12.07.2015 Views

Cancelable Templates for Sequence-Based Biometrics with ... - ATVS

Cancelable Templates for Sequence-Based Biometrics with ... - ATVS

Cancelable Templates for Sequence-Based Biometrics with ... - ATVS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

530 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART A: SYSTEMS AND HUMANS, VOL. 40, NO. 3, MAY 2010The following relations can then be derived <strong>for</strong> the consideredfinite sequences:⎧⎨⎩ˆr (1)1,Kˆr (1)2,K[n] =ˆr(2)[n − b (1)11,K][n]+Δ[n] [=ˆr (2)2,Kn − b (2)1]− Δ[n],(10)where all the considered shifts are circular shifts. Then, applyingthe DFT to the aprioriknown sequences f (1) [n] andf (2) [n] and considering the relations between the DFT and thelinear convolution of two discrete sequences, it results to (11),shown at the bottom of the page, where the DFT coefficientsare indexed <strong>with</strong> l. Using the relations in (10), the first equationin (11) can be written as{ } [DFT f (1) [n] ={ } ]DFT ˆr (2)1,K [n] + DFT {Δ[n]}[ { [· DFT ˆr (2)2,Kn − b (2)1]}− DFT {Δ[n]}· e j2π(l/K)b(1) 1 , (12)from which the expressions in (13), shown at the bottom of thepage, can be derived.The resulting system of equations admits ∞ 1 possible solutions,which implies that recovering the original segments[n] and ˆr(2)2,K[n] is as much hard as random guessing them.The difficulty in reaching a solution <strong>for</strong> the original sequenceobserved in our <strong>for</strong>mulation corroborates the difficulty in succeedingin a record multiplicity attack.ˆr (2)1,KV. S IGNATURE BIOMETRICSA. Signature-<strong>Based</strong> AuthenticationPeople recognition based on signatures is one of the mostaccepted biometric-based authentication methods since, beingpart of everyday life, it is perceived as a noninvasive and nonthreateningprocess by the majority of the users. Furthermore, asignature has a high legal value. On the other hand, this modalityis characterized by a high intrauser variability, due to thefact that signatures can be influenced by several physical andemotional conditions, and a small <strong>for</strong>gery inter-user variability,which must be taken into account in the authentication process.A review of the state of the art covering the literature up to 1993]can be found in [42]. Other survey papers quoting the morerecent advances in signature recognition are [43] and [44].Signature-based authentication can be either static or dynamic.Inthestatic mode, also referred to as off-line, onlythe written image of the signature, typically acquired through acamera or an optical scanner, is used. In the dynamic mode, alsocalled on-line, signatures are acquired by means of a graphictablet or a pen-sensitive computer display, which can providetemporal in<strong>for</strong>mation about the signature, such as the pressure,the velocity, the pen tilt signals versus time, etc.In order to represent the signature, some features must beextracted. Two different kinds of features are typically considered:parameters and functions. Parametric features can consistof static in<strong>for</strong>mation, like the height and the width of thesignatures, or dynamic in<strong>for</strong>mation, like signature velocity,acceleration, or pressure. In most comparative studies, theparameters based on dynamic in<strong>for</strong>mation are typically morediscriminative <strong>for</strong> recognition purposes than those based onstatic in<strong>for</strong>mation [45]. On the other hand, sequence-basedmethods typically use a representation based on various temporalsequences and elastic matching procedures such as DTW,which represents one of the more flexible approaches to managethe signature length variability [46], or statistical recognitionapproaches such as HMMs [5], [47].B. Signature Template Protection: Related WorksSignature template protection has been first considered in [9]and [48] <strong>with</strong> a key generation approach which extracts a setof parametric features from the acquired dynamic signaturesand applies a hash function to a feature’s binary representation,obtained by exploiting some statistical properties of theenrollment signatures. Both methods provide protection <strong>for</strong> thesignature templates, but none of them provides revocability.The fuzzy vault construction has been applied to signature verificationin [49], by using a quantized set of maxima and minimaof the temporal functions mixed <strong>with</strong> chaff points in order toprovide security. A salting approach has been proposed in [50]as an adaptation of the BioHashing method [28] to signaturetemplates. The fuzzy commitment approach introduced in [22]has also been applied to signature verification in [51] and [52].In both papers, a practical implementation of fuzzy commitment[25] has been taken into account, and a new user-adaptive⎧⎨ DFT { f (1) [n] } { }= DFT ˆr (1)1,K [n]⎩ DFT { f (2) [n] } = DFT{· DFT{ˆr (2)1,K [n] }· DFT{ } { [ˆr (1)1,K [n] · DFT ˆr (1)2,K]}· e j2π(l/K)b(1) 1}ˆr (1)2,K [n] = DFTn − b (1)1{ }ˆr (2)2,K [n] (11)⎧⎪⎨⎪⎩DFT { f (1) [n] } [ { } {= e j2π(l/K)b(1) 1 · DFT ˆr (2)1,K [n] · DFT+ DFT {Δ[n]}·DFTDFT { f (2) [n] } { } { }= DFT ˆr (2)1,K [n] · DFT ˆr (2)2,K [n]}ˆr (2)2,K [n] · e −j2π(l/K)b(2) 1 − DFT {Δ[n]}·DFT{ }]ˆr (2)2,K [n] · e −j2π(l/K)b(2) 1 − DFT 2 {Δ[n]}{ˆr (2)1,K [n] }(13)Authorized licensed use limited to: Univ Autonoma de Madrid. Downloaded on May 06,2010 at 15:31:46 UTC from IEEE Xplore. Restrictions apply.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!