Skip to main content
Log in

Multi-instance cancellable biometrics schemes based on generative adversarial network

  • Original Submission
  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

The main role of cancellable biometric schemes is to protect the privacy of the enrolled users. The protected biometric data are generated by applying a parametrized transformation function to the original biometric data. Although cancellable biometric schemes achieve high security levels, they may degrade the recognition accuracy. One of the mostwidely used approaches to enhance the recognition accuracy in biometric systems is to combine several instances of the same biometric modality. In this paper, two multi-instance cancellable biometric schemes based on iris traits are presented. The iris biometric trait is used in both schemes because of the reliability and stability of iris traits compared to the other biometric traits. A generative adversarial network (GAN) is used as a transformation function for the biometric features. The first scheme is based on a pre-transformation feature-level fusion, where the binary features of multiple instances are concatenated and inputted to the transformation phase. On the other hand, the second scheme is based on a post-transformation feature-level fusion, where each instance is separately inputted to the transformation phase. Experiments conducted on the CASIA Iris-V3-Internal database confirm the high recognition accuracy of the two proposed schemes. Moreover, the security of the proposed schemes is analyzed, and their robustness against two well-known types of attacks is proven.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Tech 14:4–20. https://doi.org/10.1109/TCSVT.2003.818349

  2. Bharadi VA, et al. (2018) Multi-instance Iris Recognition, The 4th. IntConf. on Comput. Communication Control and Automation (ICCUBEA), pp 1–6. https://doi.org/10.1109/ICCUBEA.2018.8697811

  3. Khan MK, Zhang J (2018) Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 71:3026–3031. https://doi.org/10.1016/j.neucom.2007.12.017

    Article  Google Scholar 

  4. Bhatnagar G (2015) Wu & q. j. A novel chaos-based secure transmission of biometric data, Neurocomputing 147:444–455. https://doi.org/10.1016/j.neucom.2014.06.040

    Google Scholar 

  5. Nguyen K, et al. (2017) Iris recognition with off-the-shelf CNN features: a deep learning perspective. IEEE Access 6:18848–18855. https://doi.org/10.1109/ACCESS.2017.2784352

    Article  Google Scholar 

  6. Fookes K, et al. (2017) Long range iris recognition: a survey. Pattern Recogn 72:123–143. https://doi.org/10.1016/j.patcog.2017.05.021

    Article  Google Scholar 

  7. Morampudi MK, et al. (2020) Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server. Appl Intell 50:2848–2866. https://doi.org/10.1007/s10489-020-01681-9

    Article  Google Scholar 

  8. Umer S, Dhara BC, Chanda B (2016) Texture code matrix-based multi-instance iris recognition. Pattern Anal Appl 19:283–295. https://doi.org/10.1007/s10044-015-0482-2

    Article  MathSciNet  Google Scholar 

  9. Rathgeb C, Busch C (2012) Multi biometric template protection: Issues and challenges. Trends Dev Biometr:173–190. https://doi.org/10.5772/52152

  10. Yao YF, Jing XY, Wong HS (2007) Face and palmprint feature level fusion for single sample biometrics recognition. Neurocomputing 70:1582–1586. https://doi.org/10.1016/j.neucom.2006.08.009

    Article  Google Scholar 

  11. Jain A. k., Nandakumar K, Nagar A (2008) Biometric template security. URASIP J Adv Signal Process 1:1–17. https://doi.org/10.1155/2008/579416

    Google Scholar 

  12. Rathgeb C, Uhl A (2011) A.survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 3:3–25. https://doi.org/10.1186/1687-417X-2011-3

    Article  Google Scholar 

  13. Soltane M, Messikh L, Zaoui A (2017) A Review Regarding the Biometrics Cryptography Challenging Design and Strategies. Broad Res Artif Intell Neurosci 8:41–64

    Google Scholar 

  14. Tarek M, Ouda O, Hamza T (2016) Robust cancelable biometrics scheme based on neural networks. IET J Biometr 5:220–228. https://doi.org/10.1049/iet-bmt.2015.0045

    Article  Google Scholar 

  15. Alwan HB, Ku-Mahamud KR (2020) Cancellable face biometrics template using alexnet. Springer Int Conf Appl Comput Support Indust Innov Tech 1174:336–348. https://doi.org/10.1007/978-3-030-38752-5_27

  16. Algarni AD, et al. (2020) Efficient implementation of homomorphic and fuzzy transforms in Random-Projection encryption frameworks for cancellable face recognition. Electronics 9. https://doi.org/10.3390/electronics9061046

  17. Wang X, Li H (2019) One-factor cancellable palmprint recognition scheme based on OIOM and minimum signature hash. IEEE Access 7:131338–131354. https://doi.org/10.1109/ACCESS.2019.2938019

    Article  Google Scholar 

  18. Trivedi AK, Thounaojam DM, Pal S (2020) Non-Invertible cancellable fingerprint template for fingerprint biometric. Comput Secur:90. https://doi.org/10.1016/j.cose.2019.101690

  19. Yang W, et al. (2018) A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recognit 78:242–251. https://doi.org/10.1016/j.patcog.2018.01.026

    Article  Google Scholar 

  20. Soliman RF, Amin M, Abd El-Samie FE (2018) A double random phase encoding approach for cancelable iris recognition. Opt Quant Electron:50. https://doi.org/10.1007/s11082-018-1591-0

  21. Kaur H, Khanna P (2018) Random distance method for generating unimodal and multimodal cancelable biometric features. IEEE Trans Inf Forens Secur 14:709–719. https://doi.org/10.1109/TIFS.2018.2855669

    Article  Google Scholar 

  22. Zakaria Y, et al. (2019) Cancelable multi-biometric security system based on double random phase encoding and cepstral analysis. Multimed Tools Appl 78:32333–32355. https://doi.org/10.1007/s11042-019-07824-6

    Article  Google Scholar 

  23. Debiasi L et al (2019) Biometric Template Protection in the Image Domain Using Non-invertible Grey-scale Transforms. IEEE Int Worksh Inf Forens Secur:1–6. https://doi.org/10.1109/WIFS47025.2019.9034984

  24. Creswell A, White T, Dumoulin V, Arulkumaran K, Sengupta B, Bharath A (2018) Generative Adversarial Networks: An Overview. IEEE Signal Process Mag 35:53–65. https://doi.org/10.1109/MSP.2017.2765202

    Article  Google Scholar 

  25. Creswell A, Bharath AA (2018) Inverting the Generator of a Generative Adversarial Network. IEEE Trans Neural Netw Learn Syst 30:1967–1974. https://doi.org/10.1109/TNNLS.2018.2875194

    Article  Google Scholar 

  26. Masek L, Kovesi P (2003) Matlab source code for a biometric identification system based on iris patterns: The School of Computer Science and Software Engineering. The University of Western Australia

  27. Tarek M, Ouda O, Hamza T (2017) Pre-image Resistant Cancelable Biometrics Scheme Using Bidirectional Memory Model. Int J Netw Secur 19:498–506. https://doi.org/10.6633/IJNS.201707.19(4).02

    Google Scholar 

  28. CASIA iris image database. Available at http://www.cbsr.ia.ac.cn/, (accessed 24 Feb 2021)

  29. Morampudi MK, Veldandi S, Prasad MV, Raju U (2020) Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server. Appl Intell 50, 2848–2866. https://doi.org/10.1007/s10489-020-01681-9

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mayada Tarek.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tarek, M., Hamouda, E. & Abohamama, A.S. Multi-instance cancellable biometrics schemes based on generative adversarial network. Appl Intell 52, 501–513 (2022). https://doi.org/10.1007/s10489-021-02401-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-021-02401-7

Keywords

Navigation