DOI QR코드

DOI QR Code

A Secure Face Cryptogr aphy for Identity Document Based on Distance Measures

  • Arshad, Nasim (Department of Electronics Engineering, Pukyong National University) ;
  • Moon, Kwang-Seok (Department of Electronics Engineering, Pukyong National University) ;
  • Kim, Jong-Nam (Dept. of IT Convergence & Application Engineering., Pukyong National University)
  • Received : 2013.07.12
  • Accepted : 2013.09.09
  • Published : 2013.10.30

Abstract

Face verification has been widely studied during the past two decades. One of the challenges is the rising concern about the security and privacy of the template database. In this paper, we propose a secure face verification system which generates a unique secure cryptographic key from a face template. The face images are processed to produce face templates or codes to be utilized for the encryption and decryption tasks. The result identity data is encrypted using Advanced Encryption Standard (AES). Distance metric naming hamming distance and Euclidean distance are used for template matching identification process, where template matching is a process used in pattern recognition. The proposed system is tested on the ORL, YALEs, and PKNU face databases, which contain 360, 135, and 54 training images respectively. We employ Principle Component Analysis (PCA) to determine the most discriminating features among face images. The experimental results showed that the proposed distance measure was one the promising best measures with respect to different characteristics of the biometric systems. Using the proposed method we needed to extract fewer images in order to achieve 100% cumulative recognition than using any other tested distance measure.

Keywords

References

  1. Ch. H. Lee, "Definition of Optimal Face Region for Face Recognition with Phase-Only Correlation," KISPS, Vol. 13, No. 3, pp. 150-155, 2012.
  2. A. Bodo, "Method for Producing a Digital Signature with Aid of a Biometric Feature," German Patent DE 42 43 908 A1, 1994.
  3. Y.J. Chang, W. Zhang, and T. Chen, "Biometrics- based Cryptographic Key Generation," Proc. of IEEE Int. Conf. on Multimedia and Expo, pp. 2203-2206, 2004.
  4. A. Juels and M. Wattenberg, "A Fuzzy Commitment Scheme," Proc. of sixth ACM Conf. on Computer and Communication Security, pp. 28-36, 1999.
  5. F. Hao, R. Anderson, and J. Daugman, "Combining Crypto with Biometric Effectively," IEEE Trans. on Computers, Vol. 55, No. 9, pp. 1081-1088, 2006. https://doi.org/10.1109/TC.2006.138
  6. K.N Ratha, S. Chikkerur, J.H. Connel, and R.M. Bolle, "Generating Cancellable Fingerprints," N IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 29, pp. 561-572, 2007. https://doi.org/10.1109/TPAMI.2007.1004
  7. M. Savvides, B.V. Kumar, and P. Khosla, "Cancellable Biometric Filters for Face Recognition," Proc. the 17th International Conferenceon Pattern Recognition, Vol. 3, pp. 922-925, 2004.
  8. S.H. Moi, N.B. Rahim, P. Saad, P. Sim, Z. Zakaria, and S. Ibrahim, "Iris Biometric Cryptography for identity Document," International Conference on Soft Computing and Pattern Recognition, pp. 736-741, 2009.
  9. Y. Wang and K.N. Plataniotis, "Fuzzy Vault for Face Based Cryptographic Key Generation," Biometric Symposium, 2007.
  10. A. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient Privacy-Preserving Face Recognition," ICISC, pp. 229-224, 2009.
  11. M.T. Nita and V.M. Thakare, "Biometrics Standards and Face Image Format for Data Interchange-Review," Int Journal of Advances in Engineering & Technology, Vol. 2. pp. 385-392, 2012.
  12. P.S. Revenkar, A. Anjum, and W.Z. Gandhare, "Secure Iris Authentication using Visual Cryptography," Int Journal of Computer Science and Information Security, Vol. 7, No. 3, pp. 218-221, 2010.
  13. J.J. Park and K.M. Kim, "Face Recognition using Eigenface," KISPS, Vol. 2, No. 2, pp. 1-6, 2001.
  14. W. O. Lee, Y. H. Park, E. C. Lee, H. K. Lee and K.R. Park, "Tracking and Face Recognition of Multiple People Based on GMM, LKT and PCA," Journal of Korea Multimedia Society, Vol. 15, pp. 449-471, 2012. https://doi.org/10.9717/kmms.2012.15.4.449

Cited by

  1. Design and Implementation of a Face Recognition System-on-a-Chip for Wearable/Mobile Applications vol.18, pp.2, 2015, https://doi.org/10.9717/kmms.2015.18.2.244