Abstract | ||
---|---|---|
The existing palmprint protection schemes without verification degrading do not strictly meet non-invertible requirement; while non-invertible palmprint protection schemes do not meet verification performance requirement in stolen-token scenario. PalmHash Code and PalmPhasor Code, as two cancelable palmprint coding schemes, are proposed in this paper to balance the conflict between security and verification performance. In order to reduce computational complexity and storage cost, cancelable palmprint coding frameworks are extended from one dimension to two dimensions. Besides, two measures, perpendicular orientation transposition and multi-orientation score level fusion, are employed to further improve the performance of two dimensional (2D) cancelable palmprint codes. PalmHash Code and PalmPhasor Code are compared extensively in this paper. The experimental results and analysis confirm that 2D PalmHash Code and 2D PalmPhasor Code enhanced by the two measures are effective and secure even in stolen-token scenario. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1016/j.neucom.2012.08.028 | Neurocomputing |
Keywords | Field | DocType |
existing palmprint protection scheme,verification performance requirement,verification performance,non-invertible palmprint protection scheme,stolen-token scenario,cancelable palmprint,cancelable palmprint code,non-invertible requirement,palmhash code,palmphasor code | Performance requirement,Coding (social sciences),Theoretical computer science,Mathematics,Computational complexity theory | Journal |
Volume | ISSN | Citations |
108, | 0925-2312 | 28 |
PageRank | References | Authors |
0.84 | 40 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lu Leng | 1 | 200 | 9.83 |
Jiashu Zhang | 2 | 1122 | 75.03 |