28
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Secure and Efficient Biometric-Data Binarization using Multi-Objective Optimization

, , &
Pages 1116-1127 | Received 08 Dec 2014, Accepted 05 Oct 2015, Published online: 13 Nov 2015

References

  • Y. Chang, W. Zhang, and T. Chen. Biometric-based cryptographic key generation. In Proc. the IEEE Intl. Conf. on Multimedia and Expo, pages 2203–2206, 2004.
  • A. Teoh, A. Goh, and D. Ngo. Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs. Proc. IEEE Trans. on Pattern Analysis and Machine Intelligence, 28(12), 2006.
  • A. Juels and M. Wattenberg. A fuzzy commitment scheme. In Proc. the 6th ACM Conf. on Computer and Communication Security, pages 28–36, 1999.
  • O. Ouda, N. Tsumura, and T. Nakaguchi. Tokenless cancelable biometrics scheme for protecting iris codes. In Proc. Intl. Conf. on Pattern Recognition, pages 882–885, 2010.
  • J. Daugman. How iris recognition works. IEEE Trans. on Circuits and Systems for Video Technology, 14(1), 2004.
  • M. Lim and A. Teoh. An effective biometric discretization approach to extract highly discriminative, informative, and privacy-protective binary representation. EURASIP Journal on Advances in Signal Processing, 2011.
  • C. Chen, R. Veldhuis, T. Kevenaar, and A. Akkermans. Biometric quantization through detection rate optimized bit allocation. EURASIP Journal on Advances in Signal Processing, 2009.
  • C. Coello. An updated survey of evolutionary multiobjective optimization techniques: state of the art and future trends. In Proc. the Intl. Congress on Evolutionary Computations, 1999.
  • K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan. A fast and elitist multi objective genetic algorithm : Nsga-ii. IEEE Transactions on Evolutionary Computation, 6(2), 2000.
  • ORL face image database AT&T Laboratories www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.
  • MCYT-Fingerprint-100 ATVS Biometric Recogntion Group http://atvs.ii.uam.es/databases.jsp.
  • J. Linnartz and P. Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In Proc. the 4th Intl. Conf. on Audio and Video Based Person Authentication, pages 238–250, 2003.
  • F. Hao and W. Chan. Private key generation from on-line handwritten signatures. Information Management and Computer Security, 10(4), 2002.
  • M. Lim, A. Teoh, and K. Toh. An analysis on equal width quantization and linearly separable subcode encoding-based discretization and its performance resemblances. EURASIP Journal on Advances in Signal Processing, 2011.
  • A. Teoh, W. Yip, and K. Toh. Cancellable biometrics and user-dependent multi-state discretization in biohash. Intl. Journal of Pattern Analysis and Applications, 13(3), 2010.
  • C. Chen and R. Veldhuis. Extracting biometric binary strings with minimal area under the FRR curve for the hamming distance classifier. Signal Processing Journal, 91(4), 2011.
  • P. Tuyls, A. Akkermans, T. Kevenaar, G. Schrijen, A. Bazen, and N. Veldhuis. Practical biometric authentication with template protection. In Proc. the 5th Intl. Conf. on Audio- and Video-based Biometric Person Authentication, pages 436–446, 2005.
  • A. Teoh, K. Toh, and W. Yip. 2n discretization of biophasor in cancellable biometrics. In Proc. Intl. Conf. on Biometrics, pages 435–444, 2007.
  • M. Lim and A. Teoh. A novel output label with high separability for biometric discretization. In Proc. the 5th IEEE Conf. on Industrial Electronics and Applications, pages 290–294, 2010.
  • M. Lim and A. Teoh. A novel encoding scheme for effective biometric discretization linearly separable subcode. IEEE Trans. on Pattern Analysis and Machine Intelligence, 35(2), 2013.
  • A. Hans. Multicriteria optimization for highly accurate systems, Multicirteria optimization in engineering and sciences. Plenum Press, 1988.
  • N. Srinivas and K. Deb. Multiobjective optimization using nondominated sorting in genetic algorithm. The Journal of Evolutionary Computations, 2(3), 1994.
  • M. Fonseca and J. Fleming. Genetic algorithms for multiobjective optimization: Formulation, discussion and generalization. In Proc. the 5th Conf. onGenetic Algorithms, 1993.
  • J. Horn, N. Nafpliotis, and E. Goldberg. Multiobjective optimization using the niched pareto genetic algorithm. In Proc. the 1st IEEE Intl. Conf. on Evolutionary Computations, 1994.
  • E. Zitzler, K. Deb, and L. Thiele. Comparison of multiobjective evolutionary algorithms: empirical results. Evolutionary Computation, 8(2), 2000.
  • M. Mitchell. An introduction to genetic algorithms. MIT Press Cambridge, 1996.
  • J. Koza. Genetic Programming on The Programming of Computers by Means of Natural Selection. MIT Press, 1992.
  • A. Pentland M. Turk. Eigenfaces for recognition. Journal of Cognitive Neurosicence, 3(1):71–86, 1991.
  • F. Fernandez, J. Ortega, J. Fronthaler, H. Kollreider, and K. Bigun. Combining multiple matchers for fingerprint verification: A case study in biosecure network of excellence. Annals of Telecommunications, Multimodal Biometrics, 62(2), 2007.
  • P. Rogaway and T. Shrimpton. Cryptographic HashFunction Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Springer-Verlag, 2004.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.