Abstract
With the widespread deployment of biometric recognition, personal data security and privacy are attracted more and more attentions. A crucial privacy issue is how to ensure the security of user template. This paper proposes a novel template protection algorithm for face recognition based on chaotic map. Each face template is corresponding to different chaotic sequence produced by system master key and user identification number. The order of chaotic sequence controls the substitution index of face template. Experiment results on facial FERET database show that our algorithm can significantly improve the recognition performance and ensure the security of face template.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Sig. Process. 2008, 1–17 (2008)
Nandakumar, K., Pankanti, S., Jain, A.K.: Fingerprint-based fuzzy vault implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2007)
Kocarev, L., Lian, S.: Chaos-Based Cryptography Theory. Algorithms and Applications. Springer, Heidelberg (2011). doi:10.1007/978-3-642-20542-2
Abd-El-Hafiz, S.K., Radwan, A.G., AbdElHaleem, S.H., Barakat, M.L.: A fractal-based image encryption system. IET Image Process 8(12), 742–752 (2014)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE International Symposium on Information Theory, Switzerland, pp. 408–413 (2002)
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005). doi:10.1007/11527923_32
Barakat, M.L., Mansingka, A.S., Radwan, A.G., Salama, K.N.: Hardware stream cipher with controllable chaos generator for colour image encryption. IET Image Process 8(1), 33–43 (2014)
You, L., Wang, Y., Chen, Y., Deng, Q., Zhang, H.: A novel key sharing fuzzy vault scheme. KSII Trans. Internet Inf. Syst. 10, 453–460 (2012)
Lafkin, M., Mikram, M., Ghouzali, S.: Biometric cryptosystems based fuzzy commitment scheme: a security evaluation. Int. Arab J. Inf. Technol. 13(4), 443–449 (2016)
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)
Nagar, A., Nandakumar, K., Jain, A.K.: Multibiometric cryptosystems based on feature level fusion. IEEE Trans. Inf. Forensics Secur. 7(1), 255–268 (2012)
Turk, M., Pentland, A.: Face recognition using eigenfaces. In: IEEE Transaction on Pattern Analysis and Machine Intelligence, pp. 586–591 (1991)
Song, X., Wang, S., El-Latif, A.A.A., Niu, X.: Quantum image encryption based on restricted geometric and color transformations. Quantum Inf. Process. 13(8), 1765–1787 (2014)
Acknowledgments
This work is supported by the National Science Foundation of China (nos. 61201399, 61501176, 61601174), and Startup Fund for Doctor of Heilongjiang University.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dong, J., Meng, X., Chen, M., Wang, Z., Tang, L. (2017). Template Protection Based on Chaotic Map for Face Recognition. In: Zou, B., Li, M., Wang, H., Song, X., Xie, W., Lu, Z. (eds) Data Science. ICPCSEE 2017. Communications in Computer and Information Science, vol 727. Springer, Singapore. https://doi.org/10.1007/978-981-10-6385-5_21
Download citation
DOI: https://doi.org/10.1007/978-981-10-6385-5_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6384-8
Online ISBN: 978-981-10-6385-5
eBook Packages: Computer ScienceComputer Science (R0)