Abstract
With the large-scale proliferation of biometric systems, privacy and irrevocability issues of their data have become a hot research issue. Recently, some researchers proposed a couple of schemes to generate BioHash, e.g. PalmHash, however, in this paper, we point out that the previous schemes are costly in terms of computational complexity and possession of USB tokens to generate pseudorandom numbers. To overcome the problems, we propose a novel chaotic FaceHashing scheme which preserves privacy of a biometric user. The presented scheme does not need users to posses USB tokens in generating pseudorandom sequences, which is a cost-effective solution. Besides, our scheme minimizes the system complexity with simple operations to attain the FaceHash. Experimental results show that the proposed scheme is efficient, secure, and revocable in case FaceHash is theft or compromised.
Similar content being viewed by others
References
Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14, 4–20.
Connie, T., Teoh, T., Goh, M., & Ngo, D. (2004). PalmHashing: a novel approach for dual-factor authentication. Pattern Analysis Applications, 7, 255–268.
Connie, T., Teoh, T., Goh, M., & Ngo, D. (2005). PalmHashing: a novel approach to cancelable biometrics. Information Processing Letters, 93, 1–5.
Jin, A.T.B, Ling, D.N.C., & Goh, M. (2004). BioHashing: two factor authentication featuring fingerprint data and tokenized random number. Pattern Recognition, 37, 2245–2255.
Jin, A.T.B, Ling, D.N.C. (2005). Cancellable biometrics featuring with tokenised random number. Pattern Recognition Letters, 26, 1454–1460.
Maio, D., & Nanni, L. (2005). MultiHashing human authentication featuring biometrics data and tokenised random number: a case study FVC2004. Neurocomputing, 69, 242–249.
Nanni, L., & Lumini, A. (2006). Human, authentication featuring signatures and tokenized random numbers. Neurocomputing, 69, 858–861.
David, N. C. L., Andrew, T. B. J., & Alwyn, G. (2006). Biometric hash: high confidence face recognition. IEEE Transactions on Circuits and Systems for Video Technology, 16, 771–775.
ORL (1992). The ORL face database. at the AT&T (Olivetti) Research Laboratory. Available online: http://www.uk.research.att.com/facedatabase.html.
Turk, M. A. (1991). Eignefaces for recognition. Journal of Cognitive Neuroscience, 3, 71–86.
Martinez, A. M., & Kak, A. C. (2001). PCA versus LDA. IEEE Transactions on Pattern Analysis and Machine Intelligence, 23, 228–233.
Nara, Y., Ran, J., & Suematsu, Y. (2004). Face recognition using improved principal component analysis. In IEEE int. symposium on micrometaronics and human science (pp. 77–82).
Kohda, T., & Fujisaki, T. (2001). Jacobian elliptic Chebyshev rational maps. Physics D, 148, 242–254.
Khan, M.K, Zhang, J., & Lei, T. (2007). Chaotic secure content-based hidden transmission of biometrics templates. Chaos, Solitons, and Fractals, 32, 1749–1759.
Xiao, D., Xiaofeng, L., & Shaojiang, D. (2005). One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons and Fractals, 24, 65–71.
Erzin, E., Yemez, Y., & Tekalp, A. M. (2006). Multimodal person recognition for human-vehicle interaction. IEEE Multimedia, 18-31.
Adams, K., Cheung, K.H., Zhang, D., Mohamed, K., & Jane, Y. (2006). An analysis of BioHashing and its invariants. Pattern Recognition, 39, 1359–1968.
Khan, M.K, Zhang, J. (2008). Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons and Fractals, 35, 519–524.
Kia, F., Reza, R., & Hossein, K. (2008). An application of Chen system for secure chaotic communication based on extended Kalman filter and multi-shift cipher algorithm. Communications in Nonlinear Science and Numerical Simulation, 13, 763–781.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Khan, M.K., Alghathbar, K. & Zhang, J. Privacy-preserving and tokenless chaotic revocable face authentication scheme. Telecommun Syst 47, 227–234 (2011). https://doi.org/10.1007/s11235-010-9314-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-010-9314-2