TY - GEN
T1 - Orientation range for transposition according to the correlation analysis of 2DPalmHash code
AU - Leng, Lu
AU - Teoh, Andrew Beng Jin
AU - Lang, Lu
AU - Li, Ming
AU - Khan, Muhammad Khurram
PY - 2013
Y1 - 2013
N2 - Recently two-dimensional (2D) Palm Hash Code was proposed as a cancelable palm print coding scheme for secure palm print verification. However, there is vertical correlation between the vertically adjacent entries of 2DPalmHash Code. Armed with the statistical correlation analysis, an attacker can break into the palm print verification system easier than using brute-force attack. This paper analyzes the relation between the vertical correlation of 2DPalmHash Code and the corresponding vertical correlation of Gabor feature matrix. To suppress the vertical correlation of 2DPalmHash Code, both the real part and imaginary part of Gabor feature matrices, which are extracted along the orientations approaching vertical orientation, are transposed, respectively. The orientation rang suitable for transposition for vertical correlation suppression is determined by both correlation analysis and experimental results.
AB - Recently two-dimensional (2D) Palm Hash Code was proposed as a cancelable palm print coding scheme for secure palm print verification. However, there is vertical correlation between the vertically adjacent entries of 2DPalmHash Code. Armed with the statistical correlation analysis, an attacker can break into the palm print verification system easier than using brute-force attack. This paper analyzes the relation between the vertical correlation of 2DPalmHash Code and the corresponding vertical correlation of Gabor feature matrix. To suppress the vertical correlation of 2DPalmHash Code, both the real part and imaginary part of Gabor feature matrices, which are extracted along the orientations approaching vertical orientation, are transposed, respectively. The orientation rang suitable for transposition for vertical correlation suppression is determined by both correlation analysis and experimental results.
UR - http://www.scopus.com/inward/record.url?scp=84886064415&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84886064415&partnerID=8YFLogxK
U2 - 10.1109/ISBAST.2013.40
DO - 10.1109/ISBAST.2013.40
M3 - Conference contribution
AN - SCOPUS:84886064415
SN - 9780769550107
T3 - Proceedings - 2013 International Symposium on Biometrics and Security Technologies, ISBAST 2013
SP - 230
EP - 234
BT - Proceedings - 2013 International Symposium on Biometrics and Security Technologies, ISBAST 2013
T2 - 2013 International Symposium on Biometrics and Security Technologies, ISBAST 2013
Y2 - 2 July 2013 through 5 July 2013
ER -