science and Technology, 2004, 19(5).
    [3]Pin Liao, Li Shen. Unified Probabilistic Models for Face Recognition from a SingleExample Image per Person[J]. Journal of Computer Science and Technology, 2004, 19(3).
    [4]LIU QingShan, HUANG Rui, LU HanQing, MA SongDe. Kernel-Based Nonlinear Discriminant Analysis for Face Recognition[J]. Journal of Computer Science and Technology, 2003, 18(6).
    [5]Al-Rawi Mohammed, YANG Jie. Practical Fast Computation of Zernike Moments[J]. Journal of Computer Science and Technology, 2002, 17(2).
    [6]Zhang Yongyue, Peng Zhenyun, You Suya, Xu Guangyou. A Multi-View Face Recognition System[J]. Journal of Computer Science and Technology, 1997, 12(5): 400-407.
    [7]Yang Changgui, Chen Yuian, Sun Jiaghang. Advanced Geometric Modeler with Hybrid Representation[J]. Journal of Computer Science and Technology, 1996, 11(1): 1-8.
    [8]Xiang Dong, Wei Daozheng, Chen Shisong. Probabilistic Models for Estimation of Random and Pseudo-Random Test Length[J]. Journal of Computer Science and Technology, 1992, 7(2): 164-174.
    [9]Li Zhongcheng, Min Yinghua. Pseudo-Random Test Generation for Large Combinational Circuits[J]. Journal of Computer Science and Technology, 1992, 7(1): 19-28.
    [10]Lu Wei, Jin Tongguang, Liang Youdong. Geometric Modelling by Recursively Cutting Vertices[J]. Journal of Computer Science and Technology, 1989, 4(4): 363-373.

Catalog

    Article views (17) PDF downloads (5091) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return