hybrid approach for generating binary secured face templates with bda

23
A HYBRID APPROACH FOR GENERATING BINARY SECURED FACE TEMPLATE (BDA) Dhananjay Dewangan

Upload: self

Post on 12-Feb-2017

220 views

Category:

Engineering


2 download

TRANSCRIPT

Page 1: Hybrid Approach for generating Binary Secured Face templates with BDA

A HYBRID APPROACH FOR GENERATING BINARY SECURED FACE TEMPLATE (BDA)

Dhananjay Dewangan

Page 2: Hybrid Approach for generating Binary Secured Face templates with BDA

Hybrid Approach

• Combination of both methods, Biometric cryptosystem and cancellable biometrics.

Page 3: Hybrid Approach for generating Binary Secured Face templates with BDA

Binary Discriminant Analysis

• The rationale of the proposed method is to use a set of n linear discriminant function to transform a real-valued template into a n dimensional binary face template.

Page 4: Hybrid Approach for generating Binary Secured Face templates with BDA

Binary Discriminant Analysis

• The key issue is how to find the optimal linear discriminant functions so that the discriminability of the binary templates is maximized.

• To maximize the discriminability Between class variance should be maximum and Within class variance should be minimum.

• To minimize within class variance, we use perceptron learning rule

• To maximize between class variance we make use of BCH codes.

Page 5: Hybrid Approach for generating Binary Secured Face templates with BDA

Perceptron Learning Rule• The perceptron is employed to find optimal linear discriminant

function (LDFs) so that the output binary templates are close to the corresponding target binary template. Thus, the within-class variance of the binary templates is minimized.

• If two classes C1 and C0 are linearly separable, a linear discriminant functiong(x) = wTx + tis constructed so that for a random sample in these two classes,g(x) > 0, if x Ɛ C1g(x) ≤ 0, if x Ɛ C0

Page 6: Hybrid Approach for generating Binary Secured Face templates with BDA

Proposed Method - Enrolment

BCH Codes(255,37,45)

Feature Extraction

(DCT)

Perceptron Learning Rule

Compare

SHA-256

Database (Stores Hashed Password and Weight & Bias matrix)

Weight & Bias

Password (5 digit)Alphanumeric

Biometric Template( Face)

Identical

Not Identical

Page 7: Hybrid Approach for generating Binary Secured Face templates with BDA

Proposed Method - Authentication

Page 8: Hybrid Approach for generating Binary Secured Face templates with BDA

Feature Extraction

• In our project we are using DCT transform for feature extraction.

Page 9: Hybrid Approach for generating Binary Secured Face templates with BDA

Feature Extraction• DCT Coefficient Scanning Order

Currently we are using first approx 500 coefficients in zig zag order but it can be reduced to less number by taking large no of sample of same facial image varying its Illumination, Pose, Expression and Lighting conditions.

Page 10: Hybrid Approach for generating Binary Secured Face templates with BDA

• BCH CodesIn our project, we have used BCH [255,37,45] code.

• Hashing Algorithm We have used SHA 256 hash algorithm to secure the confidential data(password).

Page 11: Hybrid Approach for generating Binary Secured Face templates with BDA

• Pre-processingWe have taken 256 bit length BCH code and SHA 256 takes input length 512 bit hence we need to preprocess it. Append the bit '1' to the message .Append k bits '0', where k is the minimum number >= 0 such that the resulting message length (modulo 512 in bits) is 448.Append length of message (without the '1' bit or padding), in bits, as 64-bit big-endian integer (this will make the entire post-processed length a multiple of 512 bits)

Page 12: Hybrid Approach for generating Binary Secured Face templates with BDA

Performance Analysis

Page 13: Hybrid Approach for generating Binary Secured Face templates with BDA

Image Database

Image Database contains two types of database• Password – Secured Hash• Weight & Bias matrix – Adjusted in binary

format.

Page 14: Hybrid Approach for generating Binary Secured Face templates with BDA

Image Database (cont)

Page 15: Hybrid Approach for generating Binary Secured Face templates with BDA

Experimental Analysis

• Between Class VarianceThe BCH coding scheme preserves the minimum hamming distance between its each code. For BCH (255, 37, 45), the minimum hamming distance is (2x45+1)=91 and the corresponding variance is (91)^2/4 which can be considered as strong between class variance and also helps to improve performance of our biometric cryptosystems.

Page 16: Hybrid Approach for generating Binary Secured Face templates with BDA

Experimental Analysis

• Within Class Variance In our project we have taken more number of images of each individual having different pose and expression. As the no of image increases, the correlation between them also increases which leads to less variance. . Another importance of having more images of each individual is decrease in storage requirements since only few DCT coefficients or low frequency components need to be retained.

Page 17: Hybrid Approach for generating Binary Secured Face templates with BDA

Experimental Analysis

• RevocabilityIn our project we have adopted the BCH coding scheme as a target which is further stored in the database after employing hashing technique such as SHA-256 for security purpose. This coding scheme is applied over the user’s password. So if the password is changed in case of templates compromisation, its BCH code will be changed and their corresponding hash will also be changed which leads to a different data in the database to be stored

Page 18: Hybrid Approach for generating Binary Secured Face templates with BDA

Experimental Analysis

• Performance In our project, database contains not directly

images but secured binary representation of such images. So we can conclude that the binarization and their hash don’t affect the actual performance of our biometric cryptosystem.

Page 19: Hybrid Approach for generating Binary Secured Face templates with BDA

Experimental Analysis

• SecurityIn our project, we have used SHA-256 to

accommodate the security of face template which provides the security level over birthday attack of 2^128 which is quite enough for any moderate level application.

Page 20: Hybrid Approach for generating Binary Secured Face templates with BDA

Experimental Analysis

• Diversity Since SHA algorithm is noninvertible and the weight and bias matrix doesn’t reveal any information, the imposter has to make an attempt for both what the password is and what the relevant face should look like. Therefore the brute-force attack is nearly impossible for 5 digit password (94^5) consisting 94 different alphanumeric key. Since it is a two stage verification systems, it provides enough security and strong diversity for moderate level application.

Page 21: Hybrid Approach for generating Binary Secured Face templates with BDA

Future Scope

• In order to achieve higher level of security, more number of biometric traits are required to authenticate whether the user is genuine or imposter. So multimodal biometric cryptosystem can be implemented by the same proposed method along with other biometric traits.

• For higher level of security ,BCH coding schemes and corresponding hashing techniques can be changed to more number of bits as per application requirements and number of users

Page 22: Hybrid Approach for generating Binary Secured Face templates with BDA

References S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric Recognition:

Security and Privacy Concerns,” IEEE Security and Privacy Magazine, Vol. 1, No. 2, pp. 33-42, March-April 2003.

Anil K Jain, Ajay Kumar, Biometrics on Next Generation: An Overview. Jain AK, Nandakumar K, and Nagar A (2008) Biometric template

security. EURASIP J Advances n Signal Processing, Special issue on Biometrics.

A. K. Jain, K. Nandakumar and A. Nagar, "Biometric Template Security", EURASIP Journal on Advances in Signal Processing, January 2008.

Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi and Fabio Scotti, Privacy in Biometrics.

Page 23: Hybrid Approach for generating Binary Secured Face templates with BDA

References A. Teoh Beng Jin, D. Ngo Chek Ling, and A. Goh. Biohashing: two

factor authentication featuring fingerprint data and tokenised random number. Pattern recognition, 37(11):2245–2255, 2004.

Hossein Malekinezhad, Hossein Ebrahimpour-Komleh, Protecting Biometric-based Authentication Systems against Indirect Attacks.

Hossein Malekinezhad, Hossein Ebrahimpour-Komleh, Fractal Technique for Face Recognition.

Y C Feng1, Pong C Yuen1and Anil K Jain, A Hybrid Approach for Face Template Protection.

Andrew B.J. Teoha, Yip Wai Kuan b Sangyoun Lee a, Cancellable biometrics and annotations on BioHash, Pattern Recognition 41 (2008) 2034 – 2044.