Abstract
Biometric recognition schemes are commonly utilized for security purposes. These schemes face two major challenges: security challenge and reliance on a particular biometric for authentication. The protection challenge comes from the use of basic biometrics in records. Therefore, if these records are compromised, the biometrics will no longer be valid. Consequently, it is necessary to preserve basic biometrics by protecting them from being used in biometric records. Cancelable biometric recognition systems rely on changing the information or biometric features to different formats, so that persons can use their specific biometric models in single or multiple systems. The mixture of chaos theory and cryptography shapes a crucial area for information security. The newest development in encryption systems is chaos-based for various distinctive attributes such as sensitivity to preliminary conditions, non-convergence, non-periodicity, and control parameters. This paper introduces a method to produce numerous encrypted biometric templates that are re-created by various convolution kernels generated from employing chaotic Baker map in different domains. Our proposed method has superior performance in treating variations in illumination, occlusion and facial expressions. It also has the added novelty of being able to perform authentication in the encrypted domain. In addition, the same approach can be applied on different databases. The chaotic map effect in different domains is evaluated on the widely-used AT&T, YALE, UFI, LFW, and FERET databases. The cancelable biometric system using the proposed Discrete Wavelet Transform (DWT) domain encryption with various keys has the best performance among all other implementations. In average, we achieved a 2% error probability, a 0.3 s authentication time, a 0.02% False Rejection Rate (FRR), a 0% False Acceptance Rate (FAR), a 0.0% Equal Error Rate (EER) and a 98.43% accuracy. Our proposed method also provides template diversity.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abuzneid MA, Mahmood A (2018) Enhanced human face recognition using LBPH descriptor, multi-KNN, and BPNN. IEEE Access 6:20641–20651
Ali M, Tahir N (2018) Cancelable biometrics technique for iris recognition. In: IEEE symposium on computer applications and industrial electronics (ISCAIE), pp 434–437
Ao M, Li S (2009) Near infrared face based biometric key binding. In: International conference on biometrics, Springer, Berlin, Heidelberg, pp 376–385
Arigbabu OA et al (2016) Smile detection using hybrid face representation. J Ambient Intell Humaniz Comput 7:1–12
Cheung K, Kong A, You J, Zhang D (2005) An analysis on invertibility of cancelable biometrics based on biohashing. In: IEEE CISST, pp 40–45
Connie T, Teoh A, Goh M, Ngo D (2005) Palmhashing: a novel approach for cancelable biometrics. Inf Process Lett 93(1):1–5
Technical Document About FAR, FRR and ERR (2004) Version 1.0. © 2004 by SYRIS Technology Corporation
Dong Y, Su H, Wu B, Li Z, Liu W et al. (2019) Efficient decision-based black-box adversarial attacks on face recognition. In: The IEEE conference on computer vision and pattern recognition (CVPR)
Enerstvedt O (2017) Analysis of privacy and data protection principles. In: Enerstvedt OM (ed) Aviation security, privacy, data protection and other human rights: technologies and legal principles. Springer, Cham, pp 307–394
Feng Y, Yuen P, Jain A (2010a) A hybrid approach for generating secure and discriminating face template. IEEE Trans Inf Forensics Secur 5(1):103–117
Gaddam S, Lal M (2010) Efficient cancelable biometric key generation scheme for cryptography. IJ Netw Secur 11(2):61–69
Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2):393–399
Gowthami A, Mamatha H (2015) Fingerprint recognition using zone based linear binary patterns. Proc Comput Sci 58:552–557
Grassi M, Faundez M (2009) Protecting DCT templates for a face verification system by means of pseudo-random permutations. In: International work-conference on artificial neural networks, Springer, Berlin, Heidelberg, pp 1216–1223
Guan Z, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1–3):153–157
He W, Wang E, Xiong T (2013) Intelligent face recognition based on manifold learning and genetic-chaos algorithm optimized Kernel extreme learning machine. J Commun 8(10):658–664
Huang F, Qu X (2011) Design of image security system based on chaotic maps group. J Multimed 6(6):510
Huh J (2017) PLC-based design of monitoring system for ICT-integrated vertical fish farm. HCIS 7(1):20
Huh J (2018) Big data analysis for personalized health activities: machine learning processing for automatic keyword extraction approach. Symmetry 10(4):93
Jain A, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20
Jain A, Bolle R, Pankanti S (2006) Biometrics: personal identification in networked society. Springer, Berlin, p 479
Jegede A, Udzir N, Abdullah A, Mahmod R (2017) Cancelable and hybrid biometric cryptosystems: current directions and open research issues. Int J Adv Appl Sci 4:65–77
Jeong M, Teoh A (2010) Cancellable face biometrics system by combining independent component analysis coefficients. In: International workshop on computational forensics, Springer, Berlin, Heidelberg, pp 78–87
Jiang R, Al-Maadeed S, Bouridane A, Crookes D, Celebi M (2016) Face recognition in the scrambled domain via salience-aware ensembles of many kernels. IEEE Trans Inf Forensics Secur 11(8):1807–1817
Jianjun Wu, Sun X, Wang Z (2019) Shearlet feature manifold for face recognition. J Ambient Intell Humaniz Comput 10(9):3453–3460
Jin X, Liu Y, Li X, Zhao G, Chen Y, Guo K (2015) Privacy preserving face identification in the cloud through sparse representation. In: Chinese conference on biometric recognition, Springer, Cham, pp 160–167
Jin Z, Teoh A, Goi B, Tay Y (2016) Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn 1(56):50–62
Jung S, Huh J (2019) A novel on transmission line tower big data analysis model using altered K-means and ADQL. Sustainability 11(13):3499
Kamencay P et al (2017) A new method for face recognition using convolutional neural network. Digit Image Process Comput Graph 15(4):663–672
Kaur H, Khanna P (2015) Gaussian random projection based non-invertible cancelable biometric templates. Proc Comput Sci 1(54):661–670
Khan M, Zhang J, Wang X (2008) Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 35(3):519–524
Khan M, Xie L, Zhang J (2010) Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals. Digit Signal Process 20(1):179–190
Kim Y, Toh K (2007) A method to enhance face biometric security. In: First IEEE international conference on biometrics: theory, applications, and systems, pp 1–6
Le Q, Ngiam J, Coates A, Lahiri A, Prochnow B, Ng A (2011) On optimization methods for deep learning. In: Proceedings of the 28th international conference on international conference on machine learning, Omnipress, pp 265–272
Lingli Z, Jianghuang L (2010) Security algorithm of face recognition based on local binary pattern and random projection. In: Cognitive informatics (ICCI), vol 9, IEEE, pp 733–738
Liu H et al. (2019) AdaptiveFace: adaptive margin and sampling for face recognition. In: IEEE conference on computer vision and pattern recognition, pp 11947–11956
Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):1–32
Lumini A, Nanni L (2007) An improved biohashing for human authentication. Pattern Recogn 40(3):1057–1065
Ma Y, Wu L, Gu X, He J, Yang Z (2017) A secure face-verification scheme based on homomorphic encryption and deep neural networks. IEEE Access 5:16532–16538
Manzoor S, Selwal A (2018) An analysis of biometric based security systems. In: IEEE Fifth international conference on parallel, distributed and grid computing (PDGC), pp 306–311
Mohammadzade H et al (2018) Pixel-level alignment of facial images for high accuracy recognition using ensemble of patches. J Opt Soc Am A 35(7):1149–1159
Moujahdi C, Ghouzali S, Mikram M, Rziza M, Bebis G (2012) Spiral cube for biometric template protection. In: International conference on image and signal processing, Springer, Berlin, Heidelberg, pp 235–244
Nandakumar K, Jain A (2015) Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process Mag 32(5):88–100
Nazari S, Moin MS, Kanan HR (2014) Cancelable face using chaos permutation. In: International symposium on telecommunications (IST), vol 7, IEEE, pp 925–928
Oloyede MO et al (2018) Improving face recognition systems using a new image enhancement technique, hybrid features and the convolutional neural network. IEEE Access 6:75181–75191
Osadchy M, Pinkas B, Jarrous A, Moskovich B (2010) Scifi-a system for secure face identification. In: IEEE symposium on security and privacy, pp 239–254
Patel V, Ratha N, Chellappa R (2015a) Cancelable biometrics: a review. IEEE Signal Process Mag 32(5):54–65
Połap D (2018) Model of identity verification support system based on voice and image samples. J Univ Comput Sci 24(4):460–474
Połap D, Woźniak M et al (2019) Bio-inspired voice evaluation mechanism. Appl Soft Comput 80:342–357
Qiu J, Li H, Dong J (2018) Design of cancelable palmprint templates based on look up table. IOP Conf Ser Mater Sci Eng IOP Publ 322(5):50–52
Rachapalli D, Kalluri H (2017) A survey on biometrie template protection using cancelable biometric scheme. In: IEEE second international conference on electrical, computer and communication technologies (ICECCT), pp 1–4
Rajpoot Q, Jensen C (2014) Security and privacy in video surveillance: requirements and challenges. In: International information security conference, Springer, Berlin, Heidelberg (IFIP), pp 169–184
Ratha N, Connell J, Bolle R (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634
Ratha N, Chikkerur S, Connell J, Bolle R (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561–572
Rathgeb C, Busch C (2012) Multi-biometric template protection: issues and challenges. New Trends and Developments in Biometrics, pp 173–190
Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 1:3
Rathgeb C, Gomez M, Busch C, Galbally J, Fierrez J (2015) Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris. In: 3rd IEEE international workshop on biometrics and forensics (IWBF), pp 1–6
Ross A, Nandakumar K, Jain A (2008) Introduction to multibiometrics. Handbook of biometrics. Springer, pp 271–292
Sandhya M, Prasad M (2017) Cancelable fingerprint cryptosystem using multiple spiral curves and fuzzy commitment scheme. Int J Pattern Recognit Artif Intell 31(04):1756004
Savvides M, Kumar B, Khosla P (2004) Cancelable biometric filters for face recognition. In: IEEE Proceedings of the 17th international conference on pattern recognition (ICPR), pp 922–925
Schmidhuber J (2015) Deep learning in neural networks: an overview. Neural Netw 61:85–117
Sinha A, Singh K (2005) Image encryption by using fractional Fourier transform and jigsaw transform in image bit planes. Opt Eng 44(5):057001
Sinha A, Singh K (2013) Image encryption using fractional Fourier transform and 3D Jigsaw transform. Opt Eng 9:158–166
Soliman R, Ramadan N, Amin M, Ahmed H, El-Khamy S, El-Samie F (2018a) Efficient cancelable iris recognition scheme based on modified logistic map. In: Proceedings of the National Academy of Sciences, India Section A: physical sciences, pp 1–7
Soliman R, El Banby G, Algarni A, Elsheikh M, Soliman N, Amin M, El-Samie F (2018b) Double random phase encoding for cancelable face and iris recognition. Appl Opt 57(35):10305–10316
Soliman R, Amin M, El-Samie F (2018c) A double random phase encoding approach for cancelable iris recognition. Opt Quant Electron 50(8):326
Soliman R, Amin M, El-Samie F (2019) A modified cancelable biometrics scheme using random projection. Ann Data Sci 6(2):223–236
Souza D, Burlamaqui A, Souza F (2018) Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps. Multimed Tools Appl 77(2):2013–2032
Sree S, Radha N (2016) Cancellable multimodal biometric user authentication system with fuzzy vault. In: IEEE international conference on computer communication and informatics (ICCCI), pp 1–6
Syafeeza R et al (2014) Convolutional neural network for face recognition with pose and illumination variation. Int J Eng Technol 6:44–57
Tarif E, Wibowo S, Wasimi S, Tareef A (2018) A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system. Multimed Tools Appl 77(2):2485–2503
Teoh A, Goh A, Ngo D (2006) Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28(12):1892–1901
Tong X, Cui M (2008) A novel image encryption scheme based on feedback and 3D Baker. In: IEEE 4th international conference on wireless communications, networking and mobile computing, pp 1–4
Vezzetti E, Marcolin F (2014) 3D Landmarking in multiexpression face analysis: a preliminary study on eyebrows and mouth. Aesthetic Plast Surg 38(4):796–811
Vezzetti E, Marcolin F, Stola V (2013) 3D human face soft tissues landmarking method: an advanced approach. Comput Ind 64(9):1326–1354
Wu L, Yuan S (2010) A face based fuzzy vault scheme for secure online authentication. In: ieee second international symposium on data, privacy, and e-commerce, pp 45–49
Xiaodong L, Qing H, Xin J (2019) A secure and efficient face-recognition scheme based on deep neural network and homomorphic encryption. In: IEEE international conference on virtual reality and visualization (ICVRV), pp 1–8
Zheng X (2017) The application of information security encryption technology in military data system management. In: International conference on man-machine-environment system engineering, Springer, Singapore, pp 423–428
Acknowledgements
The authors would like to thank the Deanship of Scientific Research, Taif University Researchers Supporting Project number (TURSP-2020/08), Taif University, Taif, Saudi Arabia for supporting this research work.
Funding
This study was funded by the Deanship of Scientific Research, Taif University Researchers Supporting Project number (TURSP-2020/08), Taif University, Taif, Saudi Arabia.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Faragallah, O.S., Naeem, E.A., El-Shafai, W. et al. Efficient chaotic-Baker-map-based cancelable face recognition. J Ambient Intell Human Comput 14, 1837–1875 (2023). https://doi.org/10.1007/s12652-021-03398-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-021-03398-0