Skip to main content
Log in

Privacy-preserving and tokenless chaotic revocable face authentication scheme

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

With the large-scale proliferation of biometric systems, privacy and irrevocability issues of their data have become a hot research issue. Recently, some researchers proposed a couple of schemes to generate BioHash, e.g. PalmHash, however, in this paper, we point out that the previous schemes are costly in terms of computational complexity and possession of USB tokens to generate pseudorandom numbers. To overcome the problems, we propose a novel chaotic FaceHashing scheme which preserves privacy of a biometric user. The presented scheme does not need users to posses USB tokens in generating pseudorandom sequences, which is a cost-effective solution. Besides, our scheme minimizes the system complexity with simple operations to attain the FaceHash. Experimental results show that the proposed scheme is efficient, secure, and revocable in case FaceHash is theft or compromised.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14, 4–20.

    Article  Google Scholar 

  2. Connie, T., Teoh, T., Goh, M., & Ngo, D. (2004). PalmHashing: a novel approach for dual-factor authentication. Pattern Analysis Applications, 7, 255–268.

    Google Scholar 

  3. Connie, T., Teoh, T., Goh, M., & Ngo, D. (2005). PalmHashing: a novel approach to cancelable biometrics. Information Processing Letters, 93, 1–5.

    Article  Google Scholar 

  4. Jin, A.T.B, Ling, D.N.C., & Goh, M. (2004). BioHashing: two factor authentication featuring fingerprint data and tokenized random number. Pattern Recognition, 37, 2245–2255.

    Article  Google Scholar 

  5. Jin, A.T.B, Ling, D.N.C. (2005). Cancellable biometrics featuring with tokenised random number. Pattern Recognition Letters, 26, 1454–1460.

    Article  Google Scholar 

  6. Maio, D., & Nanni, L. (2005). MultiHashing human authentication featuring biometrics data and tokenised random number: a case study FVC2004. Neurocomputing, 69, 242–249.

    Article  Google Scholar 

  7. Nanni, L., & Lumini, A. (2006). Human, authentication featuring signatures and tokenized random numbers. Neurocomputing, 69, 858–861.

    Article  Google Scholar 

  8. David, N. C. L., Andrew, T. B. J., & Alwyn, G. (2006). Biometric hash: high confidence face recognition. IEEE Transactions on Circuits and Systems for Video Technology, 16, 771–775.

    Article  Google Scholar 

  9. ORL (1992). The ORL face database. at the AT&T (Olivetti) Research Laboratory. Available online: http://www.uk.research.att.com/facedatabase.html.

  10. Turk, M. A. (1991). Eignefaces for recognition. Journal of Cognitive Neuroscience, 3, 71–86.

    Article  Google Scholar 

  11. Martinez, A. M., & Kak, A. C. (2001). PCA versus LDA. IEEE Transactions on Pattern Analysis and Machine Intelligence, 23, 228–233.

    Article  Google Scholar 

  12. Nara, Y., Ran, J., & Suematsu, Y. (2004). Face recognition using improved principal component analysis. In IEEE int. symposium on micrometaronics and human science (pp. 77–82).

  13. Kohda, T., & Fujisaki, T. (2001). Jacobian elliptic Chebyshev rational maps. Physics D, 148, 242–254.

    Article  Google Scholar 

  14. Khan, M.K, Zhang, J., & Lei, T. (2007). Chaotic secure content-based hidden transmission of biometrics templates. Chaos, Solitons, and Fractals, 32, 1749–1759.

    Article  Google Scholar 

  15. Xiao, D., Xiaofeng, L., & Shaojiang, D. (2005). One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons and Fractals, 24, 65–71.

    Google Scholar 

  16. Erzin, E., Yemez, Y., & Tekalp, A. M. (2006). Multimodal person recognition for human-vehicle interaction. IEEE Multimedia, 18-31.

  17. Adams, K., Cheung, K.H., Zhang, D., Mohamed, K., & Jane, Y. (2006). An analysis of BioHashing and its invariants. Pattern Recognition, 39, 1359–1968.

    Article  Google Scholar 

  18. Khan, M.K, Zhang, J. (2008). Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons and Fractals, 35, 519–524.

    Article  Google Scholar 

  19. Kia, F., Reza, R., & Hossein, K. (2008). An application of Chen system for secure chaotic communication based on extended Kalman filter and multi-shift cipher algorithm. Communications in Nonlinear Science and Numerical Simulation, 13, 763–781.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Khurram Khan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Khan, M.K., Alghathbar, K. & Zhang, J. Privacy-preserving and tokenless chaotic revocable face authentication scheme. Telecommun Syst 47, 227–234 (2011). https://doi.org/10.1007/s11235-010-9314-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-010-9314-2

Keywords

Navigation