IEEE TRANSACTIONS ON CYBERNETICS, VOL. 43, NO. 3, JUNE 2013 843 Dynamic Detection-Rate-Based Bit Allocation With Genuine Interval Concealment for Binary Biometric Representation Meng-Hui Lim, Andrew Beng Jin Teoh, Senior Member, IEEE, and Kar-Ann Toh, Senior Member, IEEE Abstract—Biometric discretization is a key component in bio- metric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and un- derdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit al- location of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA. Index Terms—Biometric discretization, detection rate, genuine interval concealment (GIC), quantization. I. I NTRODUCTION C RYPTOGRAPHIC keys serve as a crucial constituent in cryptographic applications. Each cryptographic key not only functions as a verification mechanism for the associated identity but also enables further cryptographic usage within the application itself (i.e., encryption/decryption). Biometric has been regarded as a potential source for crypto- graphic key generation due to its uniqueness and convenience. A biometric-generated cryptographic key, known as Bio-Crypto key, has the advantage of being representative. Moreover, it can be generated without the need of remembrance (password) or possession (token) which can be forgotten or lost, respectively. Manuscript received March 23, 2011; revised March 4, 2012 and August 2, 2012; accepted August 28, 2012. Date of publication October 2, 2012; date of current version May 10, 2013. This work was supported by the Ministry of Education, Science and Technology of the Korean Government under Korea Science and Engineering Foundation Grant 2011-8-1095. This paper was recommended by Associate Editor G.-B. Huang. M.-H. Lim is with the Department of Computer Science, Hong Kong Baptist University, Kowloon, Hong Kong (e-mail: menghui.lim@gmail.com). A. B. J. Teoh and K.-A. Toh are with the School of Electrical and Electronic Engineering, College of Engineering, Yonsei University, Seoul 120-749, South Korea (e-mail: bjteoh@yonsei.ac.kr; katoh@yonsei.ac.kr). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TSMCB.2012.2217127 However, due to severe consequence of biometric compromise, much effort has been contributed to developing changeable biometrics for key generation [1], [21]. A typical way of generating a Bio-Crypto key would be via a binary biometric discretization (biometric quantization with binary encoding) based on the statistical distribution of training data. Given a collection of extracted feature vectors of all users, a feature space is initially quantized into a number of intervals. Each feature element is then mapped into a short binary string according to the label of the interval where the feature element is enclosed within. Note that the mappings involved are usually on a per-dimension basis, although mappings based on two [5] or more dimensions [18] have just started to attract attention. Eventually, every individual binary output is concatenated to form a final bit string. Apart from Bio-Crypto key generation, biometric discretiza- tion plays another important role in many template protection schemes where a binary representation of biometric features is needed. Examples of template protection schemes include fuzzy commitment [12] and fuzzy extractor [7]. Moreover, the binary representation is efficient in terms of matching and storage requirements and is crucial when the processing time and storage space are of high concern. Fig. 1 shows a pictorial demonstration of the 1-D 3-bit bio- metric discretization scheme based on a binary reflected Gray code (BRGC) [9] encoding scheme which is able to confine the Hamming distance of adjacent intervals to unity. Generally, for the dth feature dimension, the feature compo- nent of user j can be modeled by a genuine user probability density function (pdf) p d j (f ) due to potential intraclass varia- tions, while the feature component of the entire population can be modeled by a background pdf p d bg (f ). Based on these two pdfs, the theoretical false acceptance rate (FAR) α d (n d ) and the false rejection rate (FRR) β d (n d ) of an n d -bit discretization scheme can respectively be quantified as α d j (n d )= I d G (n d ) p d bg (f )df (1) β d j (n d )=1 δ d j (n d ) (2) where δ d j (n d )= I d G (n d ) p d j (f )df (3) 2168-2267/$31.00 © 2012 IEEE