Abstract
This paper suggests novel cancellable biometric realization approach recognition and template protection. In this paper, the Homomorphic Filtering Masking (HFM) encoding algorithm is utilized for cancelable palmprint recognition system. In the suggested technique, the Discreet Wavelet Transform (DWT) algorithm is applied on the palmprint. Then the DWT divides the image into four sub images. The resultant map is encrypted with the HFM algorithm, in order to the second HFM utilized in produced from the palmprint. This approach can be used to develop a frequency domain procedure for making this system for biometric template protection. The obtained results prove that the suggested technique is the best from the other algorithms.
Similar content being viewed by others
Data availability
The data that supports the findings of this study are available within the article.
References
Akdogan D, Altop DK, Eskandarian L, Levi A (2018) Secure key agreement protocols: Pure biometrics and cancelable biometrics. Comput Netw. https://doi.org/10.1016/j.comnet.2018.06.001
Ashiba HI (2020) Cepstrum adaptive plateau histogram for dark IR night vision images enhancement. Multimed Tools Appl 79:2543–2554
Ashiba HI, Awadallah KH, El-Halfawy SM, Abd El-Samie FE (2008) Homomorphic enhancement of infrared images using the additive wavelet transform. Prog Electromagn Res C 1:123–130
Ashiba HI, Mansour HM, Ahmed HM, El-Kordy MF, Dessouky MI, Zahran O, El-Samie FEA (2019) Enhancement of IR images using histogram processing and the Undecimated additive wavelet transform. Multimed Tools Appl 78(9):11277–11290
Brindha VE, Natarajan AM (2012) Multi-modal biometric template security: Fingerprint and palmprint based fuzzy vault. J Biomet Biostat 3(6):1–6
Dabbaghchian S, Ghaemmaghami MP, Aghagolzadeh A (2010) Feature extraction using discrete cosine transform and discrimination power analysis with a face recognition technology. Pattern Recogn 43:1431–1440
Didiot E, Illina I, Fohr D, Mella O (2010) A wavelet-based parameterization for speech/Music discrimination. Comput Speech Lang, Elsevier 24(2):341. https://doi.org/10.1016/j.csl.2009.05.003 hal-00608922
Düzenli T, Özkurt N (2011) Comparison of Wavelet Based Feature Extraction Methods for Speech/Music Discrimination. Istanbul University - J Electr Electron Eng 11(1):1355–1362
Dwivedi R, Dey S (2018) Score-level fusion for cancelable multi- biometric veriÞcation. Pattern Recogn Lett. https://doi.org/10.1016/j.patrec.2018.04.022
Feng YC, Yuen PC, Jain AK (2010) A hybrid approach for generating secure and discriminating face template. IEEE Transactions on Information Forensics and Security 5(1)
Ghoneim A, Muhammad G, Amin SU, Gupta B (2018) Medical Image Forgery Detection for Smart Healthcare. IEEE Commun Mag 56(4):33–37. https://doi.org/10.1109/MCOM.2018.1700817
Hwang CM (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33:1–5
Kant Tyagi S, Khanna P (2012) Face recognition using discrete cosine transform and nearest neighbor discriminant analysis. IACSIT International Journal of Engineering and Technology 4(3):311–314. https://doi.org/10.7763/IJET.2012.V4.372
Kho JB, Kim J, Kim I, Teoh ABJ (2019) Cancelable fingerprint template design with randomized non-negative least squares. Pattern Recogn 91:245–260
Kong WK, Zhang D, Jain AK (2004) Feature -level fusion for effective palmprint authentication. ICBA. LNCS. 3072:520–523, Springer, Heidelberg
Kumar A (2008) Incorporating cohort information for reliable palmprint authentication, Sixth Indian Conference on Computer Vision, Graphics & Image Processing. https://doi.org/10.1109/ICVGIP.2008.73
Leng L, Jin Teoh AB, Li M, Khan MK (2014) Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition. Neuroomputing 131:377–387
Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76:333–354. https://doi.org/10.1007/s11042-015-3058-7
Leng L, Teoh ABJ (2015) Alignment-free row-co-occurrence cancelable palmprint Fuzzy Vault. Pattern Recognit 48(7):2290–2303. https://doi.org/10.1016/j.patcog.2015.01.021
Leng L, Teoh ABJ, Li M (2017) Simplified 2DPalmHash code for secure palmprint verification. Multimed Tools Appl 76:8373–8398. https://doi.org/10.1007/s11042-016-3458-3
Leng L, Teoh ABJ, Li M, Khan MK (2014) A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional Palm Phasor-fusion. Security Comm Netw 7:1860–1871
Leng L, Teoh ABJ, Li M, Khan MK (2015) Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code. Multimed Tools Appl 74:11683–11701. https://doi.org/10.1007/s11042-014-2255-0
Leng Lu, Zhang J (2011) Dual-key- binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34:1979–1989
Leng L, Zhang JS, Khan MK, Bi X, Ji M (2010) Cancelable Palm Code generated from randomized Gabor Filters for palmprint protection, 25th International Conference of Image and Vision Computing New Zealand, Queenstown, pp 1–6. https://doi.org/10.1109/IVCNZ.2010.6148818.
Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554
Li H, Qiu J, Teoh ABJ (2020) Palmprint template protection scheme basedon randomized cuckoo hashing and MinHash. Multimed Tools Appl 79:11947–11971. https://doi.org/10.1007/s11042-019-08446-8
Maiorana E (2010) Biometric cryptosystem using function based on-line signature recognition. Expert Syst Appl 37(4):3454–3461
Matsuyama E, Tsai D, Lee Y, Tsurumaki M, Takahashi N, Watanabe H, Chen H (2013) A modified Undecimated Discrete Wavelet Transform Based Approach to Mammographic Image Denoising. J Digit Imaging 26:748–758. https://doi.org/10.1007/s10278-012-9555-6
Morchen F (2003) Time series feature extraction for data mining using DWT and DFT, Data Bionics, Philipps-University Marburg, Hans-Meerwein-Strasse. 35032 Marburg, Germany, No. 5
Narducci F et al (2019) Biometric data on the edge for secure, smart and user tailored access to cloud services. Future Gen Comput Syst. https://doi.org/10.1016/j.future.2019.06.019
Nixon MS, Aguado AS (2002) Feature extraction and image processing, 1st edn. Newnes, Oxford Auckland Boston Johannesburg Melbourne New Delhi
Prasad PS, Pathak R, Gunjan VK, Ramana Rao HV (2020) Deep learning based representation for face recognition. In: ICCCE 2019. Springer, pp 419–424
Qayyum H, Majid M, Anwar SM, Khan B (2017) Facial Expression Recognition Using Stationary Wavelet Transform Features. Hindawi Math Probl Eng. Article ID 9854050, 9. https://doi.org/10.1155/2017/9854050
Rachapalli DR, Kalluri HK (2019) Multimodal Biometric Template Protection Using Color QR Code. Int J Recent Technol Eng 7(5S4):2277–3878
Rajeev R, Vishal M, Rama C (2019) Hyper Face: a deep multi-task learning framework for face detection, landmark localization, pose estimation, and gender recognition. IEEE Trans Pattern Anal Mach Intell 41(1):121–135l
Rathgeb C, Busch C (2014) Cancelable Multi-Biometrics: Mixing Iris-Codes based on Adaptive Bloom Filters. Comput Secur. https://doi.org/10.1016/j.cose.2013.12.005
Scott II, Willie L (2003) Block-level discrete cosine transform coefficients for autonomic face recognition. LSU Doctoral Dissertations. 4059. https://digitalcommons.lsu.edu/gradschool_dissertations/4059
Trivedi AK, Thounaojam DM, Pal S (2019) Non-Invertible Cancellable Fingerprint Template for Fingerprint Biometric. Comput Secur. https://doi.org/10.1016/j.cose.2019.101690
Tsafack N, Sankar S, Abd-El-Atty B, Kengne J, KC J, Belazi A, Mehmood I, Bashir AK, Oh-Youngsong, Abd El-Latif AA (2020) A new chaotic map with dynamic analysis and encryption application in internet of health things. IEEE Access 8:137731–137744. https://doi.org/10.1109/ACCESS.2020.3010794
Umer S, Dhara BC, Chanda B (2017) A novel cancelable iris recognition system based on feature learning techniques. Inf Sci 406–407:102–118
Wang S, Hu J (2016) A blind system identification approach to cancelable fingerprint templates. Pattern Recogn 54:14–22
Wu X, Wang K, Zhang D. A Cryptosystem based on Palmprint Feature, 19th International Conference on Pattern Recognition (ICPR), December 8–11, 2008, Tampa, Florida, USA. https://doi.org/10.1109/ICPR.2008.4761117 Source: DBLP
Yang W, Wang S, Hu J, Zheng G, Valli C (2019) Security and accuracy of fingerprint-based biometrics: A review. Symmetry 11(141). https://doi.org/10.3390/sym11020141
Yang W, Wang S, Hu J, Zheng G, Valli C (2018) A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recogn 78:242–251
Zhou K, Ren J, Passbio A (2018) Privacy-preserving user-centric biometric authentication. IEEE Trans Inf Forensics Secur 13:3050–3063
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ashiba, M.I., Youness, H.A. & Ashiba, H.I. Proposed homomorphic DWT for cancelable palmprint recognition technique. Multimed Tools Appl 83, 9479–9502 (2024). https://doi.org/10.1007/s11042-023-15710-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15710-5