Skip to main content
Log in

Simplified 2DPalmHash code for secure palmprint verification

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

2DPalmHash Code (2DPHC) was proposed as a cancelable code for secure palmprint verification. In order to relieve the vertical and horizontal dislocation problems, palmprint codes, including 2DPHC, need to be shifted both in horizontal and vertical directions and matched repeatedly, which leads to high computational complexity. However, according to our analysis, horizontal-shift matching can be ignored. Therefore, the multiple-shift matching of 2DPHC can be greatly simplified. Simplified 2DPHC (S2DPHC) has three-fold advantages: (1) reduces matching complexity; (2) enhances changeability performance; (3) improves verification performance. Furthermore, the superiorities of S2DPHC over 2DPHC in terms of changeability and verification performances are validated via rigorously analysis and extensive experimentation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Achlioptas D (2003) Database-friendly random projections: Johnson-Lindenstrauss with binary coins. J Comput Syst Sci 66(4):671–687

    Article  MathSciNet  MATH  Google Scholar 

  2. Baraniuk RG, Davenport M, DeVore R, Wakin M (2008) A simple proof of the restricted isometry property for random matrices. Constr Approx 28(3):253–263

    Article  MathSciNet  MATH  Google Scholar 

  3. Cheung KH, Kong A, You J, Zhang D (2005) An analysis on invertibility of cancelable biometrics based on BioHashing. in: Proceedings of the International Conference on Imaging Science, Systems, and Technology, 40–45

  4. Cheung KH, Kong A, Zhang D, Kamel M, You J, Lam HW (2005) An analysis on accuracy of cancelable biometrics based on BioHashing knowledge-based intelligent information and engineering systems. Lect Notes In Comput Scie 3683:1168–1172

    Article  Google Scholar 

  5. Connie T, Teoh ABJ, Goh M, Ngo D (2005) PalmHashing: a novel approach for cancelable biometrics. Inf Process Lett 93(1):1–5

    Article  MathSciNet  Google Scholar 

  6. Cui JR, Wen JJ, Fan ZZ (2015) Appearance-based bidirectional representation for palmprint recognition. Multimed Tools Appl 74(24):10989–11001

  7. Guo ZH, Zhang D, Zhang L, Zuo WM (2009) Palmprint verification using binary orientation co-occurrence vector. Pattern Recogn Lett 30(13):1219–1227

    Article  Google Scholar 

  8. Hammami M, Jemaa SB, Ben-Abdallah H (2014) Selection of discriminative sub-regions for palmprint recognition. Multimed Tools App 68(3):1023–1050

    Article  Google Scholar 

  9. Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Ad Sign Proc Special Issue Biomet 2008:1–20

    Article  Google Scholar 

  10. Jia W, Huang DS, Zhang D (2007) Palmprint verification based on robust line orientation code. Pattern Recogn 41(5):1504–1513

    Article  MATH  Google Scholar 

  11. Johnson W, Linderstrauss J (1984) Extensions of Lipshitz mapping into Hilbert space. Contemp Math 26:189–206

    Article  Google Scholar 

  12. Kong A, Cheung KH, Zhang D, Kamel M (2006) An analysis of BioHashing and its variants. Pattern Recogn 39(7):1359–1368

    Article  MATH  Google Scholar 

  13. Kong AWK, Zhang D (2004) Feature-level fusion for effective palmprint authentication. in: Proceedings of the 1st International Conference on Biometric Authentication, 761–767

  14. Kong AWK, Zhang D (2004) Competitive coding scheme for palmprint verification. in: Proceedings of the 17th International Conference on Pattern Recognition, 520–523

  15. Kong A, Zhang D, Kamel M (2008) Three measures for secure palmprint identification. Pattern Recogn 41(4):1329–1337

    Article  Google Scholar 

  16. Leng L, Li M, Teoh ABJ (2013) Conjugate 2DPalmHash Code for secure palm-print-vein verification. in: Proceedings of the 6th International Congress on Image and Signal Processing, 1694–1699

  17. Leng L, Teoh ABJ, Li M, Khan MK (2014) A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion. Secur Commun Net 7(11):1860–1871

    Article  Google Scholar 

  18. Leng L, Zhang JS (2013) PalmHash code vs palmphasor code. Neurocomputing 108:1–12

    Article  Google Scholar 

  19. Leng L, Zhang JS, Chen G, Khan MK, Bai P (2011) Two dimensional PalmPhasor enhanced by multi-orientation score level fusion. in: Proceedings of the 8th FTRA International Conference on Secure and Trust Computing, Data Management, and Applications, 122–129

  20. Leng L, Zhang JS, Khan MK, Chen X, Ji M, Alghathbar K (2011) Cancelable PalmCode generated from randomized Gabor filters for palmprint template protection. Sci Res Essays 6(4):784–792

    Google Scholar 

  21. Li HJ, Zhang JS, Wang LH (2014) Robust palmprint identification based on directional representations and compressed sensing. Multimed Tools and Appl 70(30):2331–2345

    Article  Google Scholar 

  22. Li HJ, Zhang JS, Zhang ZT (2010) Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes. Inf Sci 180(20):3876–3893

    Article  Google Scholar 

  23. Meraoumia A, Chitroub S, Bouridane A (2015) Do multispectral palmprint images be reliable for person identification? Multimed Tools Appl 74(3):955–978

    Article  Google Scholar 

  24. Ratha N, Connell J, Bolle R (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634

    Article  Google Scholar 

  25. Sun ZN, Tan TN, Wang YH, Li SZ (2005) Ordinal palmprint representation for personal identification. in: Proceedings of the IEEE International Conference on Computer Vision Pattern Recognition, 279–284

  26. Tamrakar D, Khanna P (2015) Noise and rotation invariant RDF descriptor for palmprint identification. Multimed Tools App. doi:10.1007/s11042-015-2541-5

    Google Scholar 

  27. Teoh ABJ, Connie T, Ngo D, Ling C (2006) Remarks on BioHash and its mathematical foundation. Inf Process Lett 100(4):145–150

    Article  MathSciNet  MATH  Google Scholar 

  28. Teoh ABJ, Goh A, Ngo DCL (2006) Random multispace quantization as an analytic mechanism for Biohashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28(12):1892–1901

    Article  Google Scholar 

  29. Teoh ABJ, Lim MH (2010) Cancelable biometrics. Scholarpedia 5(1):9201–9201

    Article  Google Scholar 

  30. Teoh ABJ, Ngo DCL (2005) Cancellable biometrics featuring with tokenised random number. Pattern Recogn Lett 26(10):1454–1460

    Article  Google Scholar 

  31. Teoh ABJ, Ngo DCL, Goh A (2004) BioHashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(1):2245–2255

    Google Scholar 

  32. Teoh ABJ, Yuang CT (2007) Cancelable biometrics realization with multispace random projections. IEEE Trans Syst Man Cybern B Cybern 37(5):1096–1106

    Article  Google Scholar 

  33. Wang YJ, Hatzinakos D (2011) On random transformations for changeable face verification. IEEE Trans Syst Man Cybern B Cybern 41(3):840–854

    Article  Google Scholar 

  34. Wang YJ, Plataniotis KN (2010) An analysis of random projection for changeable and privacy-preserving biometric verification. IEEE Trans Syst Man Cybern B Cybern 40(5):1280–1293

    Article  Google Scholar 

  35. Zhang D, Kong AWK, You J, Wong M (2003) Online palmprint identification. IEEE Trans Pattern Anal Mach Intell 25(9):1041–1050

    Article  Google Scholar 

  36. Zhang L, Li HY, Niu JY (2012) Fragile bits in palmprint recognition. IEEE Sign Proc Lett 19(10):663–666

    Article  Google Scholar 

  37. Zhang D, Zuo WM, Yue F (2012) A comparative study of palmprint recognition algorithm. ACM Comput Surv 44(1):1–36

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to thank Biometric Research Center at Hong Kong Polytechnic University for providing us with the palmprint database. This work was supported by Basic Science Research Program through the National Research Foundation (NRF) of Korea funded by Ministry of Science, ICT and Future Planning (2013006574), National Natural Science Foundation of China (61305010, 61262019), Institute of BioMed-IT, Energy-IT and Smart-IT Technology (BEST), a Brain Korea 21 Plus Program, Yonsei University (2014-11-0007), Science and Technology Project of Education Department of Jiangxi Province(GJJ150715), Voyage Project of Jiangxi Province (201450), and Open Foundation of Key Laboratory of Jiangxi Province for Image Processing and Pattern Recognition (TX201604002).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrew Beng Jin Teoh.

Appendix

Appendix

1.1 Proof of property 1

Since Z = XY,

Then \( {f}_Z(z)={\displaystyle {\int}_{-\infty}^{\infty}\frac{1}{\left|x\right|}}{f}_{X,Y}\left(x,\frac{z}{x}\right)dx={\displaystyle {\int}_{-\infty}^{\infty}\frac{1}{\left|x\right|}}{f}_X(x){f}_Y\left(\frac{z}{x}\right)dx \),\( {f}_Z\left(-z\right)={\displaystyle {\int}_{-\infty}^{\infty}\frac{1}{\left|x\right|}}{f}_X(x){f}_Y\left(\frac{-z}{x}\right)dx={\displaystyle {\int}_{-\infty}^{\infty}\frac{1}{\left|x\right|}}{f}_X(x){f}_Y\left(\frac{z}{x}\right)dx, \)Therefore, f Z (z) = f Z (−z). ■

1.2 Proof of property 2

Since Z = X + Y,then f Z (z) = ∫ − ∞ f X (z − y)f X (y)dy, f Z (−z) = ∫ − ∞ f X (−z − y)f X (y)dy. \( \begin{array}{l}{f}_Z(z)-{f}_Z\left(-z\right)\\ {}={\displaystyle {\int}_{-\infty}^{\infty }{f}_X\left(z-y\right)}{f}_Y(y) dy-{\displaystyle {\int}_{-\infty}^{\infty }{f}_X\left(-z-y\right)}{f}_Y(y) dy\\ {}={\displaystyle {\int}_{-\infty}^{\infty}\left[{f}_X\left(z-y\right)-{f}_X\left(-z-y\right)\right]}{f}_Y(y) dy\end{array} \), then g Y (y) = f X (z − y) − f X (−z − y) = f X (z − y) − f X (z + y), g Y (−y) = f X (z + y) − f X (−z + y) = f X (z + y) − f X (z − y).

Since g Y (y) = −g Y (−y), then g Y (y) is an odd function with respect of y.

Since f Y (y) is an even function with respect of y, so g Y (y)f Y (y) = [f X (zy)–f X (−zy)]f Y (y) is an odd function with respect of y, then f Z (z) − f Z (−z) = ∫ − ∞ [f X (z − y) − f X (−z − y)]f Y (y)dy = 0.Therefore, f Z (z) = f Z (−z). ■

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Leng, L., Teoh, A.B.J. & Li, M. Simplified 2DPalmHash code for secure palmprint verification. Multimed Tools Appl 76, 8373–8398 (2017). https://doi.org/10.1007/s11042-016-3458-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3458-3

Keywords

Navigation