Next Article in Journal
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise
Next Article in Special Issue
Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim
Previous Article in Journal / Special Issue
A Cryptographic System Based upon the Principles of Gene Expression
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

by
George S. Eskander Ekladious
*,
Robert Sabourin
and
Eric Granger
Laboratoire D’imagerie, de Vision et D’intelligence Artificielle, Ecole de Technologie Supérieure, Université du Québec, 1100 rue Notre-Dame Ouest, Room A-3600, Montréal, QC H3C 1K3, Canada
*
Author to whom correspondence should be addressed.
Cryptography 2017, 1(3), 22; https://doi.org/10.3390/cryptography1030022
Submission received: 24 October 2017 / Revised: 20 November 2017 / Accepted: 21 November 2017 / Published: 25 November 2017
(This article belongs to the Special Issue Biometric and Bio-inspired Approaches in Cryptography)

Abstract

:
Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as simple distance thresholds, although they may not effectively model the complex variability of behavioral biometrics like signatures. In this paper, a Global-Local Distance Metric (GLDM) framework is proposed to learn cost-effective distance metrics, which reduce within-class variability and augment between-class variability, so that simple error correction thresholds of bio-cryptosystems provide high classification accuracy. First, a large number of samples from a development dataset are used to train a global distance metric that differentiates within-class from between-class samples of the population. Then, once user-specific samples are available for enrollment, the global metric is tuned to a local user-specific one. Proof-of-concept experiments on two reference offline signature databases confirm the viability of the proposed approach. Distance metrics are produced based on concise signature representations consisting of about 20 features and a single prototype. A signature-based bio-cryptosystem is designed using the produced metrics and has shown average classification error rates of about 7% and 17% for the PUCPR and the GPDS-300 databases, respectively. This level of performance is comparable to that obtained with complex state-of-the-art classifiers.

1. Introduction

Biometric traits, such as fingerprints, faces, signatures, etc., are strong candidates to replace traditional passwords and access codes in many security systems, including those for access control and digital rights management [1]. Since biometrics represent physiological or behavioral traits of a human, they cannot be lost and they are less likely to be stolen or to be shared. Recently, some researchers have focused on employing biometrics to operate cryptosystems, such as encryption and digital signature systems [2]. In such biometric cryptosystems (also known as bio-cryptosystems), biometric traits replace traditional passwords to protect the cryptography keys (crypto-keys). A user must provide a genuine biometric sample, e.g., his fingerprint, to retrieve a crypto-key, by which he accesses confidential information or digitally signs some data.
Several authors have presented bio-cryptosystems. For instance, Soutar et al. [3] and Davida et al. [4] designed systems based on fingerprints and iris, respectively. These early systems addressed the challenge in producing robust crypto-keys from variable biometric signals. Davida et al. [5] highlighted the relation between error correction codes and bio-cryptography in correcting biometric variability. This concept has been consolidated by Juels and Sudan who proposed two generic bio-cryptographic schemes called fuzzy commitment (FC) [6] and fuzzy vault (FV) [7]. They consider the query biometric signal as a noisy version of its prototype. If the query sample is genuine, the distance between the query and its prototype is limited, and as a result, this noise can be eliminated by the error correction decoder and the locked crypto-key is released to its owner.
Most FC and FV implementations focus on more physiological traits such as fingerprints [8], iris [9], retina [10], face [11]. With samples obtained for such biometrics, intra-class variability is a less intrinsic property, and results mostly from the acquisition process. For instance, fingerprint-based FVs are encoded with some minutia points extracted from the enrolled fingerprint. During authentication, decoding points are extracted from the query fingerprint, and might differ from corresponding encoding points due to misalignment. Researchers have alleviated such distances by aligning query and template fingerprints and positioning them that they are within the error correction capacity of the decoder [8].
Conversely, intra-class variability is a more intrinsic property of behavioral biometrics, like handwritten signatures, since individuals do not behave identically at all times. For operating robust systems based on signatures, modeling of high intra-class variations may require employing high-dimensional feature descriptors and complex classification rules, as found in traditional signature verification (SV) systems [12]. These tools are not suitable when designing signature-based bio-cryptosystems since we are restricted by the error correction code functionality (simple distance threshold) and the compact signal representation. For instance, it has been shown that direct implementation of an FV scheme based on offline signature images produces unreliable systems since the inherent variability is too high to model with a simple FV decoder [13].
In this paper, instead of using distance cancellation methods (like aligning samples), the bio-cryptosystem design problem is addressed by employing the distance metric learning concept [14]. To that end, a new approach for learning distance metrics called Global-Local Distance Metric (GLDM) is proposed to produce similar within-class (WC) and dissimilar between-class (BC) distance measures. Once the metric is learned, its information is used to design the signature-based bio-cryptosystem. Since the distance metric is designed to minimize the WC and maximize the BC distance measures, it is more likely that the noise of genuine queries is corrected by the error-correction decoder of the bio-cryptosystem while impostor queries are not corrected, and thus good classification accuracy may be obtained.
To initiate a bio-cryptosystem for a user when only few reference samples are available for enrollment, the proposed approach starts with the learning of a global metric from an independent (global) development dataset that includes a huge number of samples. Hence, the produced global distance metric discriminates between the WC and the BC distances for any user even for users who are not included in the global dataset. Then, when more enrollment samples are available for a specific user, they are employed to tune his metric, and produce a user-specific (local) distance metric.
Preliminary research on this approach appears in [15,16]. In this paper, the GLDM approach is proposed under a distance metric formulation of the biometric cryptosystem design problem.
For experimental validation, the UPCR and the GPDS-300 signature verification databases are used [17,18]. Distance metrics are optimized based on the proposed approach, where the impact of each processing step on the metric effectiveness is measured by its impact on the separation of WC and BC distances. The resulting metrics have been used to design signature-based bio-cryptosystems and the classification error rates are reported.
The rest of the paper is organized as follows. In the next section, the formulation of biometric cryptosystems as distance metrics is described. Section 3 reviews some distance metric learning approaches and their relation to the proposed method. Section 4 describes the new Global-Local Distance Metric (GLDM) learning approach. The experimental methodology is described in Section 5. Finally, the experimental results are presented and discussed in Section 6.

2. Problem Statement

Robust bio-cryptosystems (like FC and FV) operate in key-binding mode, where classical crypto-keys are coupled with a biometric message. In the enrollment phase, a prototype biometric message encodes the secret key. In the authentication phase, a message is extracted from the query sample to decode the key. If the query sample is genuine, the distance between the encoding and decoding messages is limited, and as a result, this distance can be eliminated by the decoder. On the other hand, if the query sample belongs to another person, or if it is a forged sample, the distance between the two messages is too high to cancel. Accordingly, the secret key will be unlocked only to users who apply query samples that are quite similar. Because of practical decoding complexity of such codes, biometric messages used must be concise. Produce a concise and informative message from the biometric signals is a challenging task, because the bio-cryptographic decoders are too simple to differentiate between genuine and forged samples. (Details of how the crypto-key is encoded/decoded by means of biometrics is out of the scope of this paper. For more details on this aspect see [6,7]).
In this paper, the FV key binding cryptographic scheme is considered [7]. In FVs, a feature vector F p u r = { f n p u r } n = 1 N of concise dimensionality N is extracted from a biometric enrolled prototype p u r of user u, and it locks the user cryptographic key K. To conceal this locking message from attackers, a set of chaff (noise) points are mixed with its genuine locking elements.
In the authentication phase, a user provides a biometric query signal Q v j , which produces an unlocking message F Q v j = { f n Q v j } n = 1 N . Each unlocking element f n Q v j is matched against all the locking elements of F p u r , and a matching set is produced. The key K can be unlocked only if the error of the matching set is within the FV error correction capability ϵ (The error correction capacity ϵ of a FV bio-cryptosystems relies on the sizes of both the cryptographic key and the encoding messages. Also, for technical issues, the message elements { f n } n = 1 N are quantized in 8-bit words before matching). There are two sources of matching errors: erasures and noise. In the case of erasures, some unlocking elements do not match their corresponding locking elements, and so they are therefore not added to the matching set. In the noise case, some unlocking elements match some of the chaff points, and so they are therefore added as noise δ to the matching set. For efficient FV implementation, the sum of these errors may not exceed ϵ for genuine query signals, while it exceeds it for impostors.
The FV functionality can be formulated as a distance metric as shown in Figure 1. Consider a prototype p u r * is selected to lock a cryptographic key K of a user u. During enrollment, each locking element f n p u r * locks a piece of information about the key K. During authentication, an unlocking element f n Q v j is extracted from the query sample Q v j , and is matched to all locking elements of the FV. The unlocking element can locate its corresponding locking element only if their similarity lies within a matching tolerance δ n . Accordingly two corresponding locking and unlocking elements constitute a distance element:
δ n ( Q v j , p u r * ) = δ f n Q v j p u r * > δ n
where we define the operator ⌈⌉ as follows:
x = 1 ; i f ( x i s t r u e ) 0 ; o t h e r w i s e
and
δ f n Q v j p u r * = f n Q v j f n p u r *
The accumulation of the individual distance elements constitutes the FV distance metric:
d ( Q v j , p u r * ) = n = 1 N δ n ( Q v j , p u r * )
Considering the extra noise (chaff) errors δ , the total distance (matching error) between a query and its prototype should not exceed the FV error correction capacity ϵ . Accordingly, the proposed formulation of the FV functionality is:
F V ( Q v j , p u r * ) = ( d ( Q v j , p u r * ) + δ ) ϵ
where the distance is smaller than ϵ , this function outputs F V = 1 , which implies that the locked cryptographic key is released (that should occur for WC samples where u = v ). Otherwise, the function outputs F V = 0 which implies that the key is not released (that should occur for BC samples where u v ).
To achieve the above condition, an effective distance metric learning approach is needed to optimize the FV distance metric (defined by Equation (4)), so that the WC and BC distance ranges are separated. In this case, the simple threshold rule (error correction capacity ϵ of the FV decoder) discriminates between genuine and impostor samples with high accuracy.

3. Related Work

The distance metric learning concept has been introduced mainly to enhance the performance of distance classifiers that take explicit distances (or kernels) as inputs, e.g., KNN, SVM, etc., [14]. For such distance/kernel-based classifiers, a distance function that measures the true proximity between feature representations (FR) of patterns is firstly designed, and is then fed to the classification stage. The performance of such classifiers relies on the quality of the employed distance measure, which in turn relies on the employed FR, the distance function applied to the representation, and the prototypes that are used as references for distance computations.
In the literature, such systems are optimized with the use of distance function learning [19], and/or prototype selection [20]. Distance function learning is done through the optimization of a parameterized function, so that the WC distances are minimized and BC distances are maximized. Examples of the employed distance functions are L 2 distance [21], Chi-squared [22], weighted similarity [23], and probability of belongingness to different classes [24]. However, most employed distance functions take the following form:
d f ( F Q , F p ) = ( F Q F p ) T A ( F Q F p ) .
where F Q and F p are the feature representations for the questioned and the prototype samples, respectively. This technique provides a means of translating hardly separable distributions to a space where the distributions are more separable. In order to having the conventional pattern recognition approaches hold in the new space, A is restricted to being a symmetric and positive definite matrix (or kernel), such that df(.) is a metric function [19]. According to Equation (6), it is obvious that entries of the A matrix determine the impact of the pairwise distances between individual features on the distance measure. Thus, learning A implies feature selection [25]. It has been shown that the accuracy of this metric increases when full matrices are considered (i.e., not only a diagonal matrix but some weighted relations among individual distances exist) [26].
Also, it is shown that global distance functions do not frequently represent all classes [27]. Instead, the concept of local distance functions is presented [19]. For instance, the metric tensor concept is represented, where instead of learning a metric A for the whole population, a specific metric A T is learned for every class T. This approach becomes complex for large numbers of classes, and some authors have suggested grouping similar classes under larger classes so that a trade-off between global and class-specific distance functions can be achieved [23]. Moreover, as indicated earlier, the quality of the proximity measure also depends on the prototype set used as a reference for distance measuring. Prototype selection has been extensively studied for distance-based classifiers like KNN [20].

4. Proposed Method

4.1. Overview

Since existing distance learning approaches are mainly designed for the enhanced performance of generic distance classifiers such as KNN, SVM, etc., there are no specific constraints applied to either classifier complexity, training size, or employed representation. Conversely, there are restrictions that apply when designing distance metrics for signature-based bio-cryptography. For instance, these systems involve a simple thresholding distance classifier which makes it hard to model complex problems like offline signature verification (OLSV). Moreover, OLSV systems should learn from limited positive signature samples and almost no forgeries are available during the design phase. Lastly, the design of such systems requires concise feature representations which might not capable of alleviating the high variability in the signature images. These design constraints require a specialized distance learning method for the problem at hand.
In this paper, the distance metric defined by Equation (4) is optimized based on a mixture of Feature-Distance (FD) space [28,29] and dissimilarity matrix analysis. Figure 2 illustrates the different distance metric computational spaces. Let us assume a system is designed for U different classes, where for any class u there are R prototypes (templates) { p u r } r = 1 R . Also, a class v provides a set of J questioned samples { Q v j } j = 1 J . The distance between a questioned sample Q v j and a prototype p u r is d ( Q v j , p u r ) . The distances between all the questioned and prototypes samples constitute a dissimilarity matrix, where each row contains distances from a specific query to all of the prototypes.
Where questioned and prototype samples belong to the same class, i.e., u = v , the distance sample is a WC sample (black cells in Figure 2). On the other hand, if questioned and prototype samples belong to different classes, i.e., u v , then the distance sample is a BC sample (white cells in Figure 2). An ideal distance metric implies that all the WC distances have zero values, while all the BC distances have large values. This occurs when the employed metric d absorbs all the WC variabilities, and detects all the BC similarities. The proposed approach aims to enlarge the separation between the BC and WC distance ranges, such that a simple distance threshold rule (like that involved in error correcting codes) produces accurate classification.
As shown in the figure, a distance measure accumulates some distance elements that are computed in the FD space, where the distance between a query Q v j and a prototype p u r is measured by the distance between their feature representations { f n Q v j } n = 1 N and { f n p u r } n = 1 N , respectively (see Equations (1)–(4)). To enlarge the separation between the WC and BC ranges, individual distance elements δ n ( Q v j , p u r * ) should be designed properly such that the WC instances will have low values and the BC instances high values. Since a distance element relies on a specific feature f n and its associated tolerance δ n , these building blocks should be optimized accordingly.
In the case of signature-based bio-cryptography systems, the optimization of the aforementioned distance metric is a challenging task since a concise representation must be selected from high-dimensional representations, especially when only a few positive samples and almost no forgery samples are available for training. We tackle this challenging problem by proposing a hybrid Global-Local learning framework that also achieves a trade-off between global and local distance metric approaches [23]. The global learning process overrides the curse -of -dimensionality by using huge numbers of samples of a development dataset for learning in the original high-dimensional feature space. Therefore, it becomes feasible for the local learning process to learn in the resulting reduced space even when limited samples are available for training.
This section provides a detailed description of the proposed GLDM distance metric learning framework illustrated in Figure 3 (please note that all the algorithms proposed in this paper are listed in the Figure). In the first step, a large number of samples of a global dataset is used to design a global distance metric that differentiates between WC and BC samples of the population. a preliminary feature space of huge dimensionality M is produced and is reduced to a global space of dimensionality H g < < M through the application of a Boosting Distance Elements (BDE) process. This BDE process runs in the Feature-Dissimilarity (FD) space resulting from the application of a dichotomy transformation, where H g distance elements are designed by selecting their constituting features and adjusting their tolerance values.
Then, once enrolling samples are available for a user, they are used to tune the global metric and produce a local (user-specific) distance metric. The local metric discriminates between the specific-class WC distances and the BC distances that are computed by comparing class samples to samples of other classes or forgeries. To this end, the local samples and some samples from the global dataset are represented in the global space of dimensionality H g . Additional dichotomy transformation and BDE processes run in the reduced space to produce a local space of dimensionality H l < H g < < M . Moreover, since different columns in the dissimilarity matrix might differ in accuracy (see Figure 2), we determine the best signature prototype by selecting the most stable and discriminant column.
Finally, depending on whether or not a local solution is available, either a global or a local distance metric is computed by employing Equations (1)–(4), using the distance element constituents produced by the above steps. It is important to note that for both global and local distance metric computations, only the best N < H l < H g < < M elements have been used since the metric produced is mainly designed for building FV systems that require a concise number of locking/unlocking elements.

4.2. Global Distance Metric Learning

Algorithm 1 describes the processing steps for learning global distance metric constituents. A feature representation F G of high dimensionality M is extracted from a global dataset G and is translated to the FD space by applying a dichotomy transformation. A boosting distance elements (BDE) process (Algorithm 2) runs in the FD space producing a set of global feature indexes F I g = { f i g h } h = 1 H g and their associated tolerance values Δ g = { δ g h } h = 1 H g , where H g < < M .
Algorithm 1 Global Distance Metric Learning (GDM)
Input: Global set G = { G s } s = 1 S consists of S samples from different classes.
1:
Extract feature representation F G = { F s G } s = 1 S of high dimensionality M, where F s G = { f s m G } m = 1 M .
2:
Produce dichotomy transformation δ F G = { δ F i j G } i , j = 1 S , where δ F i j G = { δ f i j m G } m = 1 M , δ f i j m G = f i m G f j m G is a WC samples if i , j belong to same class, otherwise it is a BC sample.
3:
Label dichotomy samples Y G = { y i j G } i , j = 1 S , so that y i j G = 0 for WC and y i j G = 1 for BC samples.
4:
Split { δ F G , Y G } to a training set T of s 1 samples and a validation set V of s 2 samples.
5:
Run Boosting Distance Elements (BDE) process (Algorithm 2) using T and V global feature representation F I g = { F I g h } h = 1 H g and associated tolerance Δ g = { δ g h } h = 1 H g , where H g < < M .
Output: Global feature indexes F I g , global tolerance Δ g both of H g dimensionality.
Algorithm 2 Boosting Distance Elements (BDE)
Input: Training set T = { δ F T , Y T } = { ( δ f t 1 , y t 1 ) , ( δ f t 2 , y t 2 ) , , ( δ f t s 1 , y t s 1 ) } , where δ f t s = { δ f a t s } a = 1 A , y 0 , 1 , B is the number of boosting iterations, [[validation set V = { δ F V , Y V } = { ( δ f v 1 , y v 1 ) , ( δ f v 2 , y 2 v ) , , ( δ f v s 2 , y v s 2 ) } , B e is the early stopping parameter]].
1:
Initialize: F I = ϕ , Δ = ϕ , D r 1 ( s ) = 1 s 1 : s [ 1 , s 1 ] , [ [ A U C 0 = 0 , B e c = 0 ] ]
2:
b = 1
3:
while b B do
4:
a = 1 , f i b = 1 , δ b = 0 , e b = 1000
5:
for a A do
6:
  Choose δ a that minimizes e a = s = 1 s 1 D r b ( s ) ( e a ( s ) ) , where e a ( s ) = ( δ f a s > δ a y s )
7:
  if e a < e b then
8:
    f i b a , δ b δ a , e b e a
9:
  end if
10:
end for
11:
F I = F I f i b , Δ = Δ δ b
12:
Choose α b = 1 2 ln ( 1 e b e b )
13:
 Update D r b + 1 ( s ) = D r b ( s ) Z b × { e α b , i f e b ( s ) = 0 e α b , i f e b ( s ) = 1 } where Zb is a normalization factor computed so that D r b + 1 ( s ) is a distribution
14:
 Compute A U C using validation set V and the distance metric: d v = b c = 1 b δ f b c v > δ b c
15:
if A U C A U C 0 then
16:
   B e c = B e c + 1
17:
else
18:
   A U C 0 = A U C ;
19:
   B e c = 0
20:
end if
21:
if B e c = B e then
22:
   B r e a k
23:
end if
24:
end while
output: F I , Δ

4.2.1. Dichotomy Transformation

The dichotomy transformation is applied to the original feature space F and translates samples to the feature-distance F D space, where distance elements are selected and optimized. Each distance element is computed based on a single feature f n and its associated tolerance value δ n . To illustrate the importance of this transformation, consider the example shown in Figure 4. On the left side, objects from three classes are represented in the feature space F. For simplicity, only two features f 1 and f 2 are shown in this figure, while typical representations might have high dimensionality. In this example, we assume that class 1 has two prototypes p 11 and p 12 . Also, let us consider, for now, that the employed distance function is the Euclidean distance:
d E ( Q v j , p u r ) = n = 1 N ( δ f n Q v j p u r ) 2
It is clear that a distance metric d E that is built on top of this representation is discriminative. WC distances (like d E ( Q 11 , p 11 ) ) are generally smaller than BC distances (like d E ( Q 21 , p 11 ) ). However, in the feature space F, the impact of each feature on the WC and BC distances is not clear. With representations of high dimensionality, high number of classes, and a small number of training samples per class, it is not feasible to select the most discriminative features in the feature space F.
On the other hand, in the feature-distance space F D , the impact of every individual feature on the WC and BC distances is clear, (see right side of Figure 4). In this space, a distance d E ( Q v j , p u r ) is represented by the length of the distance vector d Q v j p u r , where:
d Q v j p u r = { δ f n Q v j p u r } n = 1 N ,
δ f n Q v j p u r is the absolute feature distance defined by Equation (3).
Accordingly, the impact of each distance element on the overall distance metric (defined by Equation (7)) is explicit in the FD space. Projecting the dissimilarity vector on different axes of the FD space, we can determine the discriminative power of each dimension. For instance, it is obvious that δ f 2 is more discriminative than δ f 1 . For all samples belonging to class 1, (like Q 11 ), δ f 2 Q 1 j p 1 r < δ 2 and for all other class samples (like Q 21 and Q 31 ) , δ f 2 Q v j p 1 j > δ 2 . On the other hand, δ f 1 is less discriminant. For the class 2 query Q 21 , δ f 1 Q 21 p 11 < δ 1 , it is the same as with that for the class 1 query Q 11 . Besides being easier to rank features in the F D space, the multi-class problem with few training samples per class in F space is transformed into a more tractable two-class problem in the new space, with more training samples per class. Moreover, in the new space, it is possible to learn a tolerance value δ n , for each dimension δ f n , which discriminates between WC and BC distance instances. Embedding this tolerance information in computations of the distance metric transforms the Euclidean metric (defined by Equation (7)), which is sensitive to representation variabilities, into a more robust metric (defined by Equation (4)).
The aforementioned transformation method is applied for both global and local learning phases. For the global phase, the original representation of huge dimensionality M is projected to the FD space to be filtered by a Boosting Distance Elements (BDE) algorithm (Algorithm 2), producing a global space of reduced dimensionality H g < < M . (see Section 4.3 for use in applying dichotomy transformation during local distance metric learning).

4.2.2. Boosting Distance Elements

Algorithm 2 describes the BDE process. Training distance samples are represented in the FD space of a dimensionality A and they are initially given equal weights (Step 1). They are then sent to a boosting feature selection (BFS) method [30], for fast searching in high dimensional spaces (Steps 2:20). At each boosting iteration b, the best dimension δ f b is selected, along with the adjustment of its associated tolerance δ b that best splits the WC and BC distances (Steps 5:11). After each boosting iteration, training samples are given new weights based on the extend to which they are accurately classified by the current distance element, and the weight distribution D r b + 1 is updated accordingly (Steps 12:13). Before proceeding to the next boosting iteration, the current committee of distance elements is considered as a distance metric, and is validated using a validation dataset, where the Area Under the Curve (AUC) is employed for performance validation (The validation step is employed only during the global learning step, where sufficient numbers of samples exist. On the other hand, only a training set is used during the local BDE process). Once the maximum number of boosting iterations B is reached, or a performance degradation is seen for the last B e validations, the process ends and produces a list of feature indexes F I and their associated tolerances Δ of length b < < A (Steps 14:19).
This BDE process runs during both the global and local phases. In the global phase, the input is δ F G of dimensionality A = M , and it produces a global representation F I g of dimensionality H g < < M . (see Section 4.3. for using BDE algorithm during local distance metric learning).
To compute the global distance metric d g , the global representation F I g is reduced for the first N indexes, where N < H g < < M , and then the global metric d g is computed according to Equations (1)–(4).

4.3. Local Distance Metric Learning (LDM)

This process runs for every individual class (user), for tuning the global metric d g to the specific user. Algorithm 3 describes the LDM process. The local set (containing R samples) and a subset of the global set (containing I samples) are represented in the global representation of dimensionality H g produced by above global learning process. Then, they are translated to a global FD space producing distance samples δ F g G ¯ L , which consist of WC and BC samples of same dimensionality H g . These samples are sent to another BDE process that runs in the resulting FD space (as described in Algorithm 2), and it produces a local space of dimensionality H l < H g < < M consisting of a set of local feature indexes F I l = { f i l h } h = 1 H l and their associated tolerance values Δ l = { δ l h } h = 1 H l . The resulting local representation could be employed directly to compute a local distance metric using any available prototype as a reference; however, we propose a prototype selection process which instead picks the most stable and discriminant prototype for enhancing the accuracy of the metric.
Algorithm 4 illustrates the prototype selection process. Firstly, the global representations F g L and F g G ¯ of the local and global sets, respectively, are translated to the reduced local space by means of the local feature indexes F I l (extracted in Step 6 of Algorithm 3). The produced local representations F l L and F l G ¯ are used to generate a dissimilarity matrix D. To that end, the local tolerance values Δ l (extracted in Step 6 of Algorithm 3) are used for the distance metric computations defined by Equations (1)–(4). The produced matrix D is then used to select the most stable and discriminant prototype p * .
Algorithm 3 Local Distance Metric Learning (LDM)
Input: Local set L = { p r } r = 1 R consists of R prototypes of local class, feature representation F G of global set G of dimensionality M (extracted in Algorithm 1), global feature indexes F I g = { f i g h } h = 1 H g of dimensionality H g (output of Algorithm 1).
1:
Extract feature representation F L = { F r L } r = 1 R of high dimensionality M, where F r L = { f r m L } m = 1 M .
2:
Select I samples from F G as a forgery subset F G ¯ .
3:
Filter F G ¯ and F L with F I g and produce global representations F g G ¯ and F g L of dimensionality H g < < M , for global and local sets, respectively.
4:
Produce dichotomy transformation δ F g L G ¯ = { δ F g r i L G ¯ } r , i = 1 R , I , where δ F g r i L G ¯ = { δ f g r i h L G ¯ } h = 1 H g , δ f g r i h L G ¯ = f g r h L f g i h G ¯ is a WC samples if i belongs to the local class, otherwise it is a BC sample.
5:
Label dichotomy samples Y L G ¯ = { y r i L G ¯ } r , i = 1 R , I , so that y r i L G ¯ = 0 for WC samples and y r i L G ¯ = 1 for BC samples.
6:
Run Boosting Distance Elements (BDE) process (Algorithm 2) using { δ F g L G ¯ , Y g L G ¯ } as training set T local feature representation F I l = { F I l h } h = 1 H l and associated tolerance Δ l = { δ l h } h = 1 H l , where H l < H g < < M .
7:
Using the local feature indexes F I l and local feature tolerance Δ l (both learned through above BDE step), select best prototype p * by running Algorithm 4.
Output: Local feature indexes F I l and local feature tolerance Δ l both of dimensionality H l , best prototype p * .
Algorithm 4 Prototype Selection (PS)
Input: Global feature representations F g G ¯ and F g L of dimensionality H g for global and local sets, respectively, local feature indexes F I l , local feature tolerance Δ l .
1:
Filter F g G and F g L with F I l and produce local representations F l G and F l L of dimensionality H l < H g for global and local sets, respectively.
2:
Generate dissimilarity matrix: D u = r = 1 R v , j = 1 , 1 V , J d l ( Q v j , p u r ) , where d l ( Q v j , p u r ) is computed according to Equations (1)–(4) using F I l and Δ l .
3:
Choose p * = p u r * so that r * = a r g r [ 1 , R ] { M a x ( d s ( r ) ) } , where d s ( r ) = v u , j d l ( Q v j , p u r ) # B C v = u , j d l ( Q v j , p u r ) # W C .
Output: Best prototype p *
Figure 5 illustrates the prototype selection method by analyzing a dissimilarity matrix D and its relation to the F D representation space. On the left side, the WC and BC samples are represented in the F D space. It is obvious that different prototypes (different columns in the matrix D) produce different distance values, where significant variability exists for the WC and the BC classes. Moreover, in this space, it is not clear which prototype is the most informative. On the right side, distance samples d l ( Q v j , p u r ) are projected to a dissimilarity matrix D u , where each row contains distances between a specific query to all prototypes and each column contains distances between all queries to a specific prototype. Here, we investigate a part of D (see Figure 4) for a specific class u = 1 . Further, for simplicity, only two prototypes are shown for class 1 ( p 11 and p 12 ), and few query samples have been used (two queries for the local class Q 11 and Q 12 and two queries for each of the global classes 2 and 3). However, practical matrices could have a high number of prototypes (columns) and a high number of queries (rows). Moreover, this illustrative matrix is generated based on two features only ( f 1 and f 2 ), i.e., N = 2 , and so the distance values d l [ 0 , 2 ] . Nevertheless, practical problems might include higher dimensionality. For instance, for N = 20 the distance values d l [ 0 , 20 ] .
It is clear that the dissimilarity matrix provides an easier way of ranking prototypes according to their discriminative power. For instance, for class 1, p 12 is more discriminative than p 11 because d l ( Q v j , p 12 ) = 2 for all BC samples, whereas for p 11 , d l ( Q 21 , p 11 ) = 1 (because δ f 1 Q 21 p 11 > δ 1 ). Thus, for this class, measuring the distance relative to p 12 results in more isolated WC and BC distance ranges.
To automate the dissimilarity matrix analysis and the selection of the best prototype, we propose a distance separability measure:
d s ( r ) = v u , j d l ( Q v j , p u r ) # B C v = u , j d l ( Q v j , p u r ) # W C
The left part of the above equation measures the discriminative power of a prototype where high values indicate a large separation between global and local samples (BC distances). The right side for its part measures the stability of a prototype in which low values indicate a small separation between local samples (WC distances). Accordingly, we select the prototype that maximizes this distance separability measure and the best prototype is given by:
r * = a r g r [ 1 , R ] { M a x ( d s ( r ) ) }
Finally, after the best prototype is selected, the optimal local distance metric d l is computed in accordance with Equations (1)–(4) with reference to p * .

5. Experimental Methodology

The experiments conducted investigate both the proposed GLDM distance metric learning approach and the signature-based FV bio-cryptosystem, designed based on the resulting distance metrics. First, the experimental databases are split into a global (development) set G and an exploitation set that consists of several local sets (L), one for each user. A preliminary feature representation (FR) of huge dimensionality M is extracted and used to generate a preliminary dissimilarity matrix. This matrix is refined several times by applying the different steps of the GLDM learning approach (as described by Figure 3). The importance of the different processing steps is measured by their impact on separating the WC and BC distance ranges. The learned distance metrics are then used to design the target signature-based FV system. Since we proposed the first bio-cryptosystem based on offline signature images, there is no benchmark available for testing our system, and we make comparison with state-of-the-art classical signature verification (SV) systems instead. However, we emphasis here that this comparative study might be biased because while the FV systems involve a very simple classification rule (a distance threshold) and employs concise feature representations, the SV systems might employ complex classification rules and high dimensional representations.

5.1. Databases

Two different offline signature databases have been used for proof-of-concept simulations: the Brazilian PUCPR database [17], and the GPDS-300 database [18]. Firstly, we executed a proof-of-concept for GDML prototyping using the PUCPR database, and then the concept is generalized by testing a GLDM-based FV system using both of the databases. While the PUCPR database is composed of random, simple and skilled forgeries, the GPDS database for its part is composed of random and skilled forgeries. Random forgeries occur when the query signature presented to the system is mislabeled to another user. Further, forgers produce random forgeries when they know neither the signer’s name nor the signature morphology. For simple forgeries, the forger knows the writer’s name but not the signature morphology, and can only produce a simple forgery using his writing style. Finally, skilled forgeries imitate the signatures as they have access to a genuine signatures sample.

5.1.1. Brazilian PUCPR Database

The PUCPR database contains 7920 samples of signatures that were digitized as 8-bit grayscale images over 400X1000 pixels at a resolution of 300 dpi. The signatures were provided by 168 of these writers. For the last 108 writers, there are only 40 genuine signatures per writer, and no forgeries. We consider these signatures as the global dataset (G), and they are employed for the GDM learning phase. For the first 60 writers, there are 40 genuine signatures, 10 simple forgeries and 10 skilled forgeries per writer. These signatures are considered as the exploitation dataset consisting of several local subsets (L), one per user. Of these, the first 30 genuine signatures have been used for the LDM learning phase; however, the last 10 genuine signatures and all of the different forgeries have been used for performance evaluation.

5.1.2. GPDS-300 Database

The GPDS-300 database contains signatures of 300 users, which were digitized as 8-bit grayscale images at a resolution of 300 dpi. This database contains images of different sizes (varying from 51 × 82 to 402 × 649 pixels). All users have 24 genuine signatures and 30 skilled forgeries. The database is split into two parts. One part contains the signatures of the last 140 users and is considered as the global set (G) used for GDM training. The other part contains the signatures of the first 160 users and is considered as the exploitation dataset that consists of several local subsets (L), one per user; as well. Of these, the first 14 genuine signatures have been used for the LDM learning phase; however, the last 10 genuine signatures and all of the forgeries have been used for performance evaluation.

5.2. Global Distance Metric Learning

The processing steps of the GDM learning algorithm (Algorithm 1) are executed using the global dataset (G) of both databases as follows:

5.2.1. Feature Extraction

The Extended-Shadow-Code (ESC) [31] and Directional Probability Density Function (DPDF) [32] are employed. Features are extracted based on different grid scales, hence a range of details are detected in the signature image. A set of 30 grid scales is used for each feature type, producing 60 different single scale feature representations. These representations are then fused to produce a FR of huge dimensionality, M = 30,201 [29].

5.2.2. Dichotomy Transformation

The initial dissimilarity matrix, is constituted by translating the FR, of M dimensionality, for all users of G, to a FD space of same dimensionality. As this matrix is huge, not all of its cells are used for the GDM learning process. Also, to avoid overfitting the G dataset, some of the WC and BC samples have been used for training, while other sets of samples have been used for validation.

5.2.3. Boosted Global Distance Elements

The BDE process (Algorithm 2) runs using the G learning sets. The number of boosting iterations B is set to 1000 and the early stopping parameter B e is set to 100. The input dimensionality A = M = 30,201. For the PUCPR database, the resulting dimensionality H g = 555 , while for the GPDS-300 database H g = 697 . The global distance metric d g is then computed using the resulting representation F I g and the associated tolerance values Δ g according to Equations (1)–(4).

5.3. Local Distance Metric Learning

The processing steps of the LDM learning algorithm (Algorithm 3) are executed using the local dataset (L) of both databases as follows:

5.3.1. Feature Extraction and Filtering

Feature representations F G and F L of high dimensionality M = 30,201 are extracted from the local dataset L of each user and from a subset G ¯ of the global dataset, which represent negative samples, respectively. Then, this original representation is filtered by F I g , producing global representations F g G ¯ and F g L of the global and local training sets, respectively. The dimensionality of the resulting representation is H g = 555 for the PUCPR database and H g = 697 for the GPDS database.

5.3.2. Dichotomy Transformation

The dissimilarity matrix, is constituted by translating the global representations F g G ¯ and F g L to a FD space of same dimensionality H g . As this matrix is huge, not all of its cells have been used for the LDM learning process.

5.3.3. Boosted Local Distance Elements

The BDE process (Algorithm 2) runs using the δ F g G ¯ L learning samples. The number of boosting iterations B is set to 100 and no early stopping is applied. The input dimensionality are A = H g = 555 for the PUCPR database and A = H g = 697 for the GPD-300 database. The local distance metric d l is then computed using the resulting feature indexes F I l and the associated tolerance values Δ l according to Equation (4), where only the first N = 20 indexes are used. The dissimilarity cells are re-computed based on this local metric, and produce a dissimilarity matrix.

5.3.4. Prototype Selection

Finally, the dissimilarity matrix is refined for the best column, by selecting the most stable and discriminative prototype p * that maximizes the distance separability measure as defined by Equations (9)–(10), where R = 30 for the PUCPR database and R = 14 for the GPDS database.

5.4. Fuzzy Vault Encoding and Decoding

Once the local distance metric d l is learned, the information embedded in its constituting distance elements is used for FV encoding and decoding (as described in Section 2). In the encoding phase, we set the encoding message length N = 20 and the cryptographic key K size to 128-bits. Accordingly, the distance metric constituents F I l are extracted from the best enrolled signature prototype p * , and are quantized in 8-bit words. Then, the cryptographic key K is used to generate a polynomial of k = 7 degree and the quantized features are then projected on the polynomial. The features and their projections constitute a set of genuine FV locking points. Finally, a set of z = 180 chaff (noise) points are generated to conceal the genuine points, and both sets constitute the FV (For more details on how FV encoding/decoding works, see [6,16]).
During FV decoding, the same F I l features are extracted from the query signature image Q. The features are quantized and matched with the FV points. Since the distance metric is designed such that WC distances are small and the BC distances are large, it is expected that most of decoding features of genuine query samples will match the FV locking points, while only a few features of impostor queries will match FV points. The matching points are then corrected by the FV error correction decoder, where we set the error correction capacity ϵ = 6 , and they are used to re-generate the polynomial and release the cryptographic key K to the user.

5.5. Performance Evaluation

5.5.1. Evaluation of the GLDM Approach

The proposed GLDM approach is evaluated by investigating its power to generate well separated WC and BC distance ranges. A testing distance matrix is generated for each user of local datasets.
To investigate the different processing steps of the proposed approach, the impacts of the different learning steps on the separation of the WC and BC clusters are decoupled by employing the following experimental scenarios:
  • Random distance metric (RDM): N = 20 features are randomly selected from the M feature extractions, and are used to produce a random distance metric.
  • Global distance metric (GDM): the global metric d g is used for distance computations. This setting investigates the extend to which a global metric generalizes to unseen classes/users.
  • Strict local distance metric (SLDM): a modified version of the local metric d l is used for distance computations, where the learned feature tolerance Δ l is not employed. We can thus decouple the impact of embedding the modeled feature tolerance in the metric computations, and only test the applicability of tuning the global metric to specific classes/users. In all the above scenarios, we employed a strict distance metric as a non-tolerant variant of distance metrics, where the distance element (defined by Equation (1)) is replaced by a strict distance element:
    δ ^ n ( Q v j , p u r * ) = δ f n Q v j p u r * = 0
  • Local distance metric (LDM): the local metric d l is computed as defined by Equations (1)–(4). Therefore, the impact of absorbing a feature variability, through learning representation variability (tolerance), is tested in this experiment.
For all the above cases, the testing datasets are used to generate dissimilarity matrices, according to the investigated scenario. The separability of the WC and BC clusters are then measured by the Hellinger distance [33]. Assuming normal distributions of the WC and BC clusters, the squared Hellinger distance between them is given by:
H u 2 ( W C , B C ) = 1 2 σ 1 u σ 2 u σ 1 u 2 + σ 2 u 2 e 1 4 ( μ 1 u μ 2 u ) 2 σ 1 u 2 + σ 2 u 2
where μ 1 u , μ 2 u and σ 1 u , σ 2 u are the mean and variance values for W C and B C distances for a specific user u, respectively.
To measure the cluster separability for the different types of forgery, we compute H r a n d o m , H s i m p l e and H s k i l l e d , with the parameters μ and σ of the BC cluster are computed each time, based on the distances from samples of a specific type of forgeries. Also, we report H a l l , where the distribution parameters are computed according to distance measures of all forgery types. For all cases, these measures are averaged over all U users:
H ^ = u = 1 U H u U
Moreover, since the main target application of the proposed GLDM approach is the development of a reliable FV system, we decouple here any factor that impacts the recognition accuracy of such a system other than those related to the GDLM method. More specifically, FV recognition accuracy relies on the separability of the WC and BC distance ranges (which reflects the effectiveness of the GLDM approach), as well as on the error correction capacity ϵ (which is equivalent to the distance threshold that split the WC and BC ranges (see Equation (5)). Accordingly, we decouple the impact of the choice of the threshold ϵ and only test the impact of the metric d l on FV performance. To that end, we generate ROC (receiver operating curve) curves by computing recognition errors for all possible distance measures. A ROC curve plots the False Accept Rate (FAR) against the Genuine Accept Rate (GAR) for all possible thresholds (all distance measures). FAR for a specific threshold is the ratio of forgery samples with a distance measure smaller than this threshold. GAR is the ratio of genuine samples with a distance measure smaller than the threshold. In order to have a global assessment of the FV quality, we compute and average the AUC (area under ROC curves), for all users in the testing subset. A high AUC indicates more separation between the distance score distributions for the WC and BC classes.

5.5.2. Evaluation of the GLDM-Based FV System

After evaluating the GLDM approach, we investigate the performance of the FV bio-cryptosystem, designed based on the learned distance metrics, by employing the same experimental scenarios mentioned above. To measure actual recognition rates, we apply a fixed FV error correction capacity ϵ = 6 , where this value is empirically selected to compensate between the FRR and FAR errors (For a key size of 128-bits, the polynomial degree is K = 7 and the corresponding error correction capacity is ϵ = 6 . A trade-off between accuracy and security could be achieved by changing the key size (and the error correction capacity ϵ accordingly)). Then, we report the average error rate ( A E R ), where
A E R = ( F R R + F A R r a n d + F A R s i m p + F A R s k i l l ) / 4
The False Reject Rate ( F R R ) is the ratio of rejected genuine queries; F A R r a n d , F A R s i m p and F A R s k i l l are ratios of accepted random, simple, and skilled forgeries, respectively.

6. Results and Discussion

6.1. Results of the GLDM Approach

Figure 6 illustrates the impact of each processing step on the separation of the WC and BC clusters, for a specific user. It is obvious that, without distance metric learning, the distance distributions are overlapped. Learning a global metric using a global dataset increases the separation. This validates our hypothesis that distance metrics learned based on high dimensional FRs extracted from large numbers of classes, relatively, generalize for unseen classes. Running a local metric learning process using class-specific datasets increased separability. This validates our hypothesis that, the global metrics are adaptable for new classes. Embedding information about feature variability in distance metric computations increased the stability of the genuine class: for instance, the maximum distance score for the genuine class decreased from 9 to 5. This validates our hypothesis that the modeling of representation variability in the FD space absorbs some intrinsic signal variability.
Table 1 shows the average performance, where the Hellinger distance is averaged over all users and for the different types of forgeries. It is obvious that each processing step increased the distances between the WC and BC distance distributions, for all types of forgeries. The average distance of all forgery distributions H ^ a l l is increased from 0.24 to 0.66. Also, the average AUC is increased by about 47% (from 0.65 to 0.97).
The distance measures reported above are averaged for all prototypes. However, class separation differs for the different prototypes. For instance, Figure 7 shows distributions of the best and worst prototypes for a specific user. For the worst prototype, a distance threshold ϵ = 4 results in F R R = 10 % , F A R r a n d o m = 10 % and F A R s k i l l e d = 30 % . For the best prototype, F R R = 0 % , F A R r a n d o m = 0 % and F A R s k i l l e d = 20 % .

6.2. Results of the GLDM-based FV System

Recognition rates for the FV system, designed based on the learned local distance metric d l , are reported in Table 2 and Table 3 for the PUCPR and GPDS databases, respectively. For the PUCPR database (see Table 2), it is clear that each step of the GLDM learning approach enhances the FV recognition performance and this result is correlated with the distance separability investigations reported in Table 1. Also, applying the prototype selection method (variant 5) enhances the FV performance significantly. The recognition rates of this FV variant (where all GLDM processing steps are executed) is compared to state-of-the-art classical signature verification (SV) systems.
The first three SV systems are writer-independent (WI-SV), where a global development (independent) database is used to generate a global classifier. All systems employed an ensemble technique such that the classification decision relies on multiple prototypes, and high dimensional presentations are employed. The other SV systems are writer-dependent (WD-SV), where one local (dependent) dataset is used to generate a local classifier per user. For these systems, various complicated techniques, such as the dynamic selection of classifier and ensemble methods, are employed for enhanced recognition.
Generally, although the proposed FV implementation can be considered a very simple classifier (only a distance threshold) with concise feature representations (only 20 features), its recognition rates are comparable to those of more complex SV systems. For instance, compared to state-of-the-art WI-SV systems (system 3), where both the FV and SV systems rely on a single prototype for authentication, the proposed FV bio-cryptosystem has shown similar accuracy, while employing only 20 features instead of the 555 features present in the SV system [29]. Thus, applying our proposed GLDM learning approach maintained the performance, while decreasing the representation complexity by about 96% (from 555 to only 20 features). Moreover, digitizing the feature values (as they are represented in 8-bit words for bio-cryptographic encoding), had no impact on the recognition accuracy. Recently, the authors proposed a hybrid WI-WD SV system that tunes a global representation to specific users (see system 7). This system outperforms the aforementioned SV systems and provides similar insights about the effectiveness of applying a hybrid Global-Local training scheme.
For the GPDS database (see Table 3), each step of the GLDM learning approach enhances the FV recognition performance, providing results similar to the PUCPR experimental results. Comparisons with state-of-the art SV systems are promising as well. The first SV system employed a WI-SV classifier, where skilled forgery samples are used to train the global classifier. The following four SV systems employed WD-SV classifiers. The first three WD-SV systems also used skilled forgery samples to train the classifiers. This might bias the performance evaluation process since such knowledge is not available for training practical SV systems, e.g., banking systems. On the other hand, for the last WD-SV system, no forgery knowledge is used for training; however, complicated classification rules, such as the dynamic selection of classifiers and ensemble methods are employed for enhanced recognition. The hybrid WI-WD SV system outperforms both pure WI and WD systems, which leads to a similar conclusion as with the PUCPR database experiments, and supports the hypothesis regarding the effectiveness of tuning global solutions to specific classes. The proposed FV system has shown performance that are comparable to those of such complicated SV systems, where no forgery samples are used for training, proving the effectiveness of the proposed GLDM learning approach and supporting the proposed approach in modeling FV systems as distance metrics.

7. Conclusions

This paper proposed an approach for learning distance metrics adapted for bio-cryptosystem design. The proposed approach produces global metrics that generalize well to unknown classes that are not used for training. In addition, these metrics can be further tuned to new classes. This property permits the design of global classification systems adaptable to specific classes. Moreover, the produced metrics rely on concise representations, in terms of number of employed feature extractions and prototypes. This allow the design of systems with limitations in their computational complexity and that rely on high-dimensional feature representations, such as signature-based bio-cryptosystems. In addition, the modeling of representation variability and the selection of discriminant prototypes enhance the distance metric efficiency.
The proposed Global-Local distance metric (GLDM) learning approach is applied to the design of a key binding bio-cryptosystem based on the fuzzy vault (FV) scheme and handwritten signature images. To that end, the FV system functionality is formulated as a simple thresholding distance classifier. It is shown that such a simple classifier provides a level of accuracy that is as high as that of complex signature verification (SV) systems in the literature.
The proposed approach can also be employed as an intermediate tool for designing traditional feature-based classifiers, where the produced distance metrics feed distance-based classifiers, e.g., KNN. Future work will investigate the power of the proposed approach on other applications (e.g., face recognition, video surveillance, image retrieval, etc.). Also, comparing the effectiveness of the produced metrics to that of other local distance design methods in the literature is of great interest.

Acknowledgments

This work was supported by the Natural Sciences and Engineering Research Council of Canada and BancTec Inc., Montreal, QC, Canada.

Author Contributions

G.E., R.S. and E.G. conceived and designed the experiments; G.E. performed the experiments; G.E., R.S analyzed the data; G.E., R.S. and E.G. wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jain, A.K.; Ross, A.; Pankanti, S. Biometrics: A Tool for Information Security. IEEE Trans. Inf. Forensics Secur. 2006, 1, 125–143. [Google Scholar] [CrossRef]
  2. Uludag, U.; Pankanti, S.; Prabhakar, S.; Jain, A.K. Biometric Cryptosystems: Issues and Challenges. Proc. IEEE 2004, 92, 948–960. [Google Scholar] [CrossRef]
  3. Soutar, C.; Roberge, D.; Stojanov, S.A.; Gilroy, R.; Vijaya Kumar, B.V.K. Biometric Encryption Using Image Processing construction. SPIE 1998, 3314, 178–188. [Google Scholar]
  4. Davida, G.I.; Frankel, Y.; Matt, B.J. On enabling secure applications through off-line biometric identification. In Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 6 May 1998; pp. 148–157. [Google Scholar]
  5. Davida, G.I.; Frankel, Y.; Matt, B.J.; Peralta, R. On the relation of error correction and cryptography to an offline biometric based identification scheme. In Proceedings of the Workshop Coding and Cryptography, Paris, France, 11–14 January 1999; pp. 129–138. [Google Scholar]
  6. Juels, A.; Wattenberg, M. A fuzzy commitment scheme. In Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, 1–4 November 1999; pp. 28–36. [Google Scholar]
  7. Juels, A.; Sudan, M. A fuzzy vault scheme. In Proceedings of the 2002 IEEE International Symposium on Information Theory, Lausanne, Switzerland, 30 June–5 July 2002; p. 408. [Google Scholar]
  8. Nandakumar, K.; Jain, A.K.; Pankanti, S. Fingerprint-Based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensic Secur. 2007, 2, 744–757. [Google Scholar] [CrossRef]
  9. Lee, Y.J.; Park, K.R.; Lee, S.J.; Bae, K.; Kim, J. A new method for generating an invariant iris private key based on the Fuzzy Vault system. IEEE Trans. Syst. Man Cybern. Part B Cybern. 2008, 38, 1302–1313. [Google Scholar]
  10. Meenakshi, V.S.; Padmavathi, G. Retina and Iris based multimodal biometric Fuzzy Vault. Int. J. Comput. Appl. 2010, 1, 67–73. [Google Scholar] [CrossRef]
  11. Wang, Y.; Plataniotis, K.N. Fuzzy vault for face based cryptographic key generation. In Proceedings of the Biometrics Symposium, Baltimore, MD, USA, 11–13 September 2007; pp. 1–6. [Google Scholar]
  12. Impedovo, D.; Pirlo, G. Automatic Signature Verification: the State of the Art. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 2008, 38, 609–635. [Google Scholar] [CrossRef]
  13. Freire-Santos, M.; Fierrez-Aguilar, J.; Martinez-Diaz, M.; Ortega-Garcia, J. On the applicability of off-line signatures to the Fuzzy Vault construction. In Proceedings of the Ninth International Conference on Document Analysis and Recognition, Parana, Brazil, 23–26 September 2007. [Google Scholar]
  14. Yang, L. Distance Metric Learning: A Comprehensive Survey; Michigan State University: East Lansing, MI, USA, 2006. [Google Scholar]
  15. Eskander, G.S.; Sabourin, R.; Granger, E. On the dissimilarity representation and prototype selection for signature-based bio-cryptographic systems. Similarity-Based Pattern Anal. Recognit. 2013, 7953, 265–280. [Google Scholar]
  16. Eskander, G.S.; Sabourin, R.; Granger, E. Bio-Cryptographic system based on offline signature images. Inf. Sci. 2014, 259, 170–191. [Google Scholar] [CrossRef]
  17. Freitas, C.; Morita, M.; Oliveira, L.; Justino, E.; Yacoubi, A.; Lethelier, E.; Bortolozzi, F.; Sabourin, R. Bases de dados de cheques bancarios brasileiros. In Proceedings of the XXVI Conferencia Latinoamericana de Informatica, Atizapan de Zaragosa, Mexico, 18–22 September 2000. [Google Scholar]
  18. Vargas, J.; Ferrer, M.; Travieso, C.; Alonso, J. Off-line handwritten signature GPDS-960 corpus. In Proceedings of the Ninth International Conference on Document Analysis and Recognition, Parana, Brazil, 23–26 September 2007; pp. 764–768. [Google Scholar]
  19. Ramanan, D.; Baker, S. Local Distance Functions: A Taxonomy, New Algorithms, and an Evaluation. IEEE Trans. Pattern Anal. Mach. Intell. 2011, 33, 794–806. [Google Scholar] [CrossRef] [PubMed]
  20. Garcia, S.; Derrac, J.; Cano, J.R.; Herrera, F. Prototype Selection for Nearest Neighbor Classification: Taxonomy and Empirical Study. IEEE Trans. Pattern Anal. Mach. Intell. 2012, 34, 417–435. [Google Scholar] [CrossRef] [PubMed]
  21. Frome, A.; Singer, Y.; Malik, J. Image retrieval and classification using local distance functions. Adv. Neural Inf. Process. Syst. 2007, 19, 417–424. [Google Scholar]
  22. Domeniconi, C.; Peng, J.; Gunopulos, D. Locally adaptive metric nearest-neighbor classification. IEEE Trans. Pattern Anal. Mach. Intell. 2002, 24, 1281–1285. [Google Scholar] [CrossRef]
  23. Babenko, B.; Branson, S.; Belongie, S. Similarity metrics for categorization: From monolithic to category specific. In Proceedings of the 2009 IEEE 12th International Conference on Computer Vision, Kyoto, Japan, 29 September–2 October 2009. [Google Scholar]
  24. Mahamud, S.; Hebert, M. The optimal distance measure for object detection. In Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Madison, WI, USA, 18–20 June 2003. [Google Scholar]
  25. Guyon, I.; Elisseeff, A. An introduction to variable and feature selection. J. Mach. Learn. Res. 2003, 3, 1157–1182. [Google Scholar]
  26. Bar-Hillel, A.; Hertz, T.; Shental, N.; Weinshall, D. Learning and Mahalanobis metric from equivalence constraints. J. Mach. Learn. Res. 2005, 6, 937–965. [Google Scholar]
  27. Weinbeger, K.; Saul, L. Distance metric learning for large margin nearest neighbor classification. J. Mach. Learn. Res. 2009, 10, 207–244. [Google Scholar]
  28. Srihari, S.; Xu, A.; Kalera, M.K. Learning strategies and classification methods for Off-Line signature verification. In Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition, Tokyo, Japan, 26–29 October 2004; pp. 161–166. [Google Scholar]
  29. Rivard, D.; Granger, E.; Sabourin, R. Multi-Feature extraction and selection in writer-independent offline signature verification. Int. J. Doc. Anal. Recognit. 2013, 16, 83–103. [Google Scholar] [CrossRef]
  30. Tieu, K.; Viola, P. Boosting image retrieval. Int. J. Comput. Vis. 2004, 56, 17–36. [Google Scholar] [CrossRef]
  31. Sabourin, R.; Genest, G. An Extended-Shadow-Code based approach for off-line signature verification. In Proceedings of the 12th IAPR International Conference on Pattern Recognition, Jerusalem, Israel, 9–13 October 1994; Volume 2, pp. 450–453. [Google Scholar]
  32. Drouhard, J.; Sabourin, R.; Godbout, M. A neural network approach to off-line signature verification using directional PDF. Pattern Recognit. 1996, 29, 415–424. [Google Scholar] [CrossRef]
  33. Cha, S.-H. Comprehensive survey on distance/similarity measures between probability density functions. Int. J. Math. Models Methods Appl. Sci. 2007, 1, 300–307. [Google Scholar]
  34. Santos, C.; Justino, E.; Bortolozzi, F.; Sabourin, R. An off-line signature verification method based on document questioned experts approach and a neural network classifier. In Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition, Tokyo, Japan, 26–29 October 2004; pp. 498–502. [Google Scholar]
  35. Bertolini, D.; Oliveira, L.; Justino, E.; Sabourin, R. Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers. Pattern Recognit. 2010, 43, 387–396. [Google Scholar] [CrossRef]
  36. Justino, E.; Bortolozzi, F.; Sabourin, R. Off-line signature verification using HMM for random, simple and skilled forgeries. In Proceedings of the Sixth International Conference on Document Analysis and Recognition, Seattle, WA, USA, 3 September 2001; pp. 1031–1034. [Google Scholar]
  37. Batista, L.; Granger, E.; Sabourin, R. Applying Dissimilarity Representation to Off-Line Signature Verification. In Proceedings of the 2010 20th International Conference on Pattern Recognition (ICPR), Istanbul, Turkey, 23–26 August 2010; pp. 1293–1297. [Google Scholar]
  38. Batista, L.; Granger, E.; Sabourin, R. Dynamic Selection of Generative-Discriminative Ensembles for Off-Line Signature Verification. Pattern Recognit. 2012, 45, 1326–1340. [Google Scholar] [CrossRef]
  39. Eskander, G.; Sabourin, R.; Granger, E. Hybrid Writer-Independent–Writer-Dependent Offline Signature Verification System. IET Biom. J. Spec. Issue Handwrit. Biom. 2013, 2, 169–181. [Google Scholar] [CrossRef]
  40. Kumar, R.; Sharma, J.; Chanda, B. Writer-independent off-line signature verification using surroundedness feature. Pattern Recognit. Lett. 2012, 33, 301–308. [Google Scholar] [CrossRef]
  41. Ferrer, M.A.; Alonso, J.B.; Travieso, C.M. Offline Geometric Parameters for Automatic Signature Verification Using Fixed-Point Arithmetic. IEEE Trans. Pattern Anal. Mach. Intell. 2005, 27, 993–997. [Google Scholar] [CrossRef] [PubMed]
  42. Solar, J.R.; Devia, C.; Loncomilla, P.; Concha, F. Off-line Signature Verification using Local Interest Points and Descriptors. Lect. Notes Comput. Sci. 2008, 5197, 22–29. [Google Scholar]
  43. Ribeiro, B.; Gonçalves, I.; Santos, S.; Kovacec, A. Deep Learning Networks for Off-Line Handwritten Signature Recognition. Lect. Notes Comput. Sci. 2011, 7042, 523–532. [Google Scholar]
Figure 1. Proposed formulation of the FV functionality as distance metrics: each unlocking element f n Q v j is matched against all locking elements { f n p u r * } n = 1 N , where it succeeds in locating the corresponding element only if the elements’ dissimilarity is within the modeled tolerance δ n . To correctly decode the FV, and release the locked crypto-key K, the overall distance between the locking and unlocking messages d ( Q v j , p u r * ) , besides the noise error δ (resulting from false matching with chaffs), should not exceed the error correction capacity ϵ of the decoder.
Figure 1. Proposed formulation of the FV functionality as distance metrics: each unlocking element f n Q v j is matched against all locking elements { f n p u r * } n = 1 N , where it succeeds in locating the corresponding element only if the elements’ dissimilarity is within the modeled tolerance δ n . To correctly decode the FV, and release the locked crypto-key K, the overall distance between the locking and unlocking messages d ( Q v j , p u r * ) , besides the noise error δ (resulting from false matching with chaffs), should not exceed the error correction capacity ϵ of the decoder.
Cryptography 01 00022 g001
Figure 2. Illustration of computing distance metrics based on the feature distance (FD) and dissimilarity matrix representations: black and white cells represent WC and BC distances, respectively. The third dimension represents the Feature-Distance (FD) space. The distances between prototype and query samples constitute distance cells, which accumulates distance elements computed in the FD space. The distance cells constitute a dissimilarity matrix, where each row contains the distances from a specific query to all of the prototypes.
Figure 2. Illustration of computing distance metrics based on the feature distance (FD) and dissimilarity matrix representations: black and white cells represent WC and BC distances, respectively. The third dimension represents the Feature-Distance (FD) space. The distances between prototype and query samples constitute distance cells, which accumulates distance elements computed in the FD space. The distance cells constitute a dissimilarity matrix, where each row contains the distances from a specific query to all of the prototypes.
Cryptography 01 00022 g002
Figure 3. A framework of the Global-Local Distance Metric (GLDM) learning approach: a global distance metric is designed with a generic dataset and thus applies to any class (user). Once enrolling samples are available for a specific class (user), they are used to tune the global metric and produce a local metric.
Figure 3. A framework of the Global-Local Distance Metric (GLDM) learning approach: a global distance metric is designed with a generic dataset and thus applies to any class (user). Once enrolling samples are available for a specific class (user), they are used to tune the global metric and produce a local metric.
Cryptography 01 00022 g003
Figure 4. Illustration of the transformation from original feature space F (left) to the feature-distance space F D (right) by applying dichotomy transformation. The distance between two samples in the F space is translated to a vector in the F D space, where each dimension represents the distance as measured by a single feature. Three classes are represented in F space (class 1: red, class 2: green and class 3: black). These three classes are transformed to two classes in F D space (WC: black and BC: blue). In the FD space, it is easier to rank distance elements by their impact on the enlargement of the separation between WC and BC distance ranges. Also, in F D space, it is easier to learn a tolerance value δ n for each element δ f n that discriminates between WC and BC samples.
Figure 4. Illustration of the transformation from original feature space F (left) to the feature-distance space F D (right) by applying dichotomy transformation. The distance between two samples in the F space is translated to a vector in the F D space, where each dimension represents the distance as measured by a single feature. Three classes are represented in F space (class 1: red, class 2: green and class 3: black). These three classes are transformed to two classes in F D space (WC: black and BC: blue). In the FD space, it is easier to rank distance elements by their impact on the enlargement of the separation between WC and BC distance ranges. Also, in F D space, it is easier to learn a tolerance value δ n for each element δ f n that discriminates between WC and BC samples.
Cryptography 01 00022 g004
Figure 5. Illustration of the transformation from the feature-distance (FD) space (left) to the dissimilarity Matrix D (right). All distance samples that are measured with reference to a specific prototype in the FD space (WC samples: black and BC samples: blue), are represented as a single column in the matrix D. Although, selection of best prototype p * is not clear in the F D space, simple analysis of the dissimilarity matrix locates the most stable and discriminant column which in turn determines the best prototype.
Figure 5. Illustration of the transformation from the feature-distance (FD) space (left) to the dissimilarity Matrix D (right). All distance samples that are measured with reference to a specific prototype in the FD space (WC samples: black and BC samples: blue), are represented as a single column in the matrix D. Although, selection of best prototype p * is not clear in the F D space, simple analysis of the dissimilarity matrix locates the most stable and discriminant column which in turn determines the best prototype.
Cryptography 01 00022 g005
Figure 6. Distance measure distribution for a specific user from the PUCPR database.
Figure 6. Distance measure distribution for a specific user from the PUCPR database.
Cryptography 01 00022 g006
Figure 7. Distance measure distributions for different prototypes for a specific user in the UPCR database.
Figure 7. Distance measure distributions for different prototypes for a specific user in the UPCR database.
Cryptography 01 00022 g007
Table 1. Average Hellinger distance over all users of the UPCR database for the different design scenarios.
Table 1. Average Hellinger distance over all users of the UPCR database for the different design scenarios.
Variant 1 . RDM 2 . GDM 3 . SLDM 4 . LDM
H ^ r a n d o m 0.290.600.660.73
H ^ s i m p l e 0.250.550.600.69
H ^ s k i l l e d 0.140.430.470.59
H ^ a l l 0.240.550.590.66
A U C 0.650.770.930.97
Table 2. Overall error rates (%) provided by systems designed by the PUCPR database.
Table 2. Overall error rates (%) provided by systems designed by the PUCPR database.
ApplicationApproachReference/Variant# PrototypesFRRFARAER
RandomSimpleSkilled
SVWI1. Santos [34]510.334.411.6715.678.02
2. Bertolini [35]1511.324.323.006.486.28
3. Rivard [29]113.530.120.4314.957.26
159.770.020.3210.655.19
WD4. Justino [36]-2.171.233.1736.577.87
5. Batista [37]9.830.001.0020.337.79
6. Batista [38]7.500.330.5013.505.46
WI-WD7. Eskander [39]7.830.010.1713.505.38
FVProposed1. R D M 114.5773.5972.0076.7459.23
2. G D M 36.727.139.2622.0243.47
3. S L D M 28.002.003.0022.0013.75
4. L D M 11.352.052.3924.3810.08
5. p * 4.830.61.522.337.32
Table 3. Overall error rates (%) provided by systems designed by the GPDS database.
Table 3. Overall error rates (%) provided by systems designed by the GPDS database.
ApplicationApproachReference/VariantUsing Forgeries In TrainingFRRFARAER
RandomSkilledAvg
SVWI1. Kumar [40]YES13.7613.7613.76
WD2. Ferrer [41]14.1012.6013.35
3. Solar [42]16.4014.2015.30
4. Ribeiro [43]20.2514.6717.46
5. Batista [38]NO16.8116.8816.84
WI-WD6. Eskander [39]18.06022.71-13.96
FVProposed1. R D M NO23.5070.0772.02-55.19
2. G D M 48.3113.6045.17-35.69
3. S L D M 39.003.1916.62-19.60
4. L D M 41.982.0112.70-18.89
5. P * 37.50015.37-17.62

Share and Cite

MDPI and ACS Style

Ekladious, G.S.E.; Sabourin, R.; Granger, E. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems. Cryptography 2017, 1, 22. https://doi.org/10.3390/cryptography1030022

AMA Style

Ekladious GSE, Sabourin R, Granger E. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems. Cryptography. 2017; 1(3):22. https://doi.org/10.3390/cryptography1030022

Chicago/Turabian Style

Ekladious, George S. Eskander, Robert Sabourin, and Eric Granger. 2017. "Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems" Cryptography 1, no. 3: 22. https://doi.org/10.3390/cryptography1030022

APA Style

Ekladious, G. S. E., Sabourin, R., & Granger, E. (2017). Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems. Cryptography, 1(3), 22. https://doi.org/10.3390/cryptography1030022

Article Metrics

Back to TopTop