The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - Feb. (2013 vol.35)
pp: 300-313
Meng-Hui Lim , Sch. of Electr. & Electron. Eng., Yonsei Univ., Seoul, South Korea
A. B. J. Teoh , Sch. of Electr. & Electron. Eng., Yonsei Univ., Seoul, South Korea
ABSTRACT
Separability in a code is crucial in guaranteeing a decent Hamming-distance separation among the codewords. In multibit biometric discretization where a code is used for quantization-intervals labeling, separability is necessary for preserving distance dissimilarity when feature components are mapped from a discrete space to a Hamming space. In this paper, we examine separability of Binary Reflected Gray Code (BRGC) encoding and reveal its inadequacy in tackling interclass variation during the discrete-to-binary mapping, leading to a tradeoff between classification performance and entropy of binary output. To overcome this drawback, we put forward two encoding schemes exhibiting full-ideal and near-ideal separability capabilities, known as Linearly Separable Subcode (LSSC) and Partially Linearly Separable Subcode (PLSSC), respectively. These encoding schemes convert the conventional entropy-performance tradeoff into an entropy-redundancy tradeoff in the increase of code length. Extensive experimental results vindicate the superiority of our schemes over the existing encoding schemes in discretization performance. This opens up possibilities of achieving much greater classification performance with high output entropy.
INDEX TERMS
Encoding, Hamming distance, Reflective binary codes, Entropy, Indexes, Quantization, Labeling,linearly separable subcode, Biometric discretization, quantization, encoding
CITATION
Meng-Hui Lim, A. B. J. Teoh, "A Novel Encoding Scheme for Effective Biometric Discretization: Linearly Separable Subcode", IEEE Transactions on Pattern Analysis & Machine Intelligence, vol.35, no. 2, pp. 300-313, Feb. 2013, doi:10.1109/TPAMI.2012.122
REFERENCES
[1] S.R. Cavior, "An Upper Bound Associated with Errors in Gray Code," IEEE Trans. Information Theory, vol. 21, no. 5 p. 596, Sept. 1975.
[2] Y. Chang, W. Zhang, and T. Chen, "Biometric-Based Cryptographic Key Generation," Proc. IEEE Int'l Conf. Multimedia and Expo, 2004.
[3] C. Chen and R. Veldhuis, "Extracting Biometric Binary Strings with Minimal Area under the FRR Curve for the Hamming Distance Classifier," Signal Processing, vol. 91, no. 4, pp. 906-918, 2011.
[4] C. Chen, R. Veldhuis, T. Kevenaar, and A. Akkermans, "Multi-Bits Biometric String Generation Based on The Likelihood Ratio," Proc. IEEE Int'l Conf. Multimedia and Expo, vol. 3, pp. 2203-2206, 2004.
[5] C. Chen, R. Veldhuis, T. Kevenaar, and A. Akkermans, "Biometric Quantization through Detection Rate Optimized Bit Allocation," EURASIP J. Advances in Signal Processing, vol. 2009, Article ID 784834, p. 16, 2009.
[6] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," Proc. Int'l Conf. Theory and Applications of Cryptographic Techniques, pp. 523-540, 2004.
[7] J. Daugman, "How Iris Recognition Works," IEEE Trans. Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, Jan. 2004.
[8] F. Gray, "Pulse Code Communications," U.S. Patent 2,632,058, 1953.
[9] F. Hao and C.W. Chan, "Private Key Generation from On-Line Handwritten Signatures," Information Management and Computer Security, vol. 10, no. 4, pp. 159-164, 2002.
[10] A. Juels and M. Wattenberg, "A Fuzzy Commitment Scheme," Proc. Sixth ACM Conf. in Computer and Comm. Security, pp. 28-36, 1999.
[11] E.J.C. Kelkboom, K.T.J. de Groot, C. Chen, J. Breebaart, and R.N.J. Veldhuis, "Pitfall of the Detection Rate Optimized Bit Allocation within Template Protection and a Remedy," Proc. IEEE Third Int'l Conf. Biometrics: Theory, Applications and Systems, pp. 230-237, 2009.
[12] T.A.M. Kevenaar, G.J. Schrijen, M. van der Veen, A.H.M. Akkermans, and F. Zuo, "Face Recognition with Renewable and Privacy Preserving Binary Templates," Proc. IEEE Fourth Workshop Automatic Identification Advanced Technologies, pp. 21-26, 2005.
[13] C.E. Killian and C.D. Savage, "Antipodal Gray Codes," Discrete Math., vol. 281, pp. 221-236, 2004.
[14] D.E. Knuth, The Art of Computer Programming, vol. 4. Addison-Wesley, 2005.
[15] M.-H. Lim and A.B.J. Teoh, "Linearly Separable Subcode: A Novel Output Label with High Separability for Biometric Discretization," Proc. IEEE Fifth Conf. Industrial Electronics and Applications, 2010.
[16] J.-P. Linnartz and P. Tuyls, "New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates," Proc. Fourth Int'l Conf. Audio and Video Based Person Authentication, pp. 238-250, 2003.
[17] W. Lu, A.L. Varna, A. Swaminathan, and M. Wu, "Secure Image Retrieval through Feature Protection," Proc. IEEE 34th Int'l Conf. Acoustics, Speech, and Signal Processing, pp. 1533-1536, 2009.
[18] J.E. Ludman, "Gray Code Generation for MPSK Signals," IEEE Trans. Comm., vol. 29, no. 10, pp. 1519-1522, Oct. 1981.
[19] A.M. Martinez and R. Benavente, "The AR Face Database," CVC Technical Report # 24, 1998.
[20] F. Monrose, M.K. Reiter, Q. Li, and S. Wetzel, "Cryptographic Key Generation from Voice," Proc. IEEE Symp. Security and Privacy, pp. 202-213, 2001.
[21] T. Neylon, "A Locality-Sensitive Hash for Real Vectors," Proc. 21st Ann. ACM-SIAM Symp. Discrete Algorithms, pp. 1179-1189, 2010.
[22] P.J. Philips, H. Moon, P.J. Rauss, and S. Rizvi, "The FERET Evaluation Methodology for Face Recognition Algorithms," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 10, pp. 1090-1104, Oct. 2000.
[23] I.N. Suparta, "Counting Sequences, Gray Codes and Lexicodes," PhD dissertation, Delft Univ. of Tech nology, 2006.
[24] A.B.J. Teoh, A. Goh, and D.C.L. Ngo, "Random Multispace Quantisation as an Analytic Mechanism for Biohashing of Biometric and Random Identity Inputs," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 28, no 12, pp. 1892-1901, Dec. 2006.
[25] A.B.J. Teoh, K.-A. Toh, and W.K. Yip, "2^N Discretisation of Biophasor in Cancellable Biometrics," Proc. Second Int'l Conf. Biometrics , pp. 435-444, 2007.
[26] A.B.J. Teoh, D.C.L. Ngo, and A. Goh, "Personalised Cryptographic Key Generation Based on Face Hashing," Computers and Security, vol. 23, no. 7, pp. 606-614, 2004.
[27] A.B.J. Teoh, W.K. Yip, and K.-A. Toh, "Cancellable Biometrics and User-Dependent Multi-State Discretization in BioHash," Pattern Analysis and Applications, vol. 13, pp. 301-307, 2010.
[28] M. Turk and A. Pentland, "Eigenfaces for Recognition," J. Cognitive, Neuroscience, vol. 3, no. 1, pp. 71-86, 1991.
[29] P. Tuyls, A.H.M. Akkermans, T.A.M. Kevenaar, G.-J. Schrijen, A.M. Bazen, and N.J. Veldhuis, "Practical Biometric Authentication with Template Protection," Proc. Fifth Int'l Conf. Audio- and Video-Based Biometric Person Authentication, pp. 436-446, 2005.
[30] E. Verbitskiy, P. Tuyls, D. Denteneer, and J.P. Linnartz, "Reliable Biometric Authentication with Privacy Protection," Proc. 24th Benelux Symp. Information Theory, pp. 125-132, 2003.
[31] W.K. Yip, A. Goh, D.C.L. Ngo, and A.B.J. Teoh, "Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures," Proc. First Int'l Conf. Biometrics, pp. 509-515, 2006.
[32] F. Yue, W. Zuo, D. Zhang, and K. Wang, "Orientation Selection Using Modified FCM for Competitive Code-based Palmprint Recognition," Pattern Recognition, vol. 4, no. 11, pp. 2841-2849, 2009.
[33] C.K. Yuen, "The Separability of Gray Code," IEEE Trans. Information Theory, vol. 20, no. 5, p. 668, Sept. 1974.
41 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool