An Analysis of BioHashing and Its Variants

Similar documents
PIN-based cancelable biometrics

Securing BioEncoded IrisCodes Against Correlation Attacks

BIOMETRIC verification systems are used to verify the

PAPER BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes

This is an accepted version of a paper published in Elsevier Information Fusion. If you wish to cite this paper, please use the following reference:

Palmprint based Verification System Robust to Occlusion using Low-order Zernike Moments of Sub-images

Biometrics: Introduction and Examples. Raymond Veldhuis

Likelihood Ratio-Based Biometric Verification

If you wish to cite this paper, please use the following reference:

Automatic Identity Verification Using Face Images

Score calibration for optimal biometric identification

A Contrario Detection of False Matches in Iris Recognition

Semi-parametric Distributional Models for Biometric Fusion

Biometric Security Based on ECG

ON BINARY REPRESENTATIONS FOR BIOMETRIC TEMPLATE PROTECTION. Chun Chen

Cancellable biometrics and annotations on BioHash

AMONG several approaches for image classification,

Palmprint identification using feature-level fusion

Biometric Hash based on Statistical Features of Online Signatures

COMPUTATIONAL ALGORITHMS FOR FINGERPRINT RECOGNITION

Palmprint Verification with Moments

Dimensionality Reduction Using PCA/LDA. Hongyu Li School of Software Engineering TongJi University Fall, 2014

Orientation Map Based Palmprint Recognition

Predicting large population data cumulative match characteristic performance from small population data

An Efficient Pseudoinverse Linear Discriminant Analysis method for Face Recognition

Score Normalization in Multimodal Biometric Systems

Fingerprint Individuality

Estimation of Relative Operating Characteristics of Text Independent Speaker Verification

Random Sampling LDA for Face Recognition

Likelihood Ratio Based Biometric Score Fusion

When enough is enough: early stopping of biometrics error rate testing

Information Fusion for Local Gabor Features Based Frontal Face Verification

EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER

A Modified Incremental Principal Component Analysis for On-Line Learning of Feature Space and Classifier

A Modified Incremental Principal Component Analysis for On-line Learning of Feature Space and Classifier

Error Rates. Error vs Threshold. ROC Curve. Biometrics: A Pattern Recognition System. Pattern classification. Biometrics CSE 190 Lecture 3

Eigenface-based facial recognition

Technical Report. Results from 200 billion iris cross-comparisons. John Daugman. Number 635. June Computer Laboratory

Biometric verification based on grip-pattern recognition

Research Article Multimodal Personal Verification Using Likelihood Ratio for the Match Score Fusion

Comparative Assessment of Independent Component. Component Analysis (ICA) for Face Recognition.

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY

How to Deal with Multiple-Targets in Speaker Identification Systems?

Aruna Bhat Research Scholar, Department of Electrical Engineering, IIT Delhi, India

Analytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System

IBM Research Report. The Relation between the ROC Curve and the CMC

Image Region Selection and Ensemble for Face Recognition

Has this Person Been Encountered Before? : Modeling an Anonymous Identification System

CITS 4402 Computer Vision

Nearest Neighbourhood Classifiers in Biometric Fusion

A Unified Bayesian Framework for Face Recognition

Face Recognition Using Eigenfaces

Face Recognition Technique Based on Eigenfaces Method

Template-based Recognition of Static Sitting Postures

Maximum Likelihood and Maximum A Posteriori Adaptation for Distributed Speaker Recognition Systems

Blind Collective Signature Protocol

A Minutiae-based Fingerprint Individuality Model

Face Detection and Recognition

Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication

SVM based on personal identification system using Electrocardiograms

Biometric Fusion: Does Modeling Correlation Really Matter?

Keywords Eigenface, face recognition, kernel principal component analysis, machine learning. II. LITERATURE REVIEW & OVERVIEW OF PROPOSED METHODOLOGY

Likelihood Ratio in a SVM Framework: Fusing Linear and Non-Linear Face Classifiers

Face Recognition Technique Based on Eigenfaces Method

Role of Assembling Invariant Moments and SVM in Fingerprint Recognition

IDIAP. Martigny - Valais - Suisse ADJUSTMENT FOR THE COMPENSATION OF MODEL MISMATCH IN SPEAKER VERIFICATION. Frederic BIMBOT + Dominique GENOUD *

Hybrid Multi-Biometric Person Authentication System

Multimodal Biometric Fusion Joint Typist (Keystroke) and Speaker Verification

CARNEGIE MELLON UNIVERSITY

A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems

Bayesian Decision Theory

On the Complexity of the Minimum Independent Set Partition Problem

Research Article Binary Biometric Representation through Pairwise Adaptive Phase Quantization

Application of hopfield network in improvement of fingerprint recognition process Mahmoud Alborzi 1, Abbas Toloie- Eshlaghy 1 and Dena Bazazian 2

Stefanos Zafeiriou, Anastasios Tefas, and Ioannis Pitas

Eigenimaging for Facial Recognition

Face recognition Computer Vision Spring 2018, Lecture 21

On the Problem of Error Propagation in Classifier Chains for Multi-Label Classification

Non-parametric Classification of Facial Features

Recognition Using Class Specific Linear Projection. Magali Segal Stolrasky Nadav Ben Jakov April, 2015

Impossible Differential Cryptanalysis of Mini-AES

A Novel Rejection Measurement in Handwritten Numeral Recognition Based on Linear Discriminant Analysis

Lecture: Face Recognition

Distinguishing Causes from Effects using Nonlinear Acyclic Causal Models

Correspondence. The Effect of Correlation and Performances of Base-Experts on Score Fusion

Eigen Co-occurrence Matrix Method for Masquerade Detection

Cryptographic Protocols Notes 2

RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION

2D Image Processing Face Detection and Recognition

Two-Layered Face Detection System using Evolutionary Algorithm

Success Probability of the Hellman Trade-off

FACE RECOGNITION USING HISTOGRAM OF CO-OCCURRENCE GABOR PHASE PATTERNS. Cong Wang, Zhenhua Chai, Zhenan Sun

Lecture 2: Connecting the Three Models

ECE 661: Homework 10 Fall 2014

Speaker Recognition Using Artificial Neural Networks: RBFNNs vs. EBFNNs

Incremental Face-Specific Subspace for Online-Learning Face Recognition

Activity related recognition in AmI environments

Dynamic Linear Combination of Two-Class Classifiers

System 1 (last lecture) : limited to rigidly structured shapes. System 2 : recognition of a class of varying shapes. Need to:

Fast Signature Generation with a. Fiat Shamir { Like Scheme. Fachbereich Mathematik / Informatik. Abstract

Transcription:

An Analysis of BioHashing and Its Variants 1, 2 Adams Kong, 1 King-Hong Cheung, 1 David Zhang, 2 Mohamed Kamel and 1 Jane You 1 Biometrics Research Centre Department of Computing The Hong Kong Polytechnic University Hung Hom, Kowloon, Hong Kong 2 Pattern Anal ysis and Machine Intelligence Lab University of Waterloo, 2 University Avenue West, Ontario, Canada Corresponding author: Dr Jane You Biometrics Research Centre Department of Computing The Hong Kong Polytechnic University Hung Hom, Kowloon, Hong Kong Phone: (852) 2766-7293 Fax: (852) 2774-842 E -mail: csyjia@comp.polyu.edu.hk

Abstract As a result of the growing demand for accurate and reliable personal authentication, biometric recognition, a substitute for or complement to existing authentication te chnologies, has attracted considerable attention. It has recently been reported that, along with its variants, BioHashing, a new technique that combines biometric features and a tokenized (pseudo-) random number (TRN), has achieved p e rfect accuracy, having zero equal error rates (EER) for faces, fingerprints and palmprints. There are, however, anomalies in this approach. These are identified in this p a p e r, in which we systematically analyze the details of the approach and conclude that t h e claim of having a chieved a zero EER is based upon an impractical hidden assumption. We simulate the claimants experiments and find that it is not possible to achieve their reported performance without the hidden assumption and that, indeed, the results are worse than when using the biometric alone. Keywords: BioHashing, Fa c e Hashing, Pa l m Hashing, biometrics, verification, security, user identity, password. 1. Introduction Accurate automatic personal authentication system s, w h i c h have been deployed i n 1

many applications including access control, computer login and e -commerce for protecting our live s, physical properties and digital information, are essential for many security systems. There are two classical personal authentication approaches [ 1, 2]: t oken based approach, which relies on physical items such as smart cards, physical keys and passports and knowledge based a p p r o a c h which r e p l i e s on private knowledge such as passwords. Both of these approaches have their limitations: it is possible for both tokens and knowledge to be forgotten, lost, stolen, or duplicated. Further, authorized users may share their knowledge and t o k e ns with unauthorized users. These limitations do not apply to biometric means of authentication, which i d e n t i f y a person based on physiological characteristics, such as the iris, fingerprint, face or palmprint, and/or by behavioral characteristics, such as a person s signature or gait [1]. A l t h o u g h biometric authentication has several i n h e rent advantages over the c l a s s i c a l a p p r o a c h e s, all of biometric verification systems make two types of errors [ 2]: 1) misrecognizing measurements from two different persons to be from the same person, c a l l e d false acceptance and 2) misrecognizing measurements from the same person to be from two different persons, called false rejection. The performance of a biometric system is commonly described by its false acceptance rate (FAR) and false rejection rate (FRR). These two measurements can be controlled by adjusting a threshold, but it is not 2

possible to exploit this threshold by simultaneously reduci n g FAR and FRR. FAR and FRR must be traded-off, as reducing FAR increase s FRR and vice versa. Another important performance index of a biometric system is its equal error rate (EER) defined as at the point where FAR and FRR are equal. A perfect system in term s of accuracy would have EER of zero. Unfortunately, however, over thirty years investigation, a perfect biometric verification system has not been developed. Numerous biometric researchers thus continue to work in this area, looking for new biometrics, developi n g new feature representations and matching methods and combining the exis ting t e c h n i q u e s [ 3-9]. Recently, a group of researchers propose d a new personal authentication approach called BioHashing [ ] (and its variants [ 11-17]) that combines a tokenized (pseudo-) random number (TRN) and biometric feature s. The authors reported zero EERs for faces, fingerprints and palmprints and demonstrated that BioHashing does not rely on specific biometrics, advanced feature representations or complex classifiers. Even w i t h Fisher discrimination analysis for face recognition, BioHashing can still achieve perfect accuracy [ 13]. The authors say [ ] that The BioHashing has significant functional advantages over solely biometrics i.e. zero equal error rate point and clean separation of the genuine and impostor populations, thereby allowing elimination of false accept rates 3

without suffering from increased occurrence of false reject rates. In addition, they also m e n t i o n [ 11 ] that the proposed PalmH ashing technique is able to produce zero equal error rate (EER) and yields clean separation of the genuine and impostor populations. Hence, the false acceptance rate (FAR) can be eliminated without suffering from the i n c r e a s e d o c c u r r e n c e of the false rejection rate (FRR). In general, a result of zero EER is the ultimate goal but it is extremely hard to achieve if not impossible. Naturally, reports of such impressive results and claims of perfection aroused our interest and motivated this further study. This paper is organized as follows. Section 2 presents a general review of biometric verification systems. Section 3, highlights the details of the Biohashing approach. Section 4, provides a comprehensive analysis of this approach a n d Section 5 reports the results of our simulation tests. Section 6 offers our conclusions. 2. An Overview of Biometric Verification System In this paper, we concentrate on biometric system s for verification tasks in which BioHashing and its variants are operate d. Fig. 1 illustrates the operation flow of such biometric systems. To validate the user s claimed identity, verification systems conduct one -to-one comparison using two pieces of information: a claimed identity and 4

biometric data. The input biometric data is compared with biometric templates associated with the claimed identity in a given database. Generally speaking, user i d e n t i t i e s can be inputted via various devices such as keypads and smart card readers and should be unique to each person, like a primary key in a database. It should be noted that user identities in such forms can be shared, lost, forgotten and duplicated, just like the keys/cards of token-based and the PINs/passwords o f knowledge -based authentication systems. Nonetheless, because biometric authentication is also required, to pass through the verification system requires more than the mere possession of a valid user identity i.e. an impostor cannot gain access unless the input biometric data matches the template of the claimed identity. We have to emphasize here that the performance of a biometric verification system should not depend solely on user i d e n t i ty or its equivalent and therefore, many biometric systems accept obvious user i d e n t i ti e s such as personal names. A biometric verification system has f i v e possible input combinations. For the sake of c o n v e n i e n c e, we use the notation {I, B} to represent the pair-wise information, a claimed user identity I and its associated biometric data B. A registered user X stores h i s/her user identity and biometric template, {I X, B XD }, in a database after enrollment. Suppose user X provide s his / h e r user identity and biometric d a t a, {I X, B XV } at the time of 5

verification. Even though B XD a n d B XV are from the same person, because of various noises, they are not identical. We also assume that an impostor Y, an unregistered person has a n invalid user identity I Y (w h i c h m a y have bee n obtaine d by, for example guessing) and biometric data B YV. Case 1 {I X, B XV } vs. {I X, B XD } User X input s his/her user identity and biometric data {I X, B XV } to the system to compare {I X, B XD } in the database. The system would compare B XD and B XV and give a matching score. From this matching score, there are two possible responses: either correct acceptance or false rejection. Case 2 {I X, B YV } vs. {I X, B XD } Assume an impostor Y has the user identity of X a n d inputs X s identity together w i t h his/her biometric {I X, B YV } to the system. The input will then be compare d with {I X, B XD } in the database. As Case 1, we have two possible responses, false acceptance and correct rejection. C a s e 3{I Y, B YV } An impostor Y provides his/her user (invalid) identity and biometric data to the system. Since the user identity, I Y, does not match any identity in the system, the system 6

simply rej ect s the user without error and will not attempt to match any biometric information. Case 4 {I~ X, B XV } A registered user X inputs a wrong user identity I~ X, i.e. not his/her valid user i d e n t i t y, I X. If I~ X. is a valid user identity, t h e s y s t e m would output its decision based on matching the biometric information and the threshold, {I~ X, B XV } vs. {I~ X, B~ XD }, as in Case 2. If I~ X. is an invalid user identity, the system would simply reject the user, as in C a s e 3. Case 5 {NULL, B XV } OR {NULL, B YV } No matter who opera tes the verification system, a registered user or an unregistered user, a user identity is required. A biometric verification system cannot operate without user identities, i.e. NULL. It would also be unreasonable to assign a temporary user identity to any user who did not provide a user identity at the time of verification. From these analyses, we conclude the following: Case 5 is invalid; and testing a verification system on Case 3 produces trivial rejection; and Case 4 can be resolved to be either Case 2 or Case 3 depending on the user identity provided. As it happens, to evaluate the performance of a verification system, a ll biometric researchers assume a 7

situation in which impostors have obtained a valid user identity. Performance evaluation for genuine distributions are estimated using the matching scores from Case 1, for impostor distributions, those from Case 2. I f knowledge or token representing the user identity in verification would not be forgotten, l o s t or s t o l e n, it made the introduction of biometric system less meaningful except for guarding against multiple users using the same identity through sharing or duplicating knowledge or t o k e n. If, f u r t h e r, knowledge or token would not be shared or duplicated, introducing biometrics bec a me meaningless. 3. BioHashing 3.1 Summary of BioHashing Fig. 2 illustrates two major processes i n BioHashing and its variants [- 17]: biometric feature extraction and discretization. The process of extraction, shown on the right hand side of the figure includes signal acquisition, preprocessing and feature extraction, just as general biometric verification systems. Different biometric signals exploit different techniques in the first process but the f o c u s of our analysis is discretization, the secret of BioHashing, consisting of four steps. Here, we review the most -r e p o r t e d discretization method used in [-12, 14-17], while another method has 8

been reported which differs by thresholding and selection of basis forming TRN [ 13]. Discretization is conducted in four ste ps. 1) Employ the input token to generate a set of pseudo-random vectors, M { r R i 1,....., m} based on a seed. i = M 2) Apply the Gram-Schmidt process to { r R i 1,....., m} a n d t h u s obtain T R N, i = M a set of orthonormal vectors { p R i 1,....., m}. i = 3) C alculate the dot product of v, the feature vector obtained from Step 1 and each orthnonormal vector in TRN, p i, such t h a t v, pi. 4) Use a threshold τ to obtain BioCode, b whose elements are defined as b i = 1 if if v, p v, p i i τ, > τ w h e r e i is be tween 1 and m, the dimensionali t y o f b. Tw o BioCodes are compared by hamming distance. 3.2 Implementation of BioHashing In order to have a better understanding of BioHashing and its variants, we decided t o re -implement one of the variants, FaceHashing [ 12-15], as a demonstration. We have taken face images as our input biometrics since face recognition is a well known hard 9

problem, which has attracte d considerable attention over ten years. A publicly available face database, the AR face database[ 18] from Purdue University, and a well known feature extraction technique, Pri ncipal Component Analysis (PCA), also called Eigenface for face recognition [ 19-2] are chosen for this demonstration so that all the results reported in this paper are reproducible. We do not employ other effective face recognition algorithms and other accurate biometrics such as fingerprint for this demonstration so that readers can clearly observe the performance differences due to the unrealistic assumption. T he AR face database contains over 4, color frontal still images obtained in 2 sessions (with 14 days apart between the 2 sessions) from 126 subjects (7 men and 56 women). In each session, 13 images were taken from each subject in an indoor environment; however, each of the 13 images is taken under various conditions: different facial expressions, illumination settings or occlusions (sunglasses and scarves). There were no limitations on the participant s clothes, make -up, ornaments or hair styles. [ 19] The original AR database images are made up of raw, 768 576 colour images. We have converted these i nto 192 144 gray scale images. Since there is only one face per image and the face is roughly located at the center of the image, no face detection is

performed. The face subimages for fea ture extraction are 96 96 in size and were cropped from the central canvas of a gray scale face image. Since we are only doing a demonstration to facilitate our analysis and discussion, 5 subjects were randomly selected from the face database. E ight image s of each subject were selected, four from each session. The facial expression in the four images from each session is neutral but the illuminations vary. Fig. 3 shows a set of sample images of a subject used in our demonstration; Figs. 3(a)-(d) are taken from the first session and Figs. 3(e)-(d) are taken from the second session. T he four images from the first session were u s e d t o determine the principal components a n d were stored in the database as gallery images. The four images from the second session were then used as query images to match against gallery images. T his is known as matching duplicates [ 19]. Although we demonstrate here only FaceHashing, it does not lose any generality to analyze BioHashing and its variants. In this test, we first select ed two hundred Principal Components in order to generate BioCode with different dimensions for our analysis. Table 1 lists t he dimensions of the BioCode and the corresponding thresholds (t ) according to the deduction of made in [ 11, 14]. Each subject has a unique TRN and the same TRN is used for different dimensions of the BioCode under consideration. 11

3.3 Experimental Results We simulated FaceHashing [ 12-15] with different dimensions of B iocode and their performances are reported in the form of Receiver Operating Characteristic (ROC) curve s as a plot of the genuine acceptance rates (GAR) against the false acceptance rates (FAR) for all possible operating points in the first column of Fig. 4, i.e. (a), (c), (e), (g) and (i). It can be seen that as the BioCode s increase in dimensionality, the EER s g r a d u a l l y decrease to zero. Fig. 5 (a), (c), (e), (g) and (i) shows the corresponding genuine and imposter distributions. Here, as the BioCodes increase in dimensionality, the gap between the two distribution increases. The results of our demonstration are inline with the reported results. As in their reported results [ -17], it was possible to achieve zero EER when the dimensions of BioCode are large enough, for example, or above. 4. Analysis of BioHashing 4.1 The Condition of zero EER In Section 3, we demonstrated the p o w e r of FaceHashing, a variant of BioHashing, i n a c h i e ving zero EER, a s claimed i n the ir published papers [ -17]. Obviously, the 12

high performance of BioHashing is resulted from the TRN, not from the biometric features. In our demonstration, we are able to obtain a zero EER by applying only a simple feature extraction approach, PCA, but in general, even with advanced classifiers, such as support vector machines, PCA is impossible to yield % accuracy along with zero EER. The outstanding performance reported in [ -17] is based on the use of TRN s. In [ -14], the authors mentioned that a unique seed among different persons and a p plications is used to calculate the TRN such that 1) the seed and thus the TRN for each user used in enrollment and verification is the same; 2) different users (and applications) have different seeds and thus different TRNs. In other words, the seed and T R N are unique across users as well as applications. They also pointed out that the seed for calculating the TRN can be stored in a USB token or smart card. Comparing the properties of the seed in BioHashing (and its variants) and the user identity of a b i ometric verification system as described in Section 2, it is obvious that the seed, and thus the TRN can serve as a user identity. As the seed is stored in a physical media, TRN also suffers from the problems of t o k e n, e.g. they can be lost, stolen, share d and duplicated. T h e TRN has a central role in BioHashing and its variants and is requisite for 13

achieving zero EER. The authors assume that no impostor has the valid seed/trn. That i s, the y assume that the t o k e n will not be lost, stolen, shared and dupl icated. If the ir assumption is true, introducing any biometric becomes meaningless since the system can rely solely on the tokens without any risk. Undoubtedly, the i r assumption doe s not hold in general. In their experiments, they determine the genuine distribution using, in our notation, Case 1. However, they determine the impostor distribution using Case 3 i n which no biometric should be involved because of the mismatch of with the pseudo user identity, the seed/trn. 4.2 The True Performance of BioHashing To establish the true performance of BioHashing and its variants, we reran the demonstration again under the assumption that impostors have valid TRNs, just as the g e n e r a l practice of evaluating a biometric verification system. In our notation, Cases 1 a nd 2 are for genuine and imposter distributions, respectively. Fig. 4 (b), (d), (f), (h) and ( j ) show the performance in the form of ROC curves for each dimension of BioCode tested in Section 3 and their corresponding genuine and imposter distributions are shown in Fig. 5 (b), (d), (f), (h) and (j). In contrast with the reports in [-17], it is clear that the performance is far from perfect. For ease of comparison, Fig. 6 provides an 14

integrated plot of the ROC curves shown in Fig. 4. The solid line without any marker is the ROC curve w h e n using PCA and Euclidean distance. The dashed lines with markers are the ROC curves when assuming no loss of user identity/token/smart card. The dotted lines with markers are the ROC curves when using the general assumption for evaluating a biometric verification system. It can be seen that the true performance of BioCode is even worse than that of using PCA and Euclidean distance since BioHashing uses a random projection, w h i c h does not serve for any objective function. 5. Conclusion A f t e r reviewing the key concepts and components of a biometric verification system, we have reveale d that the outstanding achievements of BioHashing and its variants, zero EER are under a hidden and unpractical assumption that the TRN would neve r be lost, stolen, shared or duplicated that does not hold generally. We also point out that if this assumption held, there would be no need for biometrics to combine the TRN since the TRN could serve as a perfect password. To further support our argument, we us ed a public face database and PCA to simulate their experiments. I t is possible to achieve a zero EER by using the combination of a TRN and a biometric under their assumption. Adopting an assumption generally used in the biometric community, our experimental 15

results show that the true performance of BioHashing is far from perfect. 16

REFERENCES [ 1] A. Jain, R. Bolle and S. Pankanti (eds.), Biometrics: Personal Identification in Networked Society, Boston, Mass: Kluwer Academic Publishers, 1999. [2] A. K. Jain, A. Ross and S. Prabhakar, An Introduction to Biometric Recognition, IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4-2, 24. [3] R. Chellappa, C.L. Wilson and A. Sirohey, Human and machine recognition of f aces: A survey, Proceedings of the IEEE, vol. 83, no. 5, pp. 75-74, 1995. [4] B. Bhanu and X. Tan, Fingerprint indexing based on novel features of minutiae triplets, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 5, pp. 616-622, 23. [5] A. Jain, L. Hong and R. Bolle, On-line fingerprint verification, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 4, pp. 32-314, 1997. [ 6] D. Zhang, W.K. Kong, J. You and M. Wong, On-line palmprint ident ification, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 9, pp. 41-5, 23. [7] J.O. Kim, W. Lee, J. Hwang, K.S. Baik and C.H. Chung, Lip print recognition for security systems by multi-resolution architecture, Future Generation Computer Systems, vol. 2, pp. 295-31, 24. [8] A. Ross and A.K. Jain, Information Fusion in Biometrics, Pattern Recognition Letters, vol. 24, no. 13, pp. 2115-2125, 23. [ 9] S.A. Israel, J.M. Irvine, A. Cheng, M.D. Wiederhold and B.K. Wiederhold, ECG to identify individual s, Pattern Recognition, vol. 38, 133-142, 25. [ ] A.B.J. Teoh, D.C.L Ngo and A. Goh, BioHashing: two factor authentication featuring fingerprint data and tokenised random number, Pattern Recognition, vol. 3 7, pp. 2245-2255, 24. 17

[11 ] T. Connie, A. Teoh, M. Goh and D. Ngo, PalmHashing: A Novel Approach for Dual -Factor Authentication, Pattern Analysis and Application, vol 7, no. 3, pp. 255-268. [ 12] D.C.L. Ngo, A.B. J. Teoh and A. Goh, Eigenspace -based face hashing, in Proc. of International Conference on Biometric Authentication (ICBA), pp. 195-199, Hong Kong, July 24. [ 1 3 ] A.B.J. Teoh, D.C. L. Ngo and A. Goh, An integrated dual factor authenticator based on the face data and tokenised random number, in Proc. of International Conference on Biometric Authentication (ICBA), pp. 117-123, Hong Kong, July 24. [ 14] A.B.J. Teoh, D.C. L. Ngo and A. Goh, Personalised cryptographic key generation based on FaceHashing, Computers and Security Journal, vol. 23, no. 7, pp. 66-614, 24. [ 15] A.B.J. Teoh and D.C.L. Ngo, Cancellable biometrics featuring with tokenized random number, To appear in Pattern Recognition Letters. * [ 16] Y.H. Pang, A.B.J Teoh and D.C.L. Ngo, Palmprint based cancelable biometric a u t h e n t ication system, International Journal of Signal Processing, vol. 1, no. 2, pp. 98-4, 24. * [ 17] T. Connie, A. Teoh, M. Goh and D. Ngo, PalmHashing: a novel approach to cancelable biometrics, Information Processing Letter, vol. 93, no. 1, pp. 1-5, 25. * [18] A.M. Martinez, and R. Benavente, The AR face database, CVC Tech. Report #24, 1998. see also: http://rvl1.ecn.purdue.edu/~aleix/aleix_face_db.html [19] A. M. Martinez, and A.C. Kak, PCA versus LDA, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 23, no. 2, pp. 228-233, 21. [2] M. Turk, and A. Pentland, Eigenfaces for recognition, Journal of Cognitive Neuroscience, vol. 3, pp. 71-86, 1991. 18

[ 12-13] In: Zhang, D., Jain, A. K. (e d s. ): Biometric Authentication. Lecture Notes in Computer Science, Vol. 372. Springer-Ve r l a g, Berlin Heidelberg NewYork (24) * [ 15-17] are obtained from A.B.J Te o h 19

Figures: F i g. 1 Operation flow of a biometric verification s ystem F i g. 2 A schematic diagram of BioHashing F i g. 3 Sample face images used in our demonstration. ( a )-(d) images are collected f r o m 1 s t session and (e)-(h) images are collected from 2 nd session. F i g. 4 ROC curves of various dimensions of BioCode. T h e dimensions of BioCodes are (a) and (b), (c) and (d) 5, (e) and (f), (g) and (h) 15 and (i) and (j) 2. The ROC curves of (a), (c), (e), (g) and (i) are under the assumption that impostors do not have valid TRN. The ROC curves of (b), (d), (f), (h) and (j) are under the assumption that impostors have valid TRN. F i g. 5 T he corresponding Genuine and Impostor distributions of Figs. 4. F i g. 6 Comparison of ROC curves of various dimensions of BioCode under different assumptions Tables: Table 1 T h r e s holds used for various dimensions of BioCode 2

F i g. 1 21

F i g. 2 22

( a ) (b) ( c ) (d) ( e ) ( f ) (g) (h) F i g. 3 23

9 9 Genuine Acceptance Rate (%) 8 7 6 5 4 3 2 Genuine Acceptance Rate (%) 8 7 6 5 4 3 2 2 3 4 5 6 7 8 9 Impostor Acceptance Rate (%) 2 3 4 5 6 7 8 9 Impostor Acceptance Rate (%) ( a ) (b) 9 9 Genuine Acceptance Rate (%) 8 7 6 5 4 3 2 Genuine Acceptance Rate (%) 8 7 6 5 4 3 2 2 3 4 5 6 7 8 9 Impostor Acceptance Rate (%) 2 3 4 5 6 7 8 9 Impostor Acceptance Rate (%) ( c ) (d) 9 9 Genuine Acceptance Rate (%) 8 7 6 5 4 3 2 Genuine Acceptance Rate (%) 8 7 6 5 4 3 2 2 3 4 5 6 7 8 9 Impostor Acceptance Rate (%) 2 3 4 5 6 7 8 9 Impostor Acceptance Rate (%) ( e ) ( f ) 9 9 Genuine Acceptance Rate (%) 8 7 6 5 4 3 2 Genuine Acceptance Rate (%) 8 7 6 5 4 3 2 2 3 4 5 6 7 8 9 Impostor Acceptance Rate (%) 2 3 4 5 6 7 8 9 Impostor Acceptance Rate (%) (g) (h) 24

9 9 Genuine Acceptance Rate (%) 8 7 6 5 4 3 2 Genuine Acceptance Rate (%) 8 7 6 5 4 3 2 2 3 4 5 6 7 8 9 Impostor Acceptance Rate (%) 2 3 4 5 6 7 8 9 Impostor Acceptance Rate (%) ( i ) Fig. 4 ( j ) 25

45 4 Genuine Impostor 4 35 Genuine Impostor 35 3 Percentage 3 25 2 15 Percentage 25 2 15 5 5.1.2.3.4.5.6.7.8.9 1 Normalized Hamming Distance ( a ).1.2.3.4.5.6.7.8.9 1 Normalized Hamming Distance (b) 15 Genuine Impostor 15 Genuine Impostor Percentage Percentage 5 5.1.2.3.4.5.6.7.8.9 1 Normalized Hamming Distance.1.2.3.4.5.6.7.8.9 1 Normalized Hamming Distance ( c ) (d) 18 16 Genuine Impostor 18 16 Genuine Impostor 14 14 12 12 Percentage 8 Percentage 8 6 6 4 4 2 2.1.2.3.4.5.6.7.8.9 1 Normalized Hamming Distance.1.2.3.4.5.6.7.8.9 1 Normalized Hamming Distance ( e ) ( f ) 2 18 Genuine Impostor 16 14 Genuine Impostor 16 14 12 Percentage 12 8 Percentage 8 6 6 4 4 2 2.1.2.3.4.5.6.7.8.9 1 Normalized Hamming Distance (g).1.2.3.4.5.6.7.8.9 1 Normalized Hamming Distance (h) 26

25 Genuine Impostor 18 16 Genuine Impostor 2 14 Percentage 15 Percentage 12 8 6 5 4 2.1.2.3.4.5.6.7.8.9 1 Normalized Hamming Distance ( i ) F i g. 5.1.2.3.4.5.6.7.8.9 1 Normalized Hamming Distance ( j ) 27

F i g. 6 28

Table 1 BioCode dimension Threshold for BioCode (t ) 5 15 2 29

List of changes made 1. Page 2, paragraph 1, line 2: live changed to lives 2. Page 3, paragraph 1, line 4: in term of changed to in terms of 3. Page 3, paragraph 1, line 8: e xiting changed to e xisting 4. Page 3, para graph 2, line 5: Even when changed to Even with 5. Page 9, Step 3, line 2: from first step changed to from Step 1 6. Page 9, Step 4, line 2: between and m changed to between 1 and m 7. Correction/Update of the References 8. Renumbering the References according to the ordered as they appeared in the text 9. Page, paragraph 1, added We do not employ other effective face recognition algorithms and other accurate biometrics such as fingerprint for this demonstration so that readers can clearly observe the performance differences due to the unrealistic assumption. to the end of this paragraph.. Replacing Fig 6 and modifying its caption accordingly 11. Page 11, paragraph 3, line 2, one hundred changed to two hundred 12. Page 12, paragraph 1, last line, 5 change d to 13. Replace Fig 4 and Fig 5 and their captions according to changes reported in item 9 14. Page 12, paragraph 1, line 6, Fig. 5 changed to Fig. 5 (a), (c), (e), (g) and (i) 15. P a g e 14, paragraph 2, line 4, Figs. 4 changed to F i g. 4 16. Page 14, paragra ph 2, line 6, added and their corresponding genuine and imposter distributions are shown in Fig. 5 (b), (d), (f), (h) and (j) after Section 3 17. Replacing Table 1 according to changes reported in item 9 18. Page 11, paragraph 3, line 5, added one reference to become [11, 14] N o t e : 1. I t e m s 1-8 are modified to the specific suggestion provided by the reviewer. 2. I t e m s 9-18 are modified in response to the comments of the reviewer, On the other hand, the performance of the biometric recognition system used in the manuscript is not high. Thus, it should be mentioned that if the performance of the biometric system is more high with higher dimension, more effective features or combination of features such as finger-print and face, how the performance of the system will become. 3