12.07.2015 Views

Cancelable Templates for Sequence-Based Biometrics with ... - ATVS

Cancelable Templates for Sequence-Based Biometrics with ... - ATVS

Cancelable Templates for Sequence-Based Biometrics with ... - ATVS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

MAIORANA et al.: CANCELABLE TEMPLATES FOR SEQUENCE-BASED BIOMETRICS 535properly employed to trans<strong>for</strong>m the original signature representations,while keeping fixed the decomposition vector d,will be estimated. As defined in Section III-B1, a scramblingmatrix C consists of F rows and W columns. The total numberof matrices which can be defined is then equal to (F !) (W −1) ,which corresponds to 14! = 87 178 291 200 when consideringF =14and W =2. However, among all the possible scramblingmatrices, only those which allow fulfilling the diversityproperty can be employed.Given two generic matrices C (1) and C (2) , let us define thedistanceΩ(C (1) , C (2))= number of different rows between C (1) and C (2) . (16)Following the approach illustrated in Section III-B1, two trans<strong>for</strong>mationsobtained by using the same decomposition vectord, while employing two distinct scrambling matrices C (1)and C (2) , produce more distinct templates as the distanceΩ(C (1) , C (2) ) increases. Considering the entire MCYT database,each user is then enrolled by using his first E =10signatures,to which the trans<strong>for</strong>mation process in Section III-B1is applied. Specifically, the trans<strong>for</strong>mations employed duringenrollment are ruled by a decomposition vector d and ascrambling key matrix C (e) . The remaining signatures of eachuser, after being trans<strong>for</strong>med using the same keys d and C (e)applied during enrollment, are employed to estimate the FRR.Moreover, the FAR related to skilled and random <strong>for</strong>geries iscomputed by trans<strong>for</strong>ming the available signature according tothe decomposition vector d and to the same scrambling matrixC (a) = C (e) employed during enrollment (Ω(C (e) , C (a) )=0). The RTMR related to the use of the mixing approach iscomputed by trans<strong>for</strong>ming the genuine signatures of each useraccording to the same decomposition key d employed duringenrollment, but <strong>with</strong> different scrambling keys C (a) , characterizedby distances Ω(C (e) , C (a) ) ∈{8, 9, 10, 11} from C (e) .The matching statistics obtained <strong>for</strong> a system <strong>with</strong> E =10and W =2are reported in Fig. 6(b). Specifically, the renewabilityproperty of the mixing approach is verified by comparingthe ROC curve where the FAR <strong>for</strong> random <strong>for</strong>geries is takeninto account <strong>with</strong> the pseudo-ROC curves where the RTMR <strong>for</strong>different distances Ω(C (e) , C (a) ) is considered. The obtainedper<strong>for</strong>mances show that the use of different scrambling matricesbetween enrollment and authentication, when keeping fixed thedecomposition keys, allows obtaining matching rates which aresimilar to those associated <strong>with</strong> the use of random <strong>for</strong>geries, butonly when Ω(C (e) , C (a) ) ≥ Ξ=11(over F =14consideredfunctions).There<strong>for</strong>e, the total number of scrambling matrices whichcan be considered still satisfying the diversity property, guaranteedby a distance Ω(C (e) , C (a) ) ≥ Ξ=11, has an upperbound that is equal to (F !/(Ξ − 1)!) = 24 024. Moreover,keeping in mind that, as explained in Section IX-A, Γ=4distinctdecomposition vectors can be defined <strong>for</strong> each scramblingmatrix C, the total number of renewable templates which canbe properly generated, following the approach in Section III-B1<strong>with</strong> W =2,is4 · 24 024 = 96 096.C. Shifting ApproachIn this section, we verify how the renewability property of thebaseline approach in Section III-A is improved when using themethod described in Section III-B2, which employs a decompositionvector d and a shifting parameter φ as trans<strong>for</strong>mationkeys. Following an approach that is similar to the one employedin Sections IX-A and B, each user available in the entire MCYTdatabase is enrolled by using his first E =10signatures, whichare then trans<strong>for</strong>med according to the trans<strong>for</strong>mation keys dand φ (e) . Then, the remaining genuine signatures of each userare trans<strong>for</strong>med using the same decomposition key d employedduring enrollment, but <strong>with</strong> a different initial shift, indicatedas φ (a) , to determine the RTMR that is used to analyze therenewability capacity of this approach. The values of the shiftsare taken in the range between 0 and 95, considering onlymultiples of five: In this way, 20 different possible values aretaken into account. Having defined a distance between theshifting parameters taken during enrollment and verification as(Φ φ (e) ,φ (a)) ∣∣= ∣φ (e) − φ (a) ∣∣ , (17)Fig. 6(c) shows the RTMR statistics obtained by considering thesame decomposition keys during enrollment and verification,at an increasing distance Φ(φ (e) ,φ (a) ) between the employedshifting parameters. A comparison <strong>with</strong> the FAR per<strong>for</strong>mancesobtained considering skilled and random <strong>for</strong>geries, trans<strong>for</strong>med<strong>with</strong> the same trans<strong>for</strong>mation keys d and φ (e) employed inenrollment, is also given. The obtained experimental resultsshow that the RTMR pseudo-ROC curves, related to the useof different shifting parameters <strong>for</strong> the enrollment and theauthentication stage, are similar to the ROC curve obtainedwhen random <strong>for</strong>geries are taken into account when the distanceΦ(φ (e) ,φ (a) ) is equal or greater than the 20% of the signaturelength N. This implies that the number of values φ whichcan be properly considered is limited to Υ=5. Applying themodification described in Section III-B2 to the baseline approachin Section III-A, we obtain an increase of the number oftemplates that can be generated by a factor of five, thus obtaininga number of Γ · Υ=4· 5=20templates. Obviously, thisnumber is still too small <strong>for</strong> a practical application. However, ifthe considered modification is applied in conjunction <strong>with</strong> themethod described in Section III-B1, it is possible to properlyproduce renewable templates <strong>with</strong> an upper limit of Γ(F !/(Ξ −1))Υ = 96 096 · 5 = 480 480 discriminable templates.In conclusion, although <strong>with</strong> the proposed approaches, it isnot possible to obtain an infinite number of discriminable templates,almost 500 000 templates can be generated from a singleoriginal signature, properly fulfilling the diversity requirement.It is also worth pointing out that, having the possibility ofmanaging almost 500 000 different templates, a user could issuea new biometric template each hour, <strong>for</strong> 60 years.X. DISCUSSION AND CONCLUSIONThe security and privacy issues probably represent the mostimportant problems that have to be tackled during the design ofa biometric-based automatic recognition system. In this paper,Authorized licensed use limited to: Univ Autonoma de Madrid. Downloaded on May 06,2010 at 15:31:46 UTC from IEEE Xplore. Restrictions apply.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!