Full Content is available to subscribers

Subscribe/Learn More  >
Proceedings Article

A lightweight approach for biometric template protection

[+] Author Affiliations
Hisham Al-Assam, Harin Sellahewa, Sabah Jassim

Univ. of Buckingham (United Kingdom)

Proc. SPIE 7351, Mobile Multimedia/Image Processing, Security, and Applications 2009, 73510P (May 04, 2009); doi:10.1117/12.818291
Text Size: A A A
From Conference Volume 7351

  • Mobile Multimedia/Image Processing, Security, and Applications 2009
  • Sos S. Agaian; Sabah A. Jassim
  • Orlando, Florida, USA | April 13, 2009

abstract

Privacy and security are vital concerns for practical biometric systems. The concept of cancelable or revocable biometrics has been proposed as a solution for biometric template security. Revocable biometric means that biometric templates are no longer fixed over time and could be revoked in the same way as lost or stolen credit cards are. In this paper, we describe a novel and an efficient approach to biometric template protection that meets the revocability property. This scheme can be incorporated into any biometric verification scheme while maintaining, if not improving, the accuracy of the original biometric system. However, we shall demonstrate the result of applying such transforms on face biometric templates and compare the efficiency of our approach with that of the well-known random projection techniques. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transforms. These results are based on experiments conducted on a number of well-known face image databases, e.g. Yale and ORL databases.

© (2009) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.
Citation

Hisham Al-Assam ; Harin Sellahewa and Sabah Jassim
"A lightweight approach for biometric template protection", Proc. SPIE 7351, Mobile Multimedia/Image Processing, Security, and Applications 2009, 73510P (May 04, 2009); doi:10.1117/12.818291; http://dx.doi.org/10.1117/12.818291


Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).

Figures

Tables

NOTE:
Citing articles are presented as examples only. In non-demo SCM6 implementation, integration with CrossRef’s "Cited By" API will populate this tab (http://www.crossref.org/citedby.html).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.