skip to main content
10.1145/1411328.1411359acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Privacy-preserving multimodal person and object identification

Published: 22 September 2008 Publication History

Abstract

In this paper we investigate multimodal biometric person and object identification. We model this process of multimodal identification as multimodal multiple hypothesis testing with independent modalities. We analyze theoretical performance limits that can be attained in such a multimodal protocol in terms of exponents of average error probability. Furthermore, we address a privacy related issues in this paper. In particular, we consider performance/privacy trade-off due to the indirect multimodal identification performed in a secret subspace and approximate the obtained performance limits using properties of random projections. Finally, a set of experiments exemplifies our findings.

References

[1]
A. K. Jain, A. Ross, and S. Pankanti, "Biometrics: A tool for information security," IEEE Trans. on Information Forensics and Security, vol. 1, no. 2, pp. 125--143, June 2006.
[2]
M. Golfarelli, D. Maio, and D. Maltoni, "On the error-reject tradeoff in biometric verification systems, IEEE Trans. on attern Analysis Machine Intelligence, vol. 19, no. 7, pp. 786--796, July 1997.
[3]
A. K. Jain and D. Maltoni, Handbook of Fingerprint Recognition. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2003.
[4]
A. K. Jain, S. C. Dass, and K. Nandakumar, "Can soft biometric traits assist user recognition?" in First international conference on Biometric Authentication, 2004, pp. 561--572.
[5]
L. Hong, A. K. Jain, and S. Pankanti, "Can multibiometrics improve performance?" Department of Computer Science, Michigan State University, East Lansing, Michigan, Tech. Rep. MSU-CSE-99-39, December 1999.
[6]
L. Hong and A. K. Jain, "Integrating faces and fingerprints for personal identification," in ACCV '98: Proceedings of the Third Asian Conference on Computer Vision-Volume I. London, UK: Springer-Verlag, 1997, pp. 16--23.
[7]
A. A. Ross, K. Nandakumar, and A. K. Jain, Handbook of Multibiometrics (International Series on Biometrics). Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2006.
[8]
T. Cover and J. Thomas, Elements of Information Theory. Wiley and Sons, New York, 1991.
[9]
A. Ross, R. G. Hong, A. K. Jain, and S. Pankanti, Feature level fusion using hand and face biometrics, in SPIE Conf. Biometric Technology for Human Identification II, 2005, pp. 196--204.
[10]
O. Koval, S. Voloshynovskiy, and T. Pun, "Error exponent analysis of person identification based on fusion of independent modalities," in Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, January 2007.
[11]
B. Ulery, W. Fellner, A. H. P. Hallinan and, C. Watson, "Evaluation of selected biometric fusion techniques," Tech. Rep., http://www.itl.nist.gov/iad/894.03/pact/ir7346 C.pdf.
[12]
R. Brunelli and D. Falavigna, "Person identification using multiple cues," IEEE Trans. Pattern Anal. Mach. Intell., vol. 17, no. 10, pp. 955--966, 1995.
[13]
E. S. Bigun, J. Bigun, B. Duc, and S. Fischer, "Expert conciliation for multi modal person authentication systems by bayesian statistics," in AVBPA '97: Proceedings of the First International Conference on Audio- and Video-Based Biometric Person Authentication. London, UK: Springer-Verlag, 1997, pp. 291--300.
[14]
O. Ushmaev and S. Novikov, "Biometric fusion: Robust approach," in Workshop on Multimodal User Authent. (MMUA 2006), Toulouse, France, 2006.
[15]
E. Martinian, S. Yekhanin, and J. Yedidia, "Secure biometrics via syndromes," in 43rd Annual Allerton Conference on Communications, Control, and Computing, Monticello, IL, USA, October 2005.
[16]
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733--742, 1993.
[17]
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography -- part i: secret sharing," IEEE Trans. Inform. Theory, vol. 39, no. 4, pp. 1121--1132, 1993.
[18]
D. Slepian and J. Wolf, "Noiseless encoding of correlated information sourcea," IEEE Trans. Information Theory, vol. 19, pp. 471--480, July 1973.
[19]
O. Koval, S. Voloshynovskiy, and T. Pun, Privacy-preserving biometric person identification," in EUSIPCO'08, Lausanne, Switzerland, August 2008.
[20]
P. Tuyls, B. Skoric, and T. K. (Eds.), Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer, 2007.
[21]
O. Koval, S. Voloshinovskiy, and T. Pun, Privacy-preserving biometric person identification, Proc. 2008 European Signal Processing Conference (EUSIPCO-2008), Augusst 2008, Lausanne, Switzerland.
[22]
U. Uludag, "Secure Biometric Systems," Ph.D. Thesis, Michigan State University, 2006.
[23]
M. R. Freire, J. Fierrez, J. Galbally, andJ. Ortega-Garcia, "Biometric hashing based on genetic selection and its application to on-line signatures",Proc. IAPR International Conference on Biometrics, ICB, August,2007.
[24]
A. Ross, "Information fusion in fingerprint authentication," Ph.D. dissertation, Michigan State University, Michigan, USA, 2003.
[25]
O. Koval, S. Voloshynovskiy, and T. Pun, "Analysis of multimodal binary detection systems based on dependent/independent modalities," in IEEE Int Workshop on Multimedia Sign. Proc. (MMSP'07), Chania, Crete, Greece, October 2007.
[26]
H. van Trees, Detection, Estimation, and Modulation Theory, Part I. New York, Wiley, 1968.
[27]
C.C. Leang and D.H.Johnson, "On the asymptotics of m-hypothesis bayesian detection," IEEE Trans. on Information Theory, vol. 43, no. 1, pp. 280--282, January 1997.
[28]
W. B. Johnson and J. Lindenstrauss, "Extensions of lipschitz mapping into hilbert space," Contemporary Mathematics, no. 26, pp. 189--206, 1984.
[29]
N. Al-Dhahir and J. M. Cioffi, "Optimum finite-length equalization for multicarrier transceivers," IEEE Trans. on Inf. Com., vol. 44, no. 1, pp. 56--63, Jan. 1998.

Cited By

View all
  • (2022)Quantized random projections of SIFT features for cancelable fingerprintsMultimedia Tools and Applications10.1007/s11042-022-13646-w82:5(7917-7937)Online publication date: 15-Aug-2022
  • (2009)Improving performance and security of biometrics using efficient and stable random projection techniques2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis10.1109/ISPA.2009.5297690(556-561)Online publication date: Sep-2009

Index Terms

  1. Privacy-preserving multimodal person and object identification

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and security
    September 2008
    242 pages
    ISBN:9781605580586
    DOI:10.1145/1411328
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 September 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. dimensionality reduction
    2. hypothesis testing
    3. multimodal signal processing
    4. object identification
    5. privacy
    6. random projections

    Qualifiers

    • Research-article

    Conference

    MM&Sec '08
    Sponsor:
    MM&Sec '08: Multimedia and Security Workshop
    September 22 - 23, 2008
    Oxford, United Kingdom

    Acceptance Rates

    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Quantized random projections of SIFT features for cancelable fingerprintsMultimedia Tools and Applications10.1007/s11042-022-13646-w82:5(7917-7937)Online publication date: 15-Aug-2022
    • (2009)Improving performance and security of biometrics using efficient and stable random projection techniques2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis10.1109/ISPA.2009.5297690(556-561)Online publication date: Sep-2009

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media