학술논문

Protected Face Templates Generation Based on Multiple Partial Walsh Transformations and Simhash
Document Type
Periodical
Source
IEEE Transactions on Information Forensics and Security IEEE Trans.Inform.Forensic Secur. Information Forensics and Security, IEEE Transactions on. 19:4100-4113 2024
Subject
Signal Processing and Analysis
Computing and Processing
Communication, Networking and Broadcast Technologies
Biometrics (access control)
Face recognition
Security
Vectors
Privacy
Iris recognition
Fingerprint recognition
Biometric
face template protection
multiple partial Walsh transformations
Simhash
security and privacy
Language
ISSN
1556-6013
1556-6021
Abstract
With the widespread application of biometric, unprotected biometric data is still at risk of serious security and privacy breaches. When large amounts of unprotected biometric data leak, cancelable biometric become a powerfully remedial measure. In this paper, we propose a new method to generate stable and cancelable face templates based on multiple partial Walsh transformations (MPWT) and Simhash. Firstly, multiple partial Walsh matrices generated with random external parameters perform projection transformation on the original real-valued face features, ensuring the irreversibility and unlinkability of the system. Subsequently, the projected features are transformed into discrete binary codes (protected templates) using Simhash. And the random permutation seed ensures the revocability of generated protected template. Furtherly, the protected templates have small storage space and is more suitable for fast comparison but also yields improvements in recognition accuracy compared with several state-of-the-arts. Numerous experiments on CASIA-WebFace, LFW, FEI, and Color FERET databases show that the protected templates are nearly identical to the unprotected ones in the comparison performance. The scheme also meets the requirements of non-invertibility, revocability, unlinkability, as well as resistance for various types of attacks like attacks via record multiplicity, false accepts, brute force and pre-image. Therefore, the proposed methodology strikes a balance between recognition accuracy and security.