Paper
5 May 2009 Design and analysis of fuzzy extractors for faces
Author Affiliations +
Abstract
It is both crucial and challenging to protect biometric data used for biometric identification and authentication systems, while keeping the systems user friendly. We study the design and analysis of biometric data protection schemes based on fuzzy extractors. There are limitations in previous fuzzy extractors, which make them difficult to handle continuous feature spaces, entropy estimation, and feature selection. We proposed a scheme based on PCA features and a recently proposed fuzzy extractor for continuous domains. We conduct experiments using the ORL face database, and analyze carefully the entropies and the resulting security of the system. We explore and compare different ways to select and combine features, and show that randomization plays an important role in both security, performance and cancelability. Furthermore, proposed feature selection does yield better estimation of the final key strength.
© (2009) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yagiz Sutcu, Qiming Li, and Nasir Memon "Design and analysis of fuzzy extractors for faces", Proc. SPIE 7306, Optics and Photonics in Global Homeland Security V and Biometric Technology for Human Identification VI, 73061X (5 May 2009); https://doi.org/10.1117/12.820571
Lens.org Logo
CITATIONS
Cited by 17 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Biometrics

Quantization

Databases

Biological research

Principal component analysis

Feature selection

Information security

RELATED CONTENT

How to protect biometric templates
Proceedings of SPIE (February 27 2007)
A hybrid approach for face template protection
Proceedings of SPIE (March 17 2008)
Face biometrics with renewable templates
Proceedings of SPIE (February 15 2006)
Biometric template transformation: a security analysis
Proceedings of SPIE (January 27 2010)

Back to Top