skip to main content
10.1145/1411328.1411361acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Multimodal authentication based on random projections and source coding

Published: 22 September 2008 Publication History

Abstract

In this paper, we consider an authentication framework for independent modalities based on binary hypothesis testing using source coding jointly with the random projections. The source coding ensures the multimodal signals reconstruction at the decoder based on the authentication data. The random projections are used to cope with the security, privacy, robustness and complexity issues. Finally, the authentication performance is investigated for both direct and random projections domains. The asymptotic performance approximation is derived and compared with the exact solutions. The impact of modality fusion on the authentication system performance is demonstrated.

References

[1]
A. K. Jain, A. Ross, and S. Pankanti, "Biometrics: A tool for information security," IEEE Trans. on Information Forensics and Security, vol. 1, no. 2, pp. 125--143, June 2006.
[2]
L. Hong, A. Jain, and S. Pankanti, "Can multibiometrics improve performance," Summit, NJ, pp. 59--64, Oct 1999.
[3]
B. Ulery, W. Fellner, A. H. P. Hallinan and, and C. Watson, "Evaluation of selected biometric fusion techniques," NIST report 7346, 2006, Tech. Rep.
[4]
R. Brunelli and D. Falavigna, "Person identification using multiple cues," IEEE Trans. Pattern Anal. Mach. Intell., vol. 17, no. 10, pp. 955--966, 1995.
[5]
T. Cover and J. Thomas, Elements of Information Theory. Wiley and Sons, New York, 1991.
[6]
A. Ross, R. G. Hong, A. K. Jain, and S. Pankanti, Feature level fusion using hand and face biometrics, in SPIE Conf. Biometric Technology for Human Identification II, 2005, pp. 196--204.
[7]
N. Ratha, J. Connell, and R. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Systems Journal, vol. 40, no. 3, pp. 614--634, 2001.
[8]
U. Maurer, "A unified and generalized treatment of authentication theory," in Proc. 13th Symp. on Theoretical Aspects of Computer Science (STACS'96), ser. Lecture Notes in Computer Science, vol. 1046. Springer-Verlag, Feb 1996, pp. 387--398.
[9]
O. Zeitouni, J. Ziv, and N. Merhav, "When is the generalized likelihood ratio test optimal?" IEEE Trans Information Theory, vol. 38, no. 5, pp. 1597--1602, 1992.
[10]
J. Fridrich, "Robust bit extraction from images," in Proceedings ICMCS'99, vol. 2, Florence, Italy, June 1999, pp. 536--540.
[11]
S. S. Kozat, R. Venkatesan, and M. K. Mihcak, Robust hashing via matrix invariances," in ICIP 2004, vol. 3, Singapore, October 2004, pp. 677--680.
[12]
P. Tuyls, B. Skoric, and T. K. (Eds.), Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer, 2007.
[13]
D. Slepian and J. Wolf, "Noiseless encoding of correlated information sources," IEEE Trans. Information Theory, vol. 19, pp. 471--480, July 1973.
[14]
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733--742, 1993.
[15]
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography - Part I: secret sharing," IEEE Trans. Inform. Theory, vol. 39, no. 4, pp. 1121--1132, 1993.
[16]
A. Wyner and J. Ziv, "The rate-distortion function for source coding with side information at the decoder, IEEE Trans. Information Theory, vol. 22, no. 1, pp. 1--10, January 1976.
[17]
T. Ignatenko and F. Willems, "On the security of xor-method in biometric authentication systems," in The twenty-seventh symposium on Information Theory in the Benelux, Noordwijk, The Netherlands, June 8-9 2006, pp. 197--204.
[18]
E. Martinian, S. Yekhanin, and J. Yedidia, "Secure biometrics via syndromes," in 43rd Annual Allerton Conference on Communications, Control, and Computing, Monticello, IL, USA, October 2005.
[19]
Y.-C. Lin, D. Varodayan, and B. Girod, "Image authentication based on distributed source coding," in IEEE International Conference on Image Processing (ICIP2007), San Antonio, USA, September 2007.
[20]
H. L. V. Trees, Detection, Estimation, and Modulation Theory. New York: John Wiley and Sons, 1968.
[21]
W. B. Johnson and J. Lindenstrauss, "Extensions of Lipschitz mappings into Hilbert space," Contemporary Mathematics, no. 26, pp. 189--206, 1984.

Cited By

View all
  • (2017)Spatially-organized random projections of images for dimensionality reduction and privacy-preserving classification2017 10th International Workshop on Multidimensional (nD) Systems (nDS)10.1109/NDS.2017.8070627(1-5)Online publication date: Sep-2017
  • (2009)Fast identification algorithms for forensic applications2009 First IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS.2009.5386480(76-80)Online publication date: Dec-2009

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and security
September 2008
242 pages
ISBN:9781605580586
DOI:10.1145/1411328
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 September 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. dimensionality reduction
  2. fusion
  3. hypothesis testing
  4. multimodal authentication
  5. random projections

Qualifiers

  • Research-article

Conference

MM&Sec '08
Sponsor:
MM&Sec '08: Multimedia and Security Workshop
September 22 - 23, 2008
Oxford, United Kingdom

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Spatially-organized random projections of images for dimensionality reduction and privacy-preserving classification2017 10th International Workshop on Multidimensional (nD) Systems (nDS)10.1109/NDS.2017.8070627(1-5)Online publication date: Sep-2017
  • (2009)Fast identification algorithms for forensic applications2009 First IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS.2009.5386480(76-80)Online publication date: Dec-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media