Skip to main content
Log in

Cancellable face template algorithm based on speeded-up robust features and winner-takes-all

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Features such as face, fingerprint, and iris imprints have been used for authentication in biometric system. The toughest feature amongst these is the face. Extracting a region with the most potential face features from an image for biometric identification followed by illumination enhancement is a commonly used method. However, the region of interest extraction followed by illumination enhancement is sensitive to image face feature displacement, skewed image, and bad illumination. This research presents a cancellable face image algorithm built upon the speeded-up robust features method to extract and select features. A speeded-up robust feature approach is utilised for the image’s features extraction, while Winner-Takes-All hashing is utilised for match-seeking. Finally, the features vectors are projected by utilising a random form of binary orthogonal matrice. Experiments were conducted on Yale and ORL datasets which provide grayscale images of sizes 168 × 192 and 112 × 92 pixels, respectively. The execution of the proposed algorithm was measured against several algorithms using equal error rate metric. It is found that the proposed algorithm produced an acceptable performance which indicates that this algorithm can be used in biometric security applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. Only 200 hashed codes were generated for the first two images of each user

References

  1. Alam B, Jin Z, Yap W-S, Goi B-M (2018) An alignment-free cancelable fingerprint template for bio-cryptosystems. J Netw Comput Appl 115(2018):20–32. https://doi.org/10.1016/j.jnca.2018.04.013

    Article  Google Scholar 

  2. Barman S, Chattopadhyay S, Samanta D, Panchal G (2017) A novel secure key-exchange protocol using biometrics of the sender and reciever. Comput Electr Eng 64(2017):65–82. https://doi.org/10.1016/j.compeleceng.2016.11.017

    Article  Google Scholar 

  3. Cambridge University Computer Laboratory http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html

  4. Chee KY, Jin Z, Cai D, Li M, Yap WS, Lai YL (2018) Cancellable speech template via random binary orthogonal matrices projection hashing. Pattern Recogn 76(2018):273–287. https://doi.org/10.1016/j.patcog.2017.10.041

    Article  Google Scholar 

  5. Cherifi F, Hemery B, Giot R, Pasquet M, Rosenberger C (2010). Performance evaluation of behavioral biometric systems, in behavioral biometrics for human identification: intelligent applications. IGI Global Disseminator of Knowledge. https://doi.org/10.4018/978-1-60566-725-6.ch003

  6. Chesada K, Chidchanok L, Peraphon S (2017) High accuracy EEG biometrics identification using ICA and AR model. Journal of Information and Communication Technology 16(2):354–373

    Google Scholar 

  7. Cho S, Teoh AB (2017) Face template protection via random permutation maxout transform. Proceedings of 2017 ACM international conference on biometrics engineering and application, pp 21-27

  8. Dean T, Ruzon MA, Segal M, Shlens J, Vijayanarasimhan S, Yagnik J (2013) Fast, accurate detection of 100000 object classes on a single machine. Proceedings of 2013 IEEE international conference on computer vision and pattern recognition, pp 1812-18121

  9. Ding W, Lin CT, Prasad M (2018) Hierarchical co-evolutionary clustering tree-based rough feature game equilibrium selection and its application in neonatal cerebral cortex MRI. Expert Syst Appl 101(2018):243–257. https://doi.org/10.1016/j.eswa.2018.01.053

    Article  Google Scholar 

  10. Dwivedi R, Dey S, Singh R, Prasad A (2017) A privacy-preserving cancelable iris generation schema using decimal encoding and look-up table mapping. Computers & Security 65(2017):373–386. https://doi.org/10.1016/j.cose.2016.10.004

    Article  Google Scholar 

  11. Favorskaya M, Proskurin A (2015) Image categorization using color G-SURF invariant to light intensity. Procedia Computer Science 60(2015):681–690. https://doi.org/10.1016/j.procs.2015.08.208

    Article  Google Scholar 

  12. Gomez-Barrero M, Maiorana E, Galbally J, Campisi P, Fierrez J (2017) Multi-biometric template protection based on homomorphic encryption. Pattern Recogn 67(2017):149–163. https://doi.org/10.1016/j.patcog.2017.01.024

    Article  Google Scholar 

  13. Gomez-Barrero M, Rathgeb C, Li G, Ramachandra R, Galbally J, Busch C (2018) Multi-biometric template protection based on bloom filters. Information Fusion 42(2018):37–50. https://doi.org/10.1016/j.inffus.2017.10.003

    Article  Google Scholar 

  14. Govindaraju S, Kumar GPR (2016) A novel content based medical image retrieval using SURF features. Indian journals of science and technology 9(20):1–8. https://doi.org/10.17485/ijst/2016/v9i20/89786

    Article  Google Scholar 

  15. Guo S, Xiang T, Li X (2019) Towards efficient privacy-preserving face recognition in the cloud. Signal Process 164(2019):320–328. https://doi.org/10.1016/j.sigpro.2019.06.024

    Article  Google Scholar 

  16. Gupta A, Agrawal RK, Kirar JS, Andreu-Perez J, Ding WP, Lin CT, Prasad M (2018) On the utility of power spectral techniques with feature selection techniques for effective mental task classification in non-invasive BCI. IEEE Trans Syst Man Cybern Syst Hum. https://doi.org/10.1109/TSMC.2019.2917599, 1, 13

  17. Hebbar VAD, Shekhar VS, Murthy KNB, Natarajan S (2015) Two novel detector-descriptor based approaches for face recognition using SIFT and SURF. Procedia Computer Science 70(2015):185–197. https://doi.org/10.1016/j.procs.2015.10.070

    Article  Google Scholar 

  18. Huang L, Chen C, Shen H, He B (2015) Adaptive registration algorithm of color images based on SURF. Measurement 66(2015):118–124. https://doi.org/10.1016/j.measurement.2015.01.011

    Article  Google Scholar 

  19. Imamverdiyev Y, Teoh AB, Kim J (2016) Biometric cryptosystem based on discretized fingerprint texture descriptors. Expert Syst Appl 40(5):1888–1901. https://doi.org/10.1016/j.eswa.2012.10.009

    Article  Google Scholar 

  20. Jin Z, Jin ATB, Goi BM, Tay YH (2016) Biometric cryptosystems: a new biometric key binding and its implementatio for fingerprint minutiae-based representation. Pattern Recogn 56(2016):50–62. https://doi.org/10.1016/j.patcog.2016.02.024

    Article  Google Scholar 

  21. Kang T-K, Choi I-H, Lim M-T (2014) MDGHM-SURF: a robust local image descriptor based on modified discrete Gaussian-Hermite moment. Pattern Recogn 48(3):670–684. https://doi.org/10.1016/j.patcog.2014.06.022

    Article  Google Scholar 

  22. Kashif M, Deserno TM, Haak D, Jonas S (2016) Feature description with SIFT, SURF, BRIEF, BRISK, or FREAK? Ageneral question answered for bone age assessment. Comput Biol Med 68(2016):67–75. https://doi.org/10.1016/j.compbiomed.2015.11.006

    Article  Google Scholar 

  23. Kaur H, Khanna P (2015) Gaussian random projection based non-invertible cancelable biometric templates. Procedia Computer Science 54(2015):661–670. https://doi.org/10.1016/j.procs.2015.06.077

    Article  Google Scholar 

  24. Kaur H, Khanna P (2017) Non-invertible biometric encryption to generate cancelable biometric templates. Proceedings of 2017 world congress on engineering and computer science, pp 432-435

  25. Kaur H, Khanna P (2019) Random slope method for generation of cancelable biometric features. Pattern Recogn Lett 126(2019):31–40. https://doi.org/10.1016/j.patrec.2018.02.016

    Article  Google Scholar 

  26. Kaur H, Khanna P (2020) Privacy preserving remote multi-server biometric authentication using cancellable biometrics and secret sharing. Futur Gener Comput Syst 102(2020):30–41. https://doi.org/10.1016/j.future.2019.07.023

    Article  Google Scholar 

  27. Kausar F (2020) Cancelable face template protection using transform features for cyber world security. International Journal of Advanced Computer Science and Applications (IJACSA) 11(1):333–341

    MathSciNet  Google Scholar 

  28. Li DL, Prasad M, Lin CT, Chang JY (2016) Self-adjusting feature maps network and its applications. Neurocomputing 207(2016):78–94. https://doi.org/10.1016/j.neucom.2016.03.067

    Article  Google Scholar 

  29. Li Y, Wang Y, Li D (2019) Privacy-preserving lightweight face recognition. Neurocomputing 363(2019):212–222. https://doi.org/10.1016/j.neucom.2019.07.039

    Article  Google Scholar 

  30. Mai G, Lim M-H, Yuen PC (2017) Binary feature fusion for discriminative and secure multi-biometric cryptosystems. Image Vis Comput 58(2017):254–265. https://doi.org/10.1016/j.imavis.2016.11.011

    Article  Google Scholar 

  31. Mehrotra H, Sa PK, Majhi B (2012) Fast segmentation and adaptive SURF descriptor for iris recognition. Math Comput Model 58(1–2):132–146. https://doi.org/10.1016/j.mcm.2012.06.034

    Article  Google Scholar 

  32. Murakami T, Ohki T, Takahashi K (2016) Optimal sequential fusion for multibiometric cryptosystems. Information fusion. 32(part B 2016):93–108. https://doi.org/10.1016/j.inffus.2016.02.002

  33. Nazari S, Moin MS, Kanan HR (2018) Securing templates in a face recognition system using error-correcting output code and chaos theory. Comput Electr Eng 72(2018):644–659. https://doi.org/10.1016/j.compeleceng.2018.01.029

    Article  Google Scholar 

  34. Oliveira SAF, Neto ARR, Bezerra FN (2016) Anovel genetic algorithms and SURF-based approach for image retargeting. Expert Syst Appl 44(2016):332–343. https://doi.org/10.1016/j.eswa.2015.09.015

    Article  Google Scholar 

  35. Panchal G, Samanta D (2018) A novel approach to fingerprint biometric-based cryptographic key generation and its applications to storage security. Comput Electr Eng 69(2018):461–478. https://doi.org/10.1016/j.compeleceng.2018.01.028

    Article  Google Scholar 

  36. Pandey R, Zhou Y, Govindaraju V (2015). Deep secure encoding: an application to face recognition. arxiv.org/pdf/1506.04340.pdf. Accessed 16 May 2020

  37. Patel MI, Thakar VK, Shah SK (2016) Image registeration of satellite images with varying illumination level using HOG descriptor based SURF. Procedia Computer Science 93(2016):382–388. https://doi.org/10.1016/j.procs.2016.07.224

    Article  Google Scholar 

  38. Rahman MA, Singh P, Muniyandi RC, Mery D, Prasad M (2019) Prostate cancer classification based on best first search and taguchi feature selection method. In: Lee C, Su Z, Sugimoto A (eds) Image and video technology, Lecture Notes in Computer Science. Springer, Cham, pp 325–336

    Google Scholar 

  39. Raj R, Joseph N (2016) Keypoint extraction using SURF algorithm for CMFD. Procedia Computer Science 93(2016):375–381. https://doi.org/10.1016/j.procs.2016.07.223

    Article  Google Scholar 

  40. Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561–572. https://doi.org/10.1109/TPAMI.2007.1004

    Article  Google Scholar 

  41. Urbanowicza RJ, Olsona RS, Schmitta P, Meekerb M, Moorea JH (2018) Benchmarking relief-based feature selection methods for bioinformatics data mining. J Biomed Inform 85(2018):168–188. https://doi.org/10.1016/j.jbi.2018.07.015

    Article  Google Scholar 

  42. Verma G, Liao M, Lu D, He W, Peng X (2019) A novel optical two-factor face authentication scheme. Opt Lasers Eng 123(2019):28–36. https://doi.org/10.1016/j.optlaseng.2019.06.028

    Article  Google Scholar 

  43. Wang Y, Plataniotis KN (2007). Face based biometric authentication with changeable and privacy preservable templates. 2007 IEEE international symposium on biometrics, pp. 1-6. https://doi.org/10.1109/BCC.2007.4430530

  44. Wang S, Yang W, Hu J (2017) Design of alignment-free cancelable fingerprint templates with zoned minutia pairs. Pattern Recogn 66(2017):295–301. https://doi.org/10.1016/j.patcog.2017.01.019

    Article  Google Scholar 

  45. Yagnik J, Strelow D, Ross DA, Lin RS (2011) The power of comparative reasoning. Proceedings of 2011 IEEE international conference on computer vision, pp 2431-2438

  46. Yale University Computer Laboratory http://vision.ucsd.edu/content/extended-yale-face-database-b-b

  47. Yang W, Wang S, Hu J, Zheng G, Valli C (2018) A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recogn 78(2018):242–251. https://doi.org/10.1016/j.patcog.2018.01.026

    Article  Google Scholar 

  48. Zhang H, Bai J, Li Z, Liu Y, Liu K (2017) Scale invariant SURF detector and automatic clustering segmentation for infrared small targets detection. Infrared Phys Technol 83(2017):7–16. https://doi.org/10.1016/j.infrared.2017.04.001

    Article  Google Scholar 

  49. Zhao D, Yang Y, Ji Z, Xiaopeng H (2014) Rapid multimodality registration based on MM-SURF. Neurocomputing 131(2014):87–97. https://doi.org/10.1016/j.neucom.2013.10.037

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Ministry of Higher Education Malaysia under the Fundamental Research Grant Scheme [grant number 12490].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hiba Basim Alwan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alwan, H.B., Ku-Mahamud, K.R. Cancellable face template algorithm based on speeded-up robust features and winner-takes-all. Multimed Tools Appl 79, 28675–28693 (2020). https://doi.org/10.1007/s11042-020-09319-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09319-1

Keywords

Navigation