EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER

Similar documents
Research Article Binary Biometric Representation through Pairwise Adaptive Phase Quantization

Research Article Biometric Quantization through Detection Rate Optimized Bit Allocation

ON BINARY REPRESENTATIONS FOR BIOMETRIC TEMPLATE PROTECTION. Chun Chen

Biometrics: Introduction and Examples. Raymond Veldhuis

Securing BioEncoded IrisCodes Against Correlation Attacks

Biometric Security Based on ECG

BIOMETRIC verification systems are used to verify the

Likelihood Ratio-Based Biometric Verification

A Contrario Detection of False Matches in Iris Recognition

Constructing practical Fuzzy Extractors using QIM

If you wish to cite this paper, please use the following reference:

Secure Sketch for Biometric Templates

IBM Research Report. The Relation between the ROC Curve and the CMC

This is an accepted version of a paper published in Elsevier Information Fusion. If you wish to cite this paper, please use the following reference:

Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes

Predicting large population data cumulative match characteristic performance from small population data

Score calibration for optimal biometric identification

Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication

Orientation Map Based Palmprint Recognition

Biometric verification based on grip-pattern recognition

Classification Performance Comparison of a Continuous and Binary Classifier under Gaussian Assumption

Information-Theoretic Analysis of Iris Biometrics for Biometric Cryptography

Error Rates. Error vs Threshold. ROC Curve. Biometrics: A Pattern Recognition System. Pattern classification. Biometrics CSE 190 Lecture 3

Aruna Bhat Research Scholar, Department of Electrical Engineering, IIT Delhi, India

Fingerprint Individuality

PAPER BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes

Information Hiding and Covert Communication

RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION

Biometric Hash based on Statistical Features of Online Signatures

Likelihood Ratio in a SVM Framework: Fusing Linear and Non-Linear Face Classifiers

Wavelet Packet Based Digital Image Watermarking

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY

Maximum Likelihood and Maximum A Posteriori Adaptation for Distributed Speaker Recognition Systems

Likelihood Ratio Based Biometric Score Fusion

Estimation of Relative Operating Characteristics of Text Independent Speaker Verification

Role of Assembling Invariant Moments and SVM in Fingerprint Recognition

PIN-based cancelable biometrics

Automatic Identity Verification Using Face Images

Quantization Index Modulation using the E 8 lattice

Score Normalization in Multimodal Biometric Systems

Multi-Race Age Estimation Based on the Combination of Multiple Classifiers

Secure Sketch for Multiple Secrets

Technical Report. Results from 200 billion iris cross-comparisons. John Daugman. Number 635. June Computer Laboratory

Test Sample and Size. Synonyms. Definition. Main Body Text. Michael E. Schuckers 1. Sample Size; Crew designs

Robot Image Credit: Viktoriya Sukhanova 123RF.com. Dimensionality Reduction

Analytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System

Roadmap. Introduction to image analysis (computer vision) Theory of edge detection. Applications

Robust Speaker Identification

Biometric Fusion: Does Modeling Correlation Really Matter?

A Confidence-Based Late Fusion Framework For Audio-Visual Biometric Identification

Multiple Classifier System for Writer Independent Offline Handwritten Signature Verification using Elliptical Curve Paths for Feature Extraction

Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes

Application of hopfield network in improvement of fingerprint recognition process Mahmoud Alborzi 1, Abbas Toloie- Eshlaghy 1 and Dena Bazazian 2

ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION

ISCA Archive

Semi-parametric Distributional Models for Biometric Fusion

FiberFingerprint Identification

FINGERPRINT INFORMATION MAXIMIZATION FOR CONTENT IDENTIFICATION 1. Rohit Naini, Pierre Moulin

On the Projection Matrices Influence in the Classification of Compressed Sensed ECG Signals

2D Image Processing Face Detection and Recognition

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena

Face Detection and Recognition

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Naïve Bayes classification

Dynamic Linear Combination of Two-Class Classifiers

Multimodal Biometric Fusion Joint Typist (Keystroke) and Speaker Verification

System 1 (last lecture) : limited to rigidly structured shapes. System 2 : recognition of a class of varying shapes. Need to:

arxiv: v1 [cs.cv] 1 Sep 2018

Pramod K. Varshney. EECS Department, Syracuse University This research was sponsored by ARO grant W911NF

Two-Layered Face Detection System using Evolutionary Algorithm

On Compression Encrypted Data part 2. Prof. Ja-Ling Wu The Graduate Institute of Networking and Multimedia National Taiwan University

Unsupervised Anomaly Detection for High Dimensional Data

Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1

Shankar Shivappa University of California, San Diego April 26, CSE 254 Seminar in learning algorithms

Lecture 3 Classification, Logistic Regression

T Cryptography: Special Topics. February 24 th, Fuzzy Extractors: Generating Strong Keys From Noisy Data.

Selective Use Of Multiple Entropy Models In Audio Coding

How to Deal with Multiple-Targets in Speaker Identification Systems?

Face detection and recognition. Detection Recognition Sally

Naïve Bayes classification. p ij 11/15/16. Probability theory. Probability theory. Probability theory. X P (X = x i )=1 i. Marginal Probability

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security

Frans M.J. Willems. Authentication Based on Secret-Key Generation. Frans M.J. Willems. (joint work w. Tanya Ignatenko)

Research Article Multimodal Personal Verification Using Likelihood Ratio for the Match Score Fusion

This is a repository copy of The effect of quality scalable image compression on robust watermarking.

CPSC 467: Cryptography and Computer Security

Theoretical Statistical Correlation for Biometric Identification Performance

Eigenface-based facial recognition

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Pulse characterization with Wavelet transforms combined with classification using binary arrays

Cancellable biometrics and annotations on BioHash

Face Recognition Using Eigenfaces

Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan

OVERLAPPING ANIMAL SOUND CLASSIFICATION USING SPARSE REPRESENTATION

AMONG several approaches for image classification,

Advanced Machine Learning & Perception

Vector Quantization. Institut Mines-Telecom. Marco Cagnazzo, MN910 Advanced Compression

On the Individuality of Fingerprints: Models and Methods

A Novel Rejection Measurement in Handwritten Numeral Recognition Based on Linear Discriminant Analysis

The E8 Lattice and Error Correction in Multi-Level Flash Memory

Transcription:

17th European Signal Processing Conference (EUSIPCO 29) Glasgow, Scotland, August 24-28, 29 EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMA AREA UNER THE CURVE FOR THE HAMMING ISTANCE CASSIFIER Chun Chen, Raymond Veldhuis Signals and Systems Group, Electrical Engineering, University of Twente P.O. Box 217, 75AE Enschede, The Netherlands email: {c.chen, r.n.j.veldhuis}@utwente.nl ABSTRACT Quantizing real-valued templates into binary strings is a fundamental step in biometric compression and template protection. In this paper, we introduce the area under the curve optimize bit allocation (AUF-OBA) principle. Given the bit error probability, AUF-OBA assigns the numbers of quantization bits to every feature, in such way that the analytical area under the false rejection rate () curve for a Hamming distance classifier (HC) is minimized. Experiments on the FRGC face database yield good performances. 1. INTROUCTION Binary biometric representations are used in data compression and template protection [1]. For the recognition purpose, the binary strings should achieve low false acceptance rate () and false rejection rate (). Additionally, in order to maximize the attacker s efforts in guessing the target template, the bits should be statistically independent and identically distributed (i.i.d.). The straightforward way to extract binary strings is by quantizing and coding the real-valued biometric templates: Firstly, independent features are extracted from the raw measurements. Afterwards, features are quantized individually. The final binary string is then the concatenation of the bits from every feature. To obtain i.i.d. bits, some equalprobability quantizers have been introduced [2], [3], [4]. Furthermore, independent of the quantizer design, a detection rate optimized bit allocation (ROBA) principle [5] was proposed to assign the number of quantization bits, based on the density distribution of every feature, so that the analytical overall detection rate of the binary string is maximized. Often, binary strings are compared by a Hamming distance classifier (HC) that makes decision on the Hamming distances between two strings. Thus, theoretically ROBA only provides the optimal solution at zero Hamming distance threshold, and the performances at the operational range are not optimized. In this paper, we first give the analytical performances of the HC, based on the features bit error probability. Furthermore, we propose an area under the curve optimized bit allocation (AUF-OBA) principle that minimizes the area under the curve for the HC. In Section 2 we demonstrate the performance of a Hamming distance classifier, given the features bit error probability. In Section 3 we present the AUF-OBA principle. In Section 4, we give some experimental results of AUF-OBA on the FRGC (version 1) face database and conclusions are drawn in Section 5. 2. HAMMING ISTANCE CASSIFIER (HC) In this section, we demonstrate that the analytical and performances of a HC is predictable, once the bit error probabilities of both the genuine user and the imposters are known. We begin by ining the bit error probability for the binary strings. Suppose a sequence of bits are extracted from independent real-valued features, i1 b i, where the i th feature is extracted into b i bits. uring the enrollment, let s g,i denote the b i bits generated by the genuine user for the i th feature. The entire -bit string for the genuine user s g is then the concatenation of the bits extracted from every single feature, i.e. s g s g,1...s g,. Similarly, during the verification, let s g,i and s i,i be the bits generated by the genuine user and the imposters, respectively, for the i th feature, and s g and s i be their corresponding entire -bit string. We know that during the verification, due to the inter- and intra-class variation, the genuine user might not extract the same string as the enrollment template, i.e. s g,i s g,i. Contrarily, the imposter might end up with the same string as that of the genuine user in the enrollment, i.e. s i,i s g,i. For these reasons, we can compute the bit error probabilities for s g and s i as compared to s g. Therefore, for the i th feature, we ine: P g,i (k i ;b i ) P i,i (k i ;b i ) P{d H (s g,i,s g,i) k i }, (1) P{d H (s g,i,s i,i ) k i},k i,...,b i, (2) where d H computes the Hamming distance between two input bit strings. Hence P g,i and P i,i represent for the genuine user and the imposters, respectively the probability of having k i bits error among the b i bits extracted for the i th feature during the verification, as compared to the genuine enrollment bit string. Regarding a total of features, we ine: φ g (k;{b i }) φ i (k;{b i }) P{d H (s g,s g) k}, (3) P{d H (s g,s i ) k},k,...,, (4) where φ g (k) and φ i (k) represent for the genuine user and the imposters, respectively the probability of having k bits error among the entire bits extracted during the verification, as compared to the enrollment bit string. Assume that the features are statistically independent, thus their bit errors are also independent. Therefore, the error probability of the whole feature sets equals to the convolution of their individual probabilities. Thus φ g and φ i can be computed from the EURASIP, 29 5

convolution of P g,i and P i,i : φ g (k;{b i }) (P g,1 P g,2... P g, )(k;{b i }), (5) φ i (k;{b i }) (P i,1 P i,2... P i, )(k;{b i }). (6) Expressions in (5) and (6) are ined as the bit error probability models of the binary string for the genuine user and the imposters. Based on these, we can further compute the analytical and performances of the HC. Thus, the (α(t;{b i }) at the Hamming distance threshold t is: α(t;{b i }) P{d H (s g,s i ) t}, t k φ i (k;{b i }), i 1,...,. (7) Similarly, the (β(t;{b i }) at the Hamming distance threshold t is: β(t;{b i }) P{d H (s g,s g) > t}, φ g (k;{b i }), i 1,...,.(8) kt+1 3. AREA UNER CURVE OPTIMIZE BIT AOCATION (AUF-OBA) 3.1 Problem Formulation The optimization problem is ined for every genuine user. Suppose we need to extract bits from independent realvalued features. For every single feature, a background probability density function (PF) and a genuine user PF indicating the feature density of the imposters and the genuine user respectively are known. Moreover, a quantizer is employed to quantize the i th feature into b i bits, i 1,...,, b i {,...,b max }. From (7) and (8) we observe that the and performances of the strings depend on the bits assignment {b i }. Therefore, the goal of the bit extraction is to determine {b i }, so that the verification performance in (7) and (8) is optimal. Furthermore, to obtain i.i.d imposter bits, an equalprobability quantizer is required for the quantization of every feature. We know that an equal-probability quantizer gives equally 2 b i probability mass for every interval. Thus, for the i th feature, when assigned with 2 b i code words, the k i -bit error probability P i,i (k i ;b i ) for the imposters becomes: P i,i (k i ;b i ) 2 b i ( bi k i ). (9) Subject to i1 b i, the in (7) becomes: α(t;{b i }) t k 2 t k φ i (k;{b i }), ( k ). (1) Expression (1) suggests that when quantized by an equalprobability quantizer, the only depends on the string length and becomes independent of the bits assignment {b i }. Therefore, to optimize the and performances, we propose to minimize the area under the curve. The optimization problem is then formulated as: {b i } arg min A, i1 b i 3.2 AUF-OBA Solution arg min i1 b i t β(t;{b i }), (11) We first reformulate β(t;{b i }) in (8) into the following expression: with β(t;{b i }) φ g (k;{b i }), kt+1 k u(k (t + 1))φ g (k;{b i }), (12) { u(k) 1, k,, k <. Therefore the area under the curve becomes: A t t k k k β(t;{b i }), [ ] u(k (t + 1))φ g (k;{b i }), [ φ g (k;{b i }) kφ g (k;{b i }), t ] u(k (t + 1)), (13) E [k;{b i }]. (14) Hence, A equals to the expected value of the number of bit errors E [k;{b i }]. Furthermore, we know that the k-bit error of a -bit binary string come from real-valued features. Thus with k i (i 1,...,) bits error per feature. Furthermore, we have that the expected value of a sum equals the sum of the expected values. Therefore, A E [k;{b i }], i1 E [k i ;b i ], (15) where E [k i ;b i ] is ined as the expected value of the number of errors for the i th feature: E [k i ;b i ] et G i (b i ) be a gain factor: b i k i G i (b i ) E [k i ;b i ] k i P g,i (k i ;b i ). (16) b i k i k i P g,i (k i ;b i ), (17) 51

we can now formulate AUF-OBA principle in (11) into: {b i } arg min i1 b i i1 arg max i1 b i i1 E [k i ;b i ], G i (b i ). (18) This optimization can be solved by a common dynamic programming approach that is also used in ROBA [5], see Appendix A. The computational complexity is about O( 2 b 2 max). 3.3 The genuine user k i -bit error probability Computing the gain factor G i in (17) relies on the genuine user k i -bit error probability P g,i (k i ;b i ), as ined in (1). Given the real-valued genuine user PF p g,i as well as a quantizer, we can compute P g,i (k i ;b i ) as: P g,i (k i ;b i ) P{d H (s g,i,s g,i) k i }, p g,i (v)dv, (19) Q(k i ;b i ) where Q(k i ;b i ) indicates the quantization intervals with k i - bit error as compared to the genuine code s g,i. An example of these intervals based on Gray code is illustrated in Fig. 1. Figure 1: An example of computing P g,i (k i ;b i ) for the i th feature, assigned with b i 2 bits Gray code. The genuine user PF p g,i (black curve); Q(;2) with the genuine code 11 (grey); Q(1;2) with 1-bit error (blue); and Q(2;2) with 2-bit error (white). 4.1 Experimental setup 4. EXPERIMENTS We tested the AUF-OBA principle on the FRGC(version 1) [6] face database. A standard landmark based registration method, i.e. eyes, nose and mouth, was used to align the images. Afterwards, a measurement of 8762 gray pixel values were extracted. We made two subsets: and FRGC. Set contains 275 users with various numbers of high quality images (n from 4 to 36), taken under controlled conditions. Set FRGC contains 198 users with low quality images (n from 4 to 16), taken under uncontrolled conditions. We randomly selected different users for training and testing and repeated our experiment with 5 partitionings. With, in total, n samples per user, the division of the data is stated in Table 1. Table 1: ata division (number of users number of samples per user) and the number of trials for and FRGC. Training Enrollment Verification Partitioning 21 n 65 3n/4 65 n/4 5 FRGC 15 n 48 2n/3 48 n/3 5 In the training step, we first applied a combined PCA/A method [7] on a training set. The obtained transformation was then applied to both the enrollment and verification sets. We assume that the measurements have Gaussian density, thus after the PCA/A, the extracted features are statistically independent. In the enrollment step, we applied the AUF-OBA for every target user. We set b max 3. The gain factor G i was computed from the fixed quantizer [2], [3], [4]. Additionally, the background PF and the genuine user PF were modeled as Gaussian density, e.g. p b N(v,,1), p g N(v, µ,σ), respectively. The AUF-OBA outputs the bit assignment {b i }, based on which the features were quantized and coded with a Gray code. In the verification step, the features of the query user were quantized and coded according to the {b i } of the claimed identity, resulting in a query binary string. Finally the query binary string was compared with the target binary string by using a HC. 4.2 Experimental results We evaluated the performances of the binary strings with 31, 63 and 127, extracted from various numbers of features. The / performances for and FRGC are shown in Fig. 2 and Fig. 3, where the is plotted in log scale. Since the HC is evaluated at integer Hamming distance threshold, the / performances are discrete. Figure 2 suggests that for the high quality data, given, when the number of features increases, the overall / performance improves and becomes stable. This result proves that AUF-OBA can effectively extract distinctive bits when the feature dimensionality is high. Contrarily, Fig. 3 suggests that for the low quality data FRGC, given, when the number of features increases, the overall / performance improves. However, when, as seen with 31 and 63 in Fig. 3, 3, the performance starts to deteriorate. The reason is that at a high dimensionality after PCA/A transformation, the features of the low quality data become less reliable, and the error probabilities built on such features are not accurate. To further investigate the performances at the operational points, i.e. 1 4, we picked the - settings with the best performances around such operational points. The / performances for and FRGC are listed in Table 2 and Table 3. Results show that the performances at 1 4 are good regarding a compression or template protection system. Additionally, A lower is achieved when the binary string length is larger, e.g. 127. To compare the performances of AUF-OBA with ROBA, in Fig. 4 we illustrated their performances at the same - settings. Results show that AUF-OBA is slightly better than ROBA. 52

.25.2.15, AUF OBA, 31 5 8 1 12 15 18 2.5.45.4.35.3 FRGC, AUF OBA, 31 5 8 1 12 149.25.1.2.15.5.1.5 1 4 1 3 1 2 1 1 1 4 1 3 1 2 1 1.25.2.15, AUF OBA, 63 5 8 1 12 15 18 2.5.45.4.35.3 FRGC, AUF OBA, 63 5 8 1 12 149.25.1.2.15.5.1.5 1 4 1 3 1 2 1 1 1 4 1 3 1 2 1 1.25.2.15, AUF OBA, 127 5 8 1 12 15 18 2.5.45.4.35.3 FRGC, AUF OBA, 127 5 8 1 12 149.25.1.2.15.5.1.5 1 4 1 3 1 2 1 1 1 4 1 3 1 2 1 1 (c) (c) Figure 2: The / performances for extracted under AUF-OBA principle, from various numbers of features, at 31; 63 and (c) 127. Figure 3: The / performances for FRGC extracted under AUF-OBA principle, from various numbers of features, at 31; 63 and (c) 127. Table 2: The / performances for. (%) (%) (%) 1, 31 6.5.1 2.3.2.7 1.8 2, 63 5.7.1 1.7.1 1.7 2, 127 4.7.1 1.8.1 1.4 Table 3: The / performances for FRGC. FRGC (%) (%) (%) 8, 31 21.2 8.2 3 1.6 8, 63 15.1 5.1 3 1.6 149, 127 12.1 6.1 3 1. 53

.1.9.8.7.6.5.4.3.2.1.22.2.16.12.8, compare AUF OBA and ROBA 1, 31, AUF OBA 1, 31, ROBA 2, 63, AUF OBA 2, 63, ROBA 2, 127, AUF OBA 2, 127, ROBA 1 4 1 3 1 2 1 1 FRGC, compare AUF OBA and ROBA 8, 31, AUF OBA 8, 31, ROBA 8, 63, AUF OBA 8, 63, ROBA 149, 127, AUF OBA 149, 127, ROBA Algorithm 1 A common dynamic programming approach to solve AUF-OBA principle. Input:,,G i (b i ),b i {,...,b max },i 1,...,, Initialize: j, b (), G () () 1, while j do j j + 1, ˆb, ˆb argmaxg ( j 1) (b ) + G j (b ), end while Output: b + b l, b {,...,( j 1) b max }, b {,...,b max } l,..., j b max, G ( j) (l) G ( j 1) (ˆb ) + G j (ˆb ), b i (l) b i (ˆb ),i 1,..., j 1, b j (l) ˆb, {b i } {b i ()},i 1,...,..4 1 4 1 3 1 2 1 1 Figure 4: The / performances of AUF-OBA, compared with ROBA, for and FRGC. 5. CONCUSION Quantizing real-valued templates into binary strings is a fundamental step in biometric compression and template protection. In this paper, we propose the AUF-OBA principle. Given the features bit error probability, AUF-OBA assigns the numbers of quantization bits to every feature, in such way that the analytical area under the curve of a Hamming distance classifier is minimized. Experiments on the FRGC face database yield good performances. Theoretically, AUF- OBA is superior to ROBA and this is proved by the experimental results. However, the improvements is not very significant. 6. ACKNOWEGMENTS This research is supported by the research program Sentinels (www.sentinels.nl). Sentinels is financed by Technology Foundation STW, Netherlands Organization for Scientific Research (NWO), and the utch Ministry of Economic Affairs. A. YNAMIC APPROACH REFERENCES [1] A.K. Jain, K. Nandakumar, and A. Nagar. Biometric template security. EURASIP Journal on Advances in Signal Processing, 8(2), 28. [2] P. Tuyls, A.H.M. Akkermans, T.A.M. Kevenaar, G.J. Schrijen, A.M. Bazen, and R.N.J. Veldhuis. Practical biometric authentication with template protection. In Proc. Audio-and Video-Based Biometric Person Authentication (AVBPA 25), pages 436 446, NY, USA, 25. [3] T.A.M. Kevenaar, G.J. Schrijen, M. van der Veen, A.H.M. Akkermans, and F. Zuo. Face recognition with renewable and privacy preserving binary templates. In Proc. IEEE Workshop on Automatic Identification Advanced Technologies (AutoI 25), pages 21 26, NY, USA, 25. [4] C. Chen, R.N.J. Veldhuis, T.A.M. Kevenaar, and A.H.M. Akkermans. Multi-bits biometric string generation based on the likelihood ratio. In Proc. IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS7), 27. [5] C. Chen, R.N.J. Veldhuis, T.A.M. Kevenaar, and A.H.M. Akkermans. Biometric binary string generation with detection rate optimized bit allocation. In Computer Vision and Pattern Recognition Workshops (CVPR), 28. [6] P. J. Phillips, P. J. Flynn, W. T. Scruggs, K. W. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and W.J. Worek. Overview of the face recognition grand challenge. In Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 25), pages 947 954, M, USA, 25. [7] R.N.J. Veldhuis, A. Bazen, J. Kauffman, and P. Hartel. Biometric verification based on grip-pattern recognition. In Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents VI (SSWMC 24), volume 536, pages 634 641, CA, USA, 24. 54