The DeCov loss significantly improves the embedding
capacity with respect to the baseline system relying
on DenseNet-161. It is also worth noting that using an
ICA transformation worsens the capacity achievable
with representations derived with both DenseNet-161
and ResNext-101. The KLD and SRIP loss functions
lead to similar results in terms of channel capacity,
with limited improvements with respect to a baseline
system only for ResNext-101.
6 CONCLUSIONS
In this paper we have proposed a framework to quan-
titatively evaluate the statistical independence of fea-
tures employed within biometric cryptosystems, and
used it to analyze the effectiveness of using cascade
networks including DCCAEs to produce discrimina-
tive and independent biometric representations. Since
each of the proposed metric has its own criticalities, it
is recommended to evaluate a given biometric repre-
sentation considering all of them, rather than drawing
conclusions based on only one. Further developments
could be studied in order to design other metrics with
more informative content. For instance, it would be
possible to define a new centrality measure, possibly
taking into account the difference between the statis-
tics and the thresholds computed by an HSIC test,
and associating greater relevance to pair of features
with greater differences. This way, evaluations could
be performed taking into account the significance of
each test, and not only its binary output. Such met-
ric could be also employed to define effective feature
selection strategies based on statistical independence.
Furthermore, it would be highly desirable to design
novel approaches to automatically learn how to gen-
erate biometric representations with both discrimina-
tive and independence characteristics. To this aim, the
proposed metrics could be integrated within the loss
functions employed during the learning process.
REFERENCES
Bansal, N., Chen, X., and Wang, Z. (2018). Can we gain
more from orthogonality regularizations in training
deep cnns? In Proceedings of the 32nd Interna-
tional Conference on Neural Information Processing
Systems, NIPS’18, page 4266–4276, Red Hook, NY,
USA. Curran Associates Inc.
Bondy, J. and Murty, U. (2008). Graph Theory. Springer
Publishing Company, Incorporated, 1st edition.
Cogswell, M., Ahmed, F., Girshick, R., Zitnick, L., and Ba-
tra, D. (2016). Reducing overfitting in deep networks
by decorrelating representations.
Deng, J., Guo, J., Xue, N., and Zafeiriou, S. (2019). Ar-
cface: Additive angular margin loss for deep face
recognition.
Freeman, L. C. (1978). Centrality in social networks con-
ceptual clarification. Social Networks, 1(3):215–239.
Gretton, A., Fukumizu, K., Teo, C. H., Song, L., Schölkopf,
B., and Smola, A. (2007). A kernel statistical test of
independence. In Proceedings of the 2007 Conference
on Advances in Neural Information Processing Sys-
tems.
Hine, G., Maiorana, E., and Campisi, P. (2017). A zero-
leakage fuzzy embedder from the theoretical formula-
tion to real data. IEEE Transactions on Information
Forensics and Security, 12(7):1724–1734.
Huang, G., Liu, Z., van der Maaten, L., and Weinberger,
K. Q. (2018). Densely connected convolutional net-
works.
Hyvarinen, A. and Oja, E. (2000). Independent component
analysis: Algorithms and applications. Neural Net-
works, 13(4-5):411–430.
Ignatenko, T. and Willems, F. (2015). Fundamental lim-
its for privacy-preserving biometric identification sys-
tems that support authentication. IEEE Trans. on In-
formation Theory, 61(10):5583–5594.
Jain, A., Ross, A., and Nandakumar, K. (2011). Introduc-
tions to biometrics. SPRINGER.
Kuzu, R., Maiorana, E., and Campisi, P. (2020a). Loss func-
tions for cnn-based biometric vein recognition. In Eu-
ropean Signal Processing Conference (EUSIPCO).
Kuzu, R. S., Maiorana, E., and Campisi, P. (2020b). Vein-
based biometric verification using densely-connected
convolutional autoencoder. IEEE Signal Processing
Letters, 27:1869–1873.
Nandakumar, K. and Jain, A. K. (2015). Biometric tem-
plate protection: Bridging the performance gap be-
tween theory and practice. IEEE Signal Processing
Magazine, 32(5):88–100.
Patel, V. M., Ratha, N. K., and Chellappa, R. (2015). Cance-
lable biometrics: A review. IEEE Signal Processing
Magazine: Special Issue on Biometric Security and
Privacy, 32(5):54–65.
Rathgeb, C. and Uhl, A. (2011). A survey on biometric
cryptosystems and cancelable biometrics. EURASIP
Journal on Information Security, 3:1–25.
Simoens, K., Tuyls, P., and Preneel, B. (2009). Privacy
weaknesses in biometric sketches. In 2009 30th IEEE
Symposium on Security and Privacy, pages 188–203.
Xie, S., Girshick, R., Dollár, P., Tu, Z., and He, K. (2017).
Aggregated residual transformations for deep neural
networks.
Yin, Y., Liu, L., and Sun, X. (2011). Sdumla-hmt: A mul-
timodal biometric database. In Sun, Z., Lai, J., Chen,
X., and Tan, T., editors, Biometric Recognition, pages
260–268, Berlin, Heidelberg. Springer Berlin Heidel-
berg.
On the Statistical Independence of Parametric Representations in Biometric Cryptosystems: Evaluation and Improvement
487