Secure authentication for face recognition

被引:19
|
作者
Dabbah, M. A. [1 ]
Woo, W. L. [1 ]
Dlay, S. S. [1 ]
机构
[1] Newcastle Univ, Sch Elect Elect & Comp Engn, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
关键词
D O I
10.1109/CIISP.2007.369304
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a new technique to protect the face biometric during recognition, using the so called cancellable biometric. The technique is based on image-based (statistical) face recognition using the 2DPCA algorithm. The biometric data is transformed to its cancellable domain using polynomial functions and co-occurrence matrices. Original facial images are transformed non-linearly by a polynomial function whose parameters can be change accordingly to the issuing version of the secure cancellable template. Co-occurrence matrices are also used in the transform to generate a distinctive feature vector which is used for both security and recognition accuracy. The Hadamard product is used to construct the final cancellable template. It shows high flexibility in proving a new relationship between two independent covariance matrices, which is mathematically proven. The generated cancellable templates are used in the same fashion as the original facial images. The 2DPCA recognition algorithm has been used without any changes; the transformations are applied on the input images only and yet with higher recognition accuracy. Theoretical and experimental results have shown high irreversibility of data with improved accuracy of up to 3% from the original data.
引用
收藏
页码:121 / 126
页数:6
相关论文
共 50 条
  • [1] SAFE: Secure Authentication with Face and Eyes
    Boehm, Arman
    Chen, Dongqu
    Frank, Mario
    Huang, Ling
    Kuo, Cynthia
    Lolic, Tihomir
    Martinovic, Ivan
    Song, Dawn
    [J]. 2013 INTERNATIONAL CONFERENCE ON PRIVACY AND SECURITY IN MOBILE SYSTEMS (PRISMS), 2013,
  • [2] Secure User Authentication on Smartphones via Sensor and Face Recognition on Short Video Clips
    Galdi, Chiara
    Nappi, Michele
    Dugelay, Jean-Luc
    [J]. GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 15 - 22
  • [3] Secure Face Authentication Framework in Open Networks
    Lee, Yongjin
    Lee, Yongki
    Chung, Yunsu
    Moon, Kiyoung
    [J]. ETRI JOURNAL, 2010, 32 (06) : 950 - 960
  • [4] A Secure Face Recognition System
    Abdel-Ghaffar, Eman A.
    Allam, Mahmoud E.
    Mansour, Hala A. K.
    Abo-Alsoud, M. A.
    [J]. ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 95 - +
  • [5] Personal based authentication by face recognition
    Kao, Yung-Wei
    Gu, Hui-Zhen
    Yuan, Shyan-Ming
    [J]. NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 581 - 585
  • [6] Face recognition for authentication on mobile devices
    Vazquez-Fernandez, Esteban
    Gonzalez-Jimenez, Daniel
    [J]. IMAGE AND VISION COMPUTING, 2016, 55 : 31 - 33
  • [7] Your Face Your Heart: Secure Mobile Face Authentication with Photoplethysmograms
    Chen, Yimin
    Sun, Jingchao
    Jin, Xiaocong
    Li, Tao
    Zhang, Rui
    Zhang, Yanchao
    [J]. IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [8] NAuth: Secure Face-to-Face Device Authentication via Nonlinearity
    Zhou, Xinyan
    Ji, Xiaoyu
    Yan, Chen
    Deng, Jiangyi
    Xu, Wenyuan
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, : 2080 - 2088
  • [9] Secure Rotation Invariant Face Detection System for Authentication
    Verma, Amit
    Baljon, Mohammed
    Mishra, Shailendra
    Kaur, Iqbaldeep
    Saini, Ritika
    Saxena, Sharad
    Sharma, Sanjay Kumar
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 1955 - 1974
  • [10] Face Recognition as an Authentication Technique in Electronic Voting
    El-Sayad, Noha E.
    Abdel-Kader, Rabab Farouk
    Marie, Mahmoud Ibraheem
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (06) : 66 - 71