Skip to main content
Log in

Efficient chaotic-Baker-map-based cancelable face recognition

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Biometric recognition schemes are commonly utilized for security purposes. These schemes face two major challenges: security challenge and reliance on a particular biometric for authentication. The protection challenge comes from the use of basic biometrics in records. Therefore, if these records are compromised, the biometrics will no longer be valid. Consequently, it is necessary to preserve basic biometrics by protecting them from being used in biometric records. Cancelable biometric recognition systems rely on changing the information or biometric features to different formats, so that persons can use their specific biometric models in single or multiple systems. The mixture of chaos theory and cryptography shapes a crucial area for information security. The newest development in encryption systems is chaos-based for various distinctive attributes such as sensitivity to preliminary conditions, non-convergence, non-periodicity, and control parameters. This paper introduces a method to produce numerous encrypted biometric templates that are re-created by various convolution kernels generated from employing chaotic Baker map in different domains. Our proposed method has superior performance in treating variations in illumination, occlusion and facial expressions. It also has the added novelty of being able to perform authentication in the encrypted domain. In addition, the same approach can be applied on different databases. The chaotic map effect in different domains is evaluated on the widely-used AT&T, YALE, UFI, LFW, and FERET databases. The cancelable biometric system using the proposed Discrete Wavelet Transform (DWT) domain encryption with various keys has the best performance among all other implementations. In average, we achieved a 2% error probability, a 0.3 s authentication time, a 0.02% False Rejection Rate (FRR), a 0% False Acceptance Rate (FAR), a 0.0% Equal Error Rate (EER) and a 98.43% accuracy. Our proposed method also provides template diversity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35
Fig. 36
Fig. 37
Fig. 38
Fig. 39
Fig. 40
Fig. 41
Fig. 42
Fig. 43
Fig. 44
Fig. 45
Fig. 46
Fig. 47
Fig. 48
Fig. 49
Fig. 50
Fig. 51
Fig. 52
Fig. 53
Fig. 54
Fig. 55
Fig. 56
Fig. 57
Fig. 58
Fig. 59
Fig. 60
Fig. 61
Fig. 62
Fig. 63
Fig. 64
Fig. 65
Fig. 66
Fig. 67
Fig. 68
Fig. 69
Fig. 70
Fig. 71
Fig. 72
Fig. 73
Fig. 74
Fig. 75
Fig. 76
Fig. 77
Fig. 78
Fig. 79
Fig. 80
Fig. 81
Fig. 82
Fig. 83
Fig. 84
Fig. 85
Fig. 86
Fig. 87
Fig. 88
Fig. 89
Fig. 90
Fig. 91
Fig. 92
Fig. 93
Fig. 94
Fig. 95
Fig. 96
Fig. 97
Fig. 98
Fig. 99
Fig. 100
Fig. 101
Fig. 102
Fig. 103
Fig. 104
Fig. 105
Fig. 106
Fig. 107
Fig. 108
Fig. 109
Fig. 110
Fig. 111
Fig. 112
Fig. 113
Fig. 114
Fig. 115

Similar content being viewed by others

References

  • Abuzneid MA, Mahmood A (2018) Enhanced human face recognition using LBPH descriptor, multi-KNN, and BPNN. IEEE Access 6:20641–20651

    Google Scholar 

  • Ali M, Tahir N (2018) Cancelable biometrics technique for iris recognition. In: IEEE symposium on computer applications and industrial electronics (ISCAIE), pp 434–437

  • Ao M, Li S (2009) Near infrared face based biometric key binding. In: International conference on biometrics, Springer, Berlin, Heidelberg, pp 376–385

  • Arigbabu OA et al (2016) Smile detection using hybrid face representation. J Ambient Intell Humaniz Comput 7:1–12

    Google Scholar 

  • Cheung K, Kong A, You J, Zhang D (2005) An analysis on invertibility of cancelable biometrics based on biohashing. In: IEEE CISST, pp 40–45

  • Connie T, Teoh A, Goh M, Ngo D (2005) Palmhashing: a novel approach for cancelable biometrics. Inf Process Lett 93(1):1–5

    MathSciNet  Google Scholar 

  • Technical Document About FAR, FRR and ERR (2004) Version 1.0. © 2004 by SYRIS Technology Corporation

  • Dong Y, Su H, Wu B, Li Z, Liu W et al. (2019) Efficient decision-based black-box adversarial attacks on face recognition. In: The IEEE conference on computer vision and pattern recognition (CVPR)

  • Enerstvedt O (2017) Analysis of privacy and data protection principles. In: Enerstvedt OM (ed) Aviation security, privacy, data protection and other human rights: technologies and legal principles. Springer, Cham, pp 307–394

    Google Scholar 

  • Feng Y, Yuen P, Jain A (2010a) A hybrid approach for generating secure and discriminating face template. IEEE Trans Inf Forensics Secur 5(1):103–117

    Google Scholar 

  • Gaddam S, Lal M (2010) Efficient cancelable biometric key generation scheme for cryptography. IJ Netw Secur 11(2):61–69

    Google Scholar 

  • Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2):393–399

    MATH  Google Scholar 

  • Gowthami A, Mamatha H (2015) Fingerprint recognition using zone based linear binary patterns. Proc Comput Sci 58:552–557

    Google Scholar 

  • Grassi M, Faundez M (2009) Protecting DCT templates for a face verification system by means of pseudo-random permutations. In: International work-conference on artificial neural networks, Springer, Berlin, Heidelberg, pp 1216–1223

  • Guan Z, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1–3):153–157

    MATH  Google Scholar 

  • He W, Wang E, Xiong T (2013) Intelligent face recognition based on manifold learning and genetic-chaos algorithm optimized Kernel extreme learning machine. J Commun 8(10):658–664

    Google Scholar 

  • Huang F, Qu X (2011) Design of image security system based on chaotic maps group. J Multimed 6(6):510

    Google Scholar 

  • Huh J (2017) PLC-based design of monitoring system for ICT-integrated vertical fish farm. HCIS 7(1):20

    Google Scholar 

  • Huh J (2018) Big data analysis for personalized health activities: machine learning processing for automatic keyword extraction approach. Symmetry 10(4):93

    Google Scholar 

  • Jain A, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20

    Google Scholar 

  • Jain A, Bolle R, Pankanti S (2006) Biometrics: personal identification in networked society. Springer, Berlin, p 479

    Google Scholar 

  • Jegede A, Udzir N, Abdullah A, Mahmod R (2017) Cancelable and hybrid biometric cryptosystems: current directions and open research issues. Int J Adv Appl Sci 4:65–77

    Google Scholar 

  • Jeong M, Teoh A (2010) Cancellable face biometrics system by combining independent component analysis coefficients. In: International workshop on computational forensics, Springer, Berlin, Heidelberg, pp 78–87

  • Jiang R, Al-Maadeed S, Bouridane A, Crookes D, Celebi M (2016) Face recognition in the scrambled domain via salience-aware ensembles of many kernels. IEEE Trans Inf Forensics Secur 11(8):1807–1817

    Google Scholar 

  • Jianjun Wu, Sun X, Wang Z (2019) Shearlet feature manifold for face recognition. J Ambient Intell Humaniz Comput 10(9):3453–3460

    Google Scholar 

  • Jin X, Liu Y, Li X, Zhao G, Chen Y, Guo K (2015) Privacy preserving face identification in the cloud through sparse representation. In: Chinese conference on biometric recognition, Springer, Cham, pp 160–167

  • Jin Z, Teoh A, Goi B, Tay Y (2016) Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn 1(56):50–62

    Google Scholar 

  • Jung S, Huh J (2019) A novel on transmission line tower big data analysis model using altered K-means and ADQL. Sustainability 11(13):3499

    Google Scholar 

  • Kamencay P et al (2017) A new method for face recognition using convolutional neural network. Digit Image Process Comput Graph 15(4):663–672

    Google Scholar 

  • Kaur H, Khanna P (2015) Gaussian random projection based non-invertible cancelable biometric templates. Proc Comput Sci 1(54):661–670

    Google Scholar 

  • Khan M, Zhang J, Wang X (2008) Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 35(3):519–524

    Google Scholar 

  • Khan M, Xie L, Zhang J (2010) Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals. Digit Signal Process 20(1):179–190

    Google Scholar 

  • Kim Y, Toh K (2007) A method to enhance face biometric security. In: First IEEE international conference on biometrics: theory, applications, and systems, pp 1–6

  • Le Q, Ngiam J, Coates A, Lahiri A, Prochnow B, Ng A (2011) On optimization methods for deep learning. In: Proceedings of the 28th international conference on international conference on machine learning, Omnipress, pp 265–272

  • Lingli Z, Jianghuang L (2010) Security algorithm of face recognition based on local binary pattern and random projection. In: Cognitive informatics (ICCI), vol 9, IEEE, pp 733–738

  • Liu H et al. (2019) AdaptiveFace: adaptive margin and sampling for face recognition. In: IEEE conference on computer vision and pattern recognition, pp 11947–11956

  • Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):1–32

    Google Scholar 

  • Lumini A, Nanni L (2007) An improved biohashing for human authentication. Pattern Recogn 40(3):1057–1065

    MATH  Google Scholar 

  • Ma Y, Wu L, Gu X, He J, Yang Z (2017) A secure face-verification scheme based on homomorphic encryption and deep neural networks. IEEE Access 5:16532–16538

    Google Scholar 

  • Manzoor S, Selwal A (2018) An analysis of biometric based security systems. In: IEEE Fifth international conference on parallel, distributed and grid computing (PDGC), pp 306–311

  • Mohammadzade H et al (2018) Pixel-level alignment of facial images for high accuracy recognition using ensemble of patches. J Opt Soc Am A 35(7):1149–1159

    Google Scholar 

  • Moujahdi C, Ghouzali S, Mikram M, Rziza M, Bebis G (2012) Spiral cube for biometric template protection. In: International conference on image and signal processing, Springer, Berlin, Heidelberg, pp 235–244

  • Nandakumar K, Jain A (2015) Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process Mag 32(5):88–100

    Google Scholar 

  • Nazari S, Moin MS, Kanan HR (2014) Cancelable face using chaos permutation. In: International symposium on telecommunications (IST), vol 7, IEEE, pp 925–928

  • Oloyede MO et al (2018) Improving face recognition systems using a new image enhancement technique, hybrid features and the convolutional neural network. IEEE Access 6:75181–75191

    Google Scholar 

  • Osadchy M, Pinkas B, Jarrous A, Moskovich B (2010) Scifi-a system for secure face identification. In: IEEE symposium on security and privacy, pp 239–254

  • Patel V, Ratha N, Chellappa R (2015a) Cancelable biometrics: a review. IEEE Signal Process Mag 32(5):54–65

    Google Scholar 

  • Połap D (2018) Model of identity verification support system based on voice and image samples. J Univ Comput Sci 24(4):460–474

    MathSciNet  Google Scholar 

  • Połap D, Woźniak M et al (2019) Bio-inspired voice evaluation mechanism. Appl Soft Comput 80:342–357

    Google Scholar 

  • Qiu J, Li H, Dong J (2018) Design of cancelable palmprint templates based on look up table. IOP Conf Ser Mater Sci Eng IOP Publ 322(5):50–52

    Google Scholar 

  • Rachapalli D, Kalluri H (2017) A survey on biometrie template protection using cancelable biometric scheme. In: IEEE second international conference on electrical, computer and communication technologies (ICECCT), pp 1–4

  • Rajpoot Q, Jensen C (2014) Security and privacy in video surveillance: requirements and challenges. In: International information security conference, Springer, Berlin, Heidelberg (IFIP), pp 169–184

  • Ratha N, Connell J, Bolle R (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634

    Google Scholar 

  • Ratha N, Chikkerur S, Connell J, Bolle R (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561–572

    Google Scholar 

  • Rathgeb C, Busch C (2012) Multi-biometric template protection: issues and challenges. New Trends and Developments in Biometrics, pp 173–190

  • Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 1:3

    Google Scholar 

  • Rathgeb C, Gomez M, Busch C, Galbally J, Fierrez J (2015) Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris. In: 3rd IEEE international workshop on biometrics and forensics (IWBF), pp 1–6

  • Ross A, Nandakumar K, Jain A (2008) Introduction to multibiometrics. Handbook of biometrics. Springer, pp 271–292

    Google Scholar 

  • Sandhya M, Prasad M (2017) Cancelable fingerprint cryptosystem using multiple spiral curves and fuzzy commitment scheme. Int J Pattern Recognit Artif Intell 31(04):1756004

    Google Scholar 

  • Savvides M, Kumar B, Khosla P (2004) Cancelable biometric filters for face recognition. In: IEEE Proceedings of the 17th international conference on pattern recognition (ICPR), pp 922–925

  • Schmidhuber J (2015) Deep learning in neural networks: an overview. Neural Netw 61:85–117

    Google Scholar 

  • Sinha A, Singh K (2005) Image encryption by using fractional Fourier transform and jigsaw transform in image bit planes. Opt Eng 44(5):057001

    Google Scholar 

  • Sinha A, Singh K (2013) Image encryption using fractional Fourier transform and 3D Jigsaw transform. Opt Eng 9:158–166

    Google Scholar 

  • Soliman R, Ramadan N, Amin M, Ahmed H, El-Khamy S, El-Samie F (2018a) Efficient cancelable iris recognition scheme based on modified logistic map. In: Proceedings of the National Academy of Sciences, India Section A: physical sciences, pp 1–7

  • Soliman R, El Banby G, Algarni A, Elsheikh M, Soliman N, Amin M, El-Samie F (2018b) Double random phase encoding for cancelable face and iris recognition. Appl Opt 57(35):10305–10316

    Google Scholar 

  • Soliman R, Amin M, El-Samie F (2018c) A double random phase encoding approach for cancelable iris recognition. Opt Quant Electron 50(8):326

    Google Scholar 

  • Soliman R, Amin M, El-Samie F (2019) A modified cancelable biometrics scheme using random projection. Ann Data Sci 6(2):223–236

    Google Scholar 

  • Souza D, Burlamaqui A, Souza F (2018) Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps. Multimed Tools Appl 77(2):2013–2032

    Google Scholar 

  • Sree S, Radha N (2016) Cancellable multimodal biometric user authentication system with fuzzy vault. In: IEEE international conference on computer communication and informatics (ICCCI), pp 1–6

  • Syafeeza R et al (2014) Convolutional neural network for face recognition with pose and illumination variation. Int J Eng Technol 6:44–57

    Google Scholar 

  • Tarif E, Wibowo S, Wasimi S, Tareef A (2018) A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system. Multimed Tools Appl 77(2):2485–2503

    Google Scholar 

  • Teoh A, Goh A, Ngo D (2006) Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28(12):1892–1901

    Google Scholar 

  • Tong X, Cui M (2008) A novel image encryption scheme based on feedback and 3D Baker. In: IEEE 4th international conference on wireless communications, networking and mobile computing, pp 1–4

  • Vezzetti E, Marcolin F (2014) 3D Landmarking in multiexpression face analysis: a preliminary study on eyebrows and mouth. Aesthetic Plast Surg 38(4):796–811

    Google Scholar 

  • Vezzetti E, Marcolin F, Stola V (2013) 3D human face soft tissues landmarking method: an advanced approach. Comput Ind 64(9):1326–1354

    Google Scholar 

  • Wu L, Yuan S (2010) A face based fuzzy vault scheme for secure online authentication. In: ieee second international symposium on data, privacy, and e-commerce, pp 45–49

  • Xiaodong L, Qing H, Xin J (2019) A secure and efficient face-recognition scheme based on deep neural network and homomorphic encryption. In: IEEE international conference on virtual reality and visualization (ICVRV), pp 1–8

  • Zheng X (2017) The application of information security encryption technology in military data system management. In: International conference on man-machine-environment system engineering, Springer, Singapore, pp 423–428

Download references

Acknowledgements

The authors would like to thank the Deanship of Scientific Research, Taif University Researchers Supporting Project number (TURSP-2020/08), Taif University, Taif, Saudi Arabia for supporting this research work.

Funding

This study was funded by the Deanship of Scientific Research, Taif University Researchers Supporting Project number (TURSP-2020/08), Taif University, Taif, Saudi Arabia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ensherah A. Naeem.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Faragallah, O.S., Naeem, E.A., El-Shafai, W. et al. Efficient chaotic-Baker-map-based cancelable face recognition. J Ambient Intell Human Comput 14, 1837–1875 (2023). https://doi.org/10.1007/s12652-021-03398-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-03398-0

Keywords

Navigation