Skip to main content
Log in

Proposed homomorphic DWT for cancelable palmprint recognition technique

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper suggests novel cancellable biometric realization approach recognition and template protection. In this paper, the Homomorphic Filtering Masking (HFM) encoding algorithm is utilized for cancelable palmprint recognition system. In the suggested technique, the Discreet Wavelet Transform (DWT) algorithm is applied on the palmprint. Then the DWT divides the image into four sub images. The resultant map is encrypted with the HFM algorithm, in order to the second HFM utilized in produced from the palmprint. This approach can be used to develop a frequency domain procedure for making this system for biometric template protection. The obtained results prove that the suggested technique is the best from the other algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availability

The data that supports the findings of this study are available within the article.

References

  1. Akdogan D, Altop DK, Eskandarian L, Levi A (2018) Secure key agreement protocols: Pure biometrics and cancelable biometrics. Comput Netw. https://doi.org/10.1016/j.comnet.2018.06.001

    Article  Google Scholar 

  2. Ashiba HI (2020) Cepstrum adaptive plateau histogram for dark IR night vision images enhancement. Multimed Tools Appl 79:2543–2554

    Article  Google Scholar 

  3. Ashiba HI, Awadallah KH, El-Halfawy SM, Abd El-Samie FE (2008) Homomorphic enhancement of infrared images using the additive wavelet transform. Prog Electromagn Res C 1:123–130

    Article  Google Scholar 

  4. Ashiba HI, Mansour HM, Ahmed HM, El-Kordy MF, Dessouky MI, Zahran O, El-Samie FEA (2019) Enhancement of IR images using histogram processing and the Undecimated additive wavelet transform. Multimed Tools Appl 78(9):11277–11290

    Article  Google Scholar 

  5. Brindha VE, Natarajan AM (2012) Multi-modal biometric template security: Fingerprint and palmprint based fuzzy vault. J Biomet Biostat 3(6):1–6

    Article  Google Scholar 

  6. Dabbaghchian S, Ghaemmaghami MP, Aghagolzadeh A (2010) Feature extraction using discrete cosine transform and discrimination power analysis with a face recognition technology. Pattern Recogn 43:1431–1440

    Article  Google Scholar 

  7. Didiot E, Illina I, Fohr D, Mella O (2010) A wavelet-based parameterization for speech/Music discrimination. Comput Speech Lang, Elsevier 24(2):341. https://doi.org/10.1016/j.csl.2009.05.003 hal-00608922

  8. Düzenli T, Özkurt N (2011) Comparison of Wavelet Based Feature Extraction Methods for Speech/Music Discrimination. Istanbul University - J Electr Electron Eng 11(1):1355–1362

    Google Scholar 

  9. Dwivedi R, Dey S (2018) Score-level fusion for cancelable multi- biometric veriÞcation. Pattern Recogn Lett. https://doi.org/10.1016/j.patrec.2018.04.022

    Article  Google Scholar 

  10. Feng YC, Yuen PC, Jain AK (2010) A hybrid approach for generating secure and discriminating face template. IEEE Transactions on Information Forensics and Security 5(1)

  11. Ghoneim A, Muhammad G, Amin SU, Gupta B (2018) Medical Image Forgery Detection for Smart Healthcare. IEEE Commun Mag 56(4):33–37. https://doi.org/10.1109/MCOM.2018.1700817

    Article  Google Scholar 

  12. Hwang CM (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33:1–5

    Article  Google Scholar 

  13. Kant Tyagi S, Khanna P (2012) Face recognition using discrete cosine transform and nearest neighbor discriminant analysis. IACSIT International Journal of Engineering and Technology 4(3):311–314. https://doi.org/10.7763/IJET.2012.V4.372

    Article  Google Scholar 

  14. Kho JB, Kim J, Kim I, Teoh ABJ (2019) Cancelable fingerprint template design with randomized non-negative least squares. Pattern Recogn 91:245–260

    Article  Google Scholar 

  15. Kong WK, Zhang D, Jain AK (2004) Feature -level fusion for effective palmprint authentication. ICBA. LNCS. 3072:520–523, Springer, Heidelberg

  16. Kumar A (2008) Incorporating cohort information for reliable palmprint authentication, Sixth Indian Conference on Computer Vision, Graphics & Image Processing. https://doi.org/10.1109/ICVGIP.2008.73

  17. Leng L, Jin Teoh AB, Li M, Khan MK (2014) Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition. Neuroomputing 131:377–387

    Article  Google Scholar 

  18. Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76:333–354. https://doi.org/10.1007/s11042-015-3058-7

    Article  Google Scholar 

  19. Leng L, Teoh ABJ (2015) Alignment-free row-co-occurrence cancelable palmprint Fuzzy Vault. Pattern Recognit 48(7):2290–2303. https://doi.org/10.1016/j.patcog.2015.01.021

    Article  Google Scholar 

  20. Leng L, Teoh ABJ, Li M (2017) Simplified 2DPalmHash code for secure palmprint verification. Multimed Tools Appl 76:8373–8398. https://doi.org/10.1007/s11042-016-3458-3

    Article  Google Scholar 

  21. Leng L, Teoh ABJ, Li M, Khan MK (2014) A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional Palm Phasor-fusion. Security Comm Netw 7:1860–1871

    Article  Google Scholar 

  22. Leng L, Teoh ABJ, Li M, Khan MK (2015) Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code. Multimed Tools Appl 74:11683–11701. https://doi.org/10.1007/s11042-014-2255-0

    Article  Google Scholar 

  23. Leng Lu, Zhang J (2011) Dual-key- binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34:1979–1989

    Article  Google Scholar 

  24. Leng L, Zhang JS, Khan MK, Bi X, Ji M (2010) Cancelable Palm Code generated from randomized Gabor Filters for palmprint protection, 25th International Conference of Image and Vision Computing New Zealand, Queenstown, pp 1–6. https://doi.org/10.1109/IVCNZ.2010.6148818.

  25. Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554

    Google Scholar 

  26. Li H, Qiu J, Teoh ABJ (2020) Palmprint template protection scheme basedon randomized cuckoo hashing and MinHash. Multimed Tools Appl 79:11947–11971. https://doi.org/10.1007/s11042-019-08446-8

    Article  Google Scholar 

  27. Maiorana E (2010) Biometric cryptosystem using function based on-line signature recognition. Expert Syst Appl 37(4):3454–3461

    Article  Google Scholar 

  28. Matsuyama E, Tsai D, Lee Y, Tsurumaki M, Takahashi N, Watanabe H, Chen H (2013) A modified Undecimated Discrete Wavelet Transform Based Approach to Mammographic Image Denoising. J Digit Imaging 26:748–758. https://doi.org/10.1007/s10278-012-9555-6

    Article  Google Scholar 

  29. Morchen F (2003) Time series feature extraction for data mining using DWT and DFT, Data Bionics, Philipps-University Marburg, Hans-Meerwein-Strasse. 35032 Marburg, Germany, No. 5

  30. Narducci F et al (2019) Biometric data on the edge for secure, smart and user tailored access to cloud services. Future Gen Comput Syst. https://doi.org/10.1016/j.future.2019.06.019

  31. Nixon MS, Aguado AS (2002) Feature extraction and image processing, 1st edn. Newnes, Oxford Auckland Boston Johannesburg Melbourne New Delhi

  32. Prasad PS, Pathak R, Gunjan VK, Ramana Rao HV (2020) Deep learning based representation for face recognition. In: ICCCE 2019. Springer, pp 419–424

  33. Qayyum H, Majid M, Anwar SM, Khan B (2017) Facial Expression Recognition Using Stationary Wavelet Transform Features. Hindawi Math Probl Eng. Article ID 9854050, 9. https://doi.org/10.1155/2017/9854050

  34. Rachapalli DR, Kalluri HK (2019) Multimodal Biometric Template Protection Using Color QR Code. Int J Recent Technol Eng 7(5S4):2277–3878

    Google Scholar 

  35. Rajeev R, Vishal M, Rama C (2019) Hyper Face: a deep multi-task learning framework for face detection, landmark localization, pose estimation, and gender recognition. IEEE Trans Pattern Anal Mach Intell 41(1):121–135l

    Article  Google Scholar 

  36. Rathgeb C, Busch C (2014) Cancelable Multi-Biometrics: Mixing Iris-Codes based on Adaptive Bloom Filters. Comput Secur. https://doi.org/10.1016/j.cose.2013.12.005

    Article  Google Scholar 

  37. Scott II, Willie L (2003) Block-level discrete cosine transform coefficients for autonomic face recognition. LSU Doctoral Dissertations. 4059. https://digitalcommons.lsu.edu/gradschool_dissertations/4059

  38. Trivedi AK, Thounaojam DM, Pal S (2019) Non-Invertible Cancellable Fingerprint Template for Fingerprint Biometric. Comput Secur. https://doi.org/10.1016/j.cose.2019.101690

  39. Tsafack N, Sankar S, Abd-El-Atty B, Kengne J, KC J, Belazi A, Mehmood I, Bashir AK, Oh-Youngsong, Abd El-Latif AA (2020) A new chaotic map with dynamic analysis and encryption application in internet of health things. IEEE Access 8:137731–137744. https://doi.org/10.1109/ACCESS.2020.3010794

    Article  Google Scholar 

  40. Umer S, Dhara BC, Chanda B (2017) A novel cancelable iris recognition system based on feature learning techniques. Inf Sci 406–407:102–118

    Article  Google Scholar 

  41. Wang S, Hu J (2016) A blind system identification approach to cancelable fingerprint templates. Pattern Recogn 54:14–22

    Article  Google Scholar 

  42. Wu X, Wang K, Zhang D. A Cryptosystem based on Palmprint Feature, 19th International Conference on Pattern Recognition (ICPR), December 8–11, 2008, Tampa, Florida, USA. https://doi.org/10.1109/ICPR.2008.4761117 Source: DBLP

  43. Yang W, Wang S, Hu J, Zheng G, Valli C (2019) Security and accuracy of fingerprint-based biometrics: A review. Symmetry 11(141). https://doi.org/10.3390/sym11020141

  44. Yang W, Wang S, Hu J, Zheng G, Valli C (2018) A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recogn 78:242–251

    Article  Google Scholar 

  45. Zhou K, Ren J, Passbio A (2018) Privacy-preserving user-centric biometric authentication. IEEE Trans Inf Forensics Secur 13:3050–3063

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed I. Ashiba.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ashiba, M.I., Youness, H.A. & Ashiba, H.I. Proposed homomorphic DWT for cancelable palmprint recognition technique. Multimed Tools Appl 83, 9479–9502 (2024). https://doi.org/10.1007/s11042-023-15710-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15710-5

Keywords

Navigation