{"title":"Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code","authors":"L. Leng, A. Teoh, Ming Li, M. Khan","doi":"10.1109/ISBAST.2013.40","DOIUrl":null,"url":null,"abstract":"Recently two-dimensional (2D) Palm Hash Code was proposed as a cancelable palm print coding scheme for secure palm print verification. However, there is vertical correlation between the vertically adjacent entries of 2DPalmHash Code. Armed with the statistical correlation analysis, an attacker can break into the palm print verification system easier than using brute-force attack. This paper analyzes the relation between the vertical correlation of 2DPalmHash Code and the corresponding vertical correlation of Gabor feature matrix. To suppress the vertical correlation of 2DPalmHash Code, both the real part and imaginary part of Gabor feature matrices, which are extracted along the orientations approaching vertical orientation, are transposed, respectively. The orientation rang suitable for transposition for vertical correlation suppression is determined by both correlation analysis and experimental results.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"134 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Symposium on Biometrics and Security Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISBAST.2013.40","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Recently two-dimensional (2D) Palm Hash Code was proposed as a cancelable palm print coding scheme for secure palm print verification. However, there is vertical correlation between the vertically adjacent entries of 2DPalmHash Code. Armed with the statistical correlation analysis, an attacker can break into the palm print verification system easier than using brute-force attack. This paper analyzes the relation between the vertical correlation of 2DPalmHash Code and the corresponding vertical correlation of Gabor feature matrix. To suppress the vertical correlation of 2DPalmHash Code, both the real part and imaginary part of Gabor feature matrices, which are extracted along the orientations approaching vertical orientation, are transposed, respectively. The orientation rang suitable for transposition for vertical correlation suppression is determined by both correlation analysis and experimental results.