{"title":"Two-dimensional winner-takes-all hashing in template protection based on fingerprint and voice feature level fusion","authors":"K. Chee, Zhe Jin, W. Yap, B. Goi","doi":"10.1109/APSIPA.2017.8282253","DOIUrl":null,"url":null,"abstract":"Biometrics has been explosively deployed for identity verification and/or identification over the last decade. Lately, multi-biometric systems are gaining attention due to its universality and higher accuracy in biometric recognition. However, the compromise of templates stored in database as separate entities in multi-biometric systems undoubtedly poses the major security and privacy threats due to the strong binding between identity and biometric data. In this paper, we propose to fuse fingerprint and voice modalities at feature level to obtain an integrated template. Subsequently, we propose two-dimensional Winner-Takes-All hashing method to protect the fused template. The proposed hashing method is inspired from Winner-Takes-All hashing and further altered for this unique multi-biometric system. Specifically, the proposed hashing method transforms the continuous fused biometric feature into discrete value. Such transformation enjoys strong non-linearity and thus resilient to the feature variation in certain degree. We show that the resultant hashed code can withstand the major attacks (e.g. template invertibility attack, attack via multiplicity etc.) while yielding reasonable recognition performance. A low equal error rate of 0.94% is obtained using the proposed hashing method on fingerprint images from FVC2002 DB1 and FVC2002 DB2 datasets and voice features from NIST Speaker Recognition Evaluation (SRE) 2004 ∼ 2010. More importantly, the proposed two-dimensional Winner-Takes-All hashing method can be extended and applied to other biometric modalities with real value representation.","PeriodicalId":142091,"journal":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"10 47","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APSIPA.2017.8282253","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Biometrics has been explosively deployed for identity verification and/or identification over the last decade. Lately, multi-biometric systems are gaining attention due to its universality and higher accuracy in biometric recognition. However, the compromise of templates stored in database as separate entities in multi-biometric systems undoubtedly poses the major security and privacy threats due to the strong binding between identity and biometric data. In this paper, we propose to fuse fingerprint and voice modalities at feature level to obtain an integrated template. Subsequently, we propose two-dimensional Winner-Takes-All hashing method to protect the fused template. The proposed hashing method is inspired from Winner-Takes-All hashing and further altered for this unique multi-biometric system. Specifically, the proposed hashing method transforms the continuous fused biometric feature into discrete value. Such transformation enjoys strong non-linearity and thus resilient to the feature variation in certain degree. We show that the resultant hashed code can withstand the major attacks (e.g. template invertibility attack, attack via multiplicity etc.) while yielding reasonable recognition performance. A low equal error rate of 0.94% is obtained using the proposed hashing method on fingerprint images from FVC2002 DB1 and FVC2002 DB2 datasets and voice features from NIST Speaker Recognition Evaluation (SRE) 2004 ∼ 2010. More importantly, the proposed two-dimensional Winner-Takes-All hashing method can be extended and applied to other biometric modalities with real value representation.