Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and <inline-formula><graphic file="1687-6180-2007-059125-i1.gif"/></inline-formula> Discretization

<p/> <p>We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and <inline-formula><graphic file="1687-6180-2007-059125-i2.gif"/></inline-formula> discretization. The use of BioPhasor as the mixin...

Full description

Bibliographic Details
Main Authors: Wai Kuan Yip, Teoh Andrew BJ, Ngo David CL
Format: Article
Language:English
Published: SpringerOpen 2007-01-01
Series:EURASIP Journal on Advances in Signal Processing
Online Access:http://asp.eurasipjournals.com/content/2007/059125
Description
Summary:<p/> <p>We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and <inline-formula><graphic file="1687-6180-2007-059125-i2.gif"/></inline-formula> discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific <inline-formula><graphic file="1687-6180-2007-059125-i3.gif"/></inline-formula> discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT) and discrete fourier transform (DFT). Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs) of <inline-formula><graphic file="1687-6180-2007-059125-i4.gif"/></inline-formula> and <inline-formula><graphic file="1687-6180-2007-059125-i5.gif"/></inline-formula> for random and skilled forgeries for stolen token (worst case) scenario, and <inline-formula><graphic file="1687-6180-2007-059125-i6.gif"/></inline-formula> for both forgeries in the genuine token (optimal) scenario.</p>
ISSN:1687-6172
1687-6180