Title
PalmHash Code vs. PalmPhasor Code
Abstract
The existing palmprint protection schemes without verification degrading do not strictly meet non-invertible requirement; while non-invertible palmprint protection schemes do not meet verification performance requirement in stolen-token scenario. PalmHash Code and PalmPhasor Code, as two cancelable palmprint coding schemes, are proposed in this paper to balance the conflict between security and verification performance. In order to reduce computational complexity and storage cost, cancelable palmprint coding frameworks are extended from one dimension to two dimensions. Besides, two measures, perpendicular orientation transposition and multi-orientation score level fusion, are employed to further improve the performance of two dimensional (2D) cancelable palmprint codes. PalmHash Code and PalmPhasor Code are compared extensively in this paper. The experimental results and analysis confirm that 2D PalmHash Code and 2D PalmPhasor Code enhanced by the two measures are effective and secure even in stolen-token scenario.
Year
DOI
Venue
2013
10.1016/j.neucom.2012.08.028
Neurocomputing
Keywords
Field
DocType
existing palmprint protection scheme,verification performance requirement,verification performance,non-invertible palmprint protection scheme,stolen-token scenario,cancelable palmprint,cancelable palmprint code,non-invertible requirement,palmhash code,palmphasor code
Performance requirement,Coding (social sciences),Theoretical computer science,Mathematics,Computational complexity theory
Journal
Volume
ISSN
Citations 
108,
0925-2312
28
PageRank 
References 
Authors
0.84
40
2
Name
Order
Citations
PageRank
Lu Leng12009.83
Jiashu Zhang2112275.03