Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2016, Article ID 6390741, 9 pages
http://dx.doi.org/10.1155/2016/6390741
Research Article

Improving Robustness of Biometric Identity Determination with Digital Watermarking

Physiological Signal Analysis Team, Center for Machine Vision and Signal Analysis, University of Oulu, Oulu, Finland

Received 17 June 2016; Revised 7 September 2016; Accepted 5 October 2016

Academic Editor: Isao Echizen

Copyright © 2016 Juha Partala et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology—EUROCRYPT 2005, R. Cramer, Ed., vol. 3494 of Lecture Notes in Computer Science, pp. 457–473, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar
  2. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology—Proceedings of CRYPTO 84, G. R. Blakley and D. Chaum, Eds., vol. 196 of Lecture Notes in Computer Science, pp. 47–53, Springer, Berlin, Germany, 1985. View at Publisher · View at Google Scholar
  3. A. K. Jain, K. Nandakumar, and A. Ross, “50 years of biometric research: accomplishments, challenges, and opportunities,” Pattern Recognition Letters, vol. 79, pp. 80–105, 2016. View at Publisher · View at Google Scholar
  4. Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy extractors: how to generate strong keys from biometrics and other noisy data,” in Advances in Cryptology—EUROCRYPT 2004, C. Cachin and J. L. Camenisch, Eds., vol. 3027 of Lecture Notes in Computer Science, pp. 523–540, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  5. M. Turk and A. Pentland, “Eigenfaces for recognition,” Journal of Cognitive Neuroscience, vol. 3, no. 1, pp. 71–86, 1991. View at Google Scholar · View at Scopus
  6. P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, “Eigenfaces vs. fisherfaces: recognition using class specific linear projection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 711–720, 1997. View at Publisher · View at Google Scholar · View at Scopus
  7. T. Ahonen, A. Hadid, and M. Pietikäinen, “Face description with local binary patterns: application to face recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 2037–2041, 2006. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Taigman, M. Yang, M. Ranzato, and L. Wolf, “DeepFace: closing the gap to human-level performance in face verification,” in Proceedings of the 27th IEEE Conference on Computer Vision and Pattern Recognition (CVPR '14), pp. 1701–1708, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. N. Zhang, M. Paluri, Y. Taigman, R. Fergus, and L. Bourdev, “Beyond frontal faces: improving person recognition using multiple cues,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR '15), pp. 4804–4813, IEEE, Boston, Mass, USA, June 2015. View at Publisher · View at Google Scholar
  10. J. Dong and T. Tan, “Effects of watermarking on iris recognition performance,” in Proceedings of the 10th International Conference on Control, Automation, Robotics and Vision (ICARCV '08), pp. 1156–1161, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Hämmerle-Uhl, K. Raab, and A. Uhl, “Watermarking as a means to enhance biometric systems: a critical survey,” in Information Hiding, pp. 238–254, Springer, 2011. View at Google Scholar
  12. A. K. Jain and U. Uludag, “Hiding biometric data,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 11, pp. 1494–1498, 2003. View at Publisher · View at Google Scholar · View at Scopus
  13. M. K. Dutta, P. Gupta, and V. K. Pathak, “Biometric based unique key generation for authentic audio watermarking,” in Pattern Recognition and Machine Intelligence, vol. 5909 of Lecture Notes in Computer Science, pp. 458–463, Springer, Berlin, Germany, 2009. View at Google Scholar
  14. N. P. Sheppard, R. Safavi-Naini, and P. Ogunbona, “On multiple watermarking,” in Proceedings of the Workshop on Multimedia and Security: New Challenges, pp. 3–6, ACM, October 2001. View at Scopus
  15. M. Pietikäinen and G. Zhao, “Two decades of local binary patterns: a survey,” in Advances in Independent Component Analysis and Learning Machines, E. Bingham, S. Kaski, J. Laaksonen, and J. Lampinen, Eds., pp. 175–210, Elsevier, New York, NY, USA, 2015. View at Google Scholar
  16. X. Zhu and D. Ramanan, “Face detection, pose estimation, and landmark localization in the wild,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR '12), pp. 2879–2886, Providence, RI, USA, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. X. Tan and B. Triggs, “Enhanced local texture feature sets for face recognition under difficult lighting conditions,” IEEE Transactions on Image Processing, vol. 19, no. 6, pp. 1635–1650, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. O. Jesorsky, K. J. Kirchberg, and R. W. Frischholz, “Robust face detection using the hausdorff distance,” in Proceedings of the International Conference on Audio-and Video-Based Biometric Person Authentication (AVBPA '01), pp. 90–95, Springer, Halmstad, Sweden, 2001.
  19. H. W. Ng and S. Winkler, “A data-driven approach to cleaning large face datasets,” in Proceedings of the IEEE International Conference on Image Processing (ICIP '14), pp. 343–347, 2014.
  20. A. Keskinarkaus, A. Pramila, and T. Seppänen, “Image watermarking with feature point based synchronization robust to print-scan attack,” Journal of Visual Communication and Image Representation, vol. 23, no. 3, pp. 507–515, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. J. Chen, V. Kellokumpu, G. Zhao, and M. Pietikäinen, “Rlbp: robust local binary pattern,” in Proceedings of the British Machine Vision Conference (BMVC '13), pp. 1–10, Bristol, UK, 2013.
  22. G. Kylberg and I.-M. Sintorn, “Evaluation of noise robustness for local binary pattern descriptors in texture classification,” EURASIP Journal on Image and Video Processing, vol. 2013, article 17, 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. Y. Dodis and Y. Yu, “Overcoming weak expectations,” in Theory of Cryptography, A. Sahai, Ed., vol. 7785 of Lecture Notes in Computer Science, pp. 1–22, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  24. G. Cohen, R. Raz, and G. Segev, “Nonmalleable extractors with short seeds and applications to privacy amplification,” SIAM Journal on Computing, vol. 43, no. 2, pp. 450–476, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  25. X. Li, “Non-malleable condensers for arbitrary min-entropy, and almost optimal protocols for privacy amplification,” in Theory of Cryptography, vol. 9014 of Lecture Notes in Computer Science, pp. 502–531, Springer, 2015. View at Publisher · View at Google Scholar · View at MathSciNet