The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.09 - Sept. (2013 vol.35)
pp: 2064-2077
V. N. Boddeti , Dept. of Electr. & Comput. Eng., Carnegie Mellon Univ., Pittsburgh, PA, USA
B. V. K. V. Kumar , Dept. of Electr. & Comput. Eng., Carnegie Mellon Univ., Pittsburgh, PA, USA
ABSTRACT
We describe a template-based framework to bind class-specific information to a set of image patterns and retrieve that information by matching the template to a query pattern of the same class. This is done by mapping the class-specific information to a set of spatial translations which are applied to the set of image patterns from which a template is designed, taking advantage of the properties of correlation filters. The bound information is retrieved during matching with an authentic query by estimating the spatial translations applied to the images that were used to design the template. In this paper, we focus on the problem of binding information to biometric signatures as an application of our framework. Our framework is flexible enough to allow spreading the information to be bound over multiple pattern classes which, in the context of biometric key-binding, enables multiclass and multimodal biometric key-binding. We demonstrate the effectiveness of the proposed scheme via extensive numerical results on multiple biometric databases.
INDEX TERMS
Correlation, Training, Pattern matching, Authentication, Databases, Noise, Matched filters,palmprint recognition, Biometric security, correlation filters, biometric key-binding, face recognition
CITATION
V. N. Boddeti, B. V. K. V. Kumar, "A Framework for Binding and Retrieving Class-Specific Information to and from Image Patterns Using Correlation Filters", IEEE Transactions on Pattern Analysis & Machine Intelligence, vol.35, no. 9, pp. 2064-2077, Sept. 2013, doi:10.1109/TPAMI.2012.244
REFERENCES
[1] D. Maltoni, Handbook of Fingerprint Recognition. Springer-Verlag, 2003.
[2] V. Boddeti, F. Su, and B.V.K. Vijaya Kumar, "A Biometric Key-Binding and Template Protection Framework Using Correlation Filters," Proc. Third Int'l Conf. Advances in Biometrics, pp. 919-929, 2009.
[3] C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B.V.K. Vijaya Kumar, "Biometric Encryption Using Image Processing," Proc. SPIE, vol. 3314, p. 178, 1998.
[4] C. Soutar, D. Roberge, and A. Stoianov, "Biometric Encryption: Enrollment and Verification Procedures," Proc. SPIE, vol. 3386, p. 24, 1998.
[5] C. Soutar, D. Roberge, and A. Stoianov, "Biometric Encryption," ICSA Guide to Cryptography, pp. 649-675, 1999.
[6] A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237-257, 2006.
[7] U. Uludag, S. Pankanti, and A. Jain, "Fuzzy Vault for Fingerprints," Proc. Fifth Int'l Conf. Audio- and Video-Based Biometric Person Authentication. pp. 310-319, 2005.
[8] Y. Lee, K. Park, S. Lee, K. Bae, and J. Kim, "A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System," IEEE Trans. Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 38, no. 5, pp. 1302-1313, Oct. 2008.
[9] F. Hao, R. Anderson, and J. Daugman, "Combining Crypto with Biometrics Effectively," IEEE Trans. Computers, vol. 55, no. 9, pp. 1081-1088, Sept. 2006.
[10] Y. Sutcu, S. Rane, J. Yedidia, S. Draper, and A. Vetro, "Feature Extraction for a Slepian-Wolf Biometric System Using LDPC Codes," Proc. IEEE Int'l Symp. Information Theory, pp. 2297-2301, 2008.
[11] Y. Sutcu, S. Rane, J. Yedidia, S. Draper, and A. Vetro, "Feature Transformation of Biometric Templates for Secure Biometric Systems Based on Error Correcting Codes," Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops, pp. 1-6, 2008.
[12] W. Scheirer and T. Boult, "Cracking Fuzzy Vaults and Biometric Encryption," Proc. Biometrics Symp. pp. 1-6, 2007.
[13] A. Kholmatov and B. Yanikoglu, "Realization of Correlation Attack against the Fuzzy Vault Scheme," Proc. SPIE, vol. 6819, 2008.
[14] K. Nandakumar, A. Nagar, and A. Jain, "Hardening Fingerprint Fuzzy Vault Using Password," Proc. Int'l Conf. Advances in Biometrics, pp. 927-937, 2007.
[15] A. Teoh, A. Goh, and D. Ngo, "Random Multispace Quantization as an Analytic Mechanism for Biohashing of Biometric and Random Identity Inputs," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 1892-1901, Dec. 2006.
[16] B.V.K. Vijaya Kumar, A. Mahalanobis, and R. Juday, Correlation Pattern Recognition. Cambridge Univ Press, 2005.
[17] A. Mahalanobis, B.V.K. Vijaya Kumar, and D. Casasent, "Minimum Average Correlation Energy Filters," Applied Optics, vol. 26, no. 17, pp. 3633-3640, 1987.
[18] A. Mahalanobis, B.V.K. Vijaya Kumar, S. Song, S. Sims, and J. Epperson, "Unconstrained Correlation Filters," Applied Optics, vol. 33, no. 17, pp. 3751-3759, 1994.
[19] D.S. Bolme, J.R. Beveridge, B.A. Draper, and Y.M. Lui, "Visual Object Tracking Using Adaptive Correlation Filters," Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 2544-2550, 2010.
[20] N. Ratha, S. Chikkerur, J. Connell, and R. Bolle, "Generating Cancelable Fingerprint Templates," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561-572, Apr. 2007.
[21] M. Savvides, B.V.K. Vijaya Kumar, and P. Khosla, "Cancelable Biometric Filters for Face Recognition," Proc. 17th Int'l Conf. Pattern Recognition, vol. 3, pp. 922-925, 2004.
[22] J.K. Pillai, V.M. Patel, R. Chellappa, and N.K. Ratha, "Secure and Robust Iris Recognition Using Random Projections and Sparse Representations," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 33, no. 9, pp. 1877-1893, Sept. 2011.
[23] D. Donoho, "For Most Large Underdetermined Systems of Linear Equations the Minimal L1-Norm Solution Is Also the Sparsest Solution," Comm. Pure and Applied Math., vol. 59, no. 6, pp. 797-829, 2006.
[24] E. Candes, J. Romberg, and T. Tao, "Stable Signal Recovery from Incomplete and Inaccurate Measurements," Comm. Pure and Applied Math., vol. 59, no. 8, pp. 1207-1223, 2006.
[25] S. Chen, D. Donoho, and M. Saunders, "Atomic Decomposition by Basis Pursuit," SIAM J. Scientific Computing, vol. 20, no. 1, pp. 33-61, 1999.
[26] S. Wright, R. Nowak, and M. Figueiredo, "Sparse Reconstruction by Separable Approximation," IEEE Trans. Signal Processing, vol. 57, no. 7, pp. 2479-2493, July 2009.
[27] T. Sim, S. Baker, and M. Bsat, "The CMU Pose, Illumination, and Expression Database," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 25, no. 12, pp. 1615-1618, Dec. 2003.
[28] R. Gross, I. Matthews, J. Cohn, T. Kanade, and S. Baker, "Multi-Pie," Image and Vision Computing, vol. 28, no. 5, pp. 807-813, 2010.
[29] D. Zhang, "Polyu Palmprint Database," Biometric Research Centre, Hong Kong Polytechnic Univ., http://www. comp. polyu. edu. hk~biometrics , 2012.
[30] P. Phillips, P. Flynn, T. Scruggs, K. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and W. Worek, "Overview of the Face Recognition Grand Challenge," Proc. IEEE Conf. Computer Vision and Pattern Recognition, vol. 1, pp. 947-954, 2005.
[31] P. Hennings-Yeomans, B.V.K. Vijaya Kumar, and M. Savvides, "Palmprint Classification Using Multiple Advanced Correlation Filters and Palm-Specific Segmentation," IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 613-622, Sept. 2007.
[32] B.V.K. Vijaya Kumar, D. Carlson, and A. Mahalanobis, "Optimal Trade-Off Synthetic Discriminant Function Filters for Arbitrary Devices," Optics Letters, vol. 19, no. 19, pp. 1556-1558, 1994.
95 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool