DOI QR코드

DOI QR Code

Multimodal Biometric Recognition System using Real Fuzzy Vault

실수형 퍼지볼트를 이용한 다중 바이오인식 시스템

  • Lee, Dae-Jong (College of Electrical and Computer Engineering, Chungbuk National University) ;
  • Chun, Myung-Geun (College of Electrical and Computer Engineering, Chungbuk National University)
  • 이대종 (충북대학교 전자정보대학 전자공학부 컴퓨터정보통신연구소) ;
  • 전명근 (충북대학교 전자정보대학 전자공학부 컴퓨터정보통신연구소)
  • Received : 2013.05.20
  • Accepted : 2013.08.07
  • Published : 2013.08.25

Abstract

Biometric techniques have been widely used for various areas including criminal identification due to their reliability. However, they have some drawbacks when the biometric information is divulged to illegal users. This paper proposed multimodal biometric system using a real fuzzy vault by RN-ECC for protecting fingerprint and face template. This proposed method has some advantages to regenerate a key value compared with face or fingerprint based verification system having non-regenerative nature and to implement advanced biometric verification system by fusion of both fingerprint and face recognition. From the various experiments, we found that the proposed method shows high recognition rates comparing with the conventional methods.

바이오인식 시스템은 변하지 않는 고유의 특성으로 인하여 범죄를 포함한 다양한 분야에서 널리 사용되고 있다. 그러나 바이오인식정보가 불법 사용자에게 누설되었을 때 많은 문제점을 지니고 있다. 본 논문에서는 지문과 얼굴 정보를 보호하기 위하여 실수형 오류정보 부호 코드화를 수행하는 실수형 퍼지 볼트를 이용한 다중 바이오 인식 시스템을 개발한다. 제안된 방법은 실수형 퍼지볼트를 이용함으로써 분실시 재생성할 수 없는 지문 및 얼굴 특징값과 달리 개인 킷값을 수시로 변경할 수 있다는 장점과 두 가지 바이오정보를 융합함으로써 보안이 강화된 바이오인식 시스템을 구현할 수 있다는 장점이 있다. 제안된 방법의 타당성을 검증하기 위하여 실험한 결과 기존 방법에 비하여 우수한 결과를 나타냈다.

Keywords

References

  1. S. K. Oh, C. M. Ma, S. H. Yoo, "Design of Optimized pRBFBBs-based Face Recognition Algorithm Using Two-dimensional Image and ASM Algorithm," Journal of Korean Institute of Intelligent Systems, Vol. 21, No. 6, pp. 749-754, 2011. https://doi.org/10.5391/JKIIS.2011.21.6.749
  2. J. Y. Hur, L. X. Truong, S. K. Lee, "A study on Iris Recognition using Wavelet Transformation and Nonlinear Function," Journal of Korean Institute of Intelligent Systems, Vol. 15, No. 3, pp. 357-362, 2005. https://doi.org/10.5391/JKIIS.2005.15.3.357
  3. S. H. Choi, S. W. Cho, S. T. Chung, "Identification System Based on Partial Face Feature Extraction," Journal of Korean Institute of Intelligent Systems, Vol. 22, No. 2, pp. 168-173, 2012. https://doi.org/10.5391/JKIIS.2012.22.2.168
  4. J. H. Kim, S. R. Kwon, "A Study on the Development of Embedded Serial Multi-modal Biometrics Recognition System," Journal of Korean Institute of Intelligent Systems, Vol. 16, No. 1, pp. 49-54, 2006. https://doi.org/10.5391/JKIIS.2006.16.1.049
  5. M. J. Kwon, D. H. Yang, Y. S. Kim, D. J. Lee, M. G. Chun, "Multimodal Biometrics System Using PDA under Ubiquitous Environments," Journal of Korean Institute of Intelligent Systems, Vol. 16, No. 4, pp. 430-435, 2006. https://doi.org/10.5391/JKIIS.2006.16.4.430
  6. I. F. Nizami, S. G. An, S. J. Hong, H. S. Lee, E. T. Kim, M. N. Park, "Fusion Algorithm for Integrated Face and Gait Identification," Journal of Korean Institute of Intelligent Systems, Vol. 18, No. 1, pp. 72-77, 2008. https://doi.org/10.5391/JKIIS.2008.18.1.072
  7. H. J. Go, Y. T. Kim, M. G. Chun, " A Multimodal Emotion Recognition Using the Facial Image and Speech Signal," International Journal of Fuzzy Logic and Intelligent Systems, Vol. 5, No. 1, pp. 1-6, 2005. https://doi.org/10.5391/IJFIS.2005.5.1.001
  8. M. K. Muhammad, N. Marsono, Rabia Bakhteri. "Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm," Future Generation Computer Systems, Vol. 29, No. 3, pp. 800-810, 2013. https://doi.org/10.1016/j.future.2012.02.002
  9. A. Marinoa, F. H. Alvarezb, L. H. Encinasb, "A crypto-biometric scheme based on iris-templates with fuzzy extractors," Information Sciences, Vol. 195, No. 15, pp. 91-102, 2012. https://doi.org/10.1016/j.ins.2012.01.042
  10. E. C. Chang and S. Roy, "Robust Extraction of Secret Bits From Minutiae," Proceedings of Second International Conference on Biometrics, pp. 750-759, 2007,
  11. A. B. J. Teoh, Y. W. Kuan, S. LEE, "Cancellable Biometrics and Annotations on BioHash," Pattern Recognition, Vol. 41, No. 6, pp.2034-2044, 2008. https://doi.org/10.1016/j.patcog.2007.12.002
  12. P. Li, X. Yang, K. Cao, X. Tao, R. Wang, J. Tian, "An alignment-free fingerprint cryptosystem based on fuzzy vault scheme," Journal of Network and Computer Applications, Vol. 33, No. 3, pp. 207-220, 2010. https://doi.org/10.1016/j.jnca.2009.12.003
  13. Y. Wang, K. N. Plataniotis, "fuzzy vault for face based cryptographic key generation," Proceedings of Biometrics Symposium, pp. 1-6, 2007.
  14. F. Thomas, Z. Xuebing, B. Christoph, "Fuzzy Vault for 3D face recognition systems," Int. Conf. on Intelligent information hiding and multimedia signal processing, pp. 1069-1074, 2008.
  15. L. Yiun Joo, P. Kang Ryong, L. Sung Joo, B. Kwanghyuk, K. Jaihie, "A new method for generating an invariant iris private key based on the fuzzy vault system," IEEE Trans. on System, Man, Cybernetics, Vol. 38, No. 5, pp.1302-1313, 2008. https://doi.org/10.1109/TSMCB.2008.927261
  16. K. Moon, Error Correcting Code:Mathematical Methods and Algorithm, Wiley-Interscience, 2005
  17. T. Marshall, "Coding of real-number sequences for error correction: a digital signal processing problem," IEEE Journal of Selected Areas in Communication, Vol. 2, No. 2, pp. 381-392, 1984. https://doi.org/10.1109/JSAC.1984.1146063
  18. A. Kumar, A. Makur, "Improved coding-theoretic and subspace-based decoding algorithms for a wider class of DCT and DST codes", IEEE Trans. on Signal Processing, Vol. 58, No. 2, pp. 695-708, 2010. https://doi.org/10.1109/TSP.2009.2031727
  19. Dae Jong Lee, Yong-Nyuo Shin, Seon-Hong Park, Myung-Geun Chun, "RN-ECC Based Fuzzy Vault for Protecting Fingerprint Templates," International Journal of Fuzzy Logic and Intelligent Systems, vol. 11. no. 4, pp. 286-292, 2011. https://doi.org/10.5391/IJFIS.2011.11.4.286
  20. D. J. Lee, C. K. Song, S. M. Park, M. G. Chun, "Real Fuzzy Vault for Protecting Face Template," Journal of Korean Institute of Intelligent Systems, Vol. 23, No. 2, pp. 113-119, 2013. https://doi.org/10.5391/JKIIS.2013.23.2.113