Abstract
The proliferation of information technology has prompted researchers to create a multitude of new security solutions for secure electronic applications, especially on the Internet. Among them, security officials prefer authentication systems for user’s identity identification. Indeed, biometric authentication has proved to be superior in many respects compared to the traditional authentication means. Unfortunately, these systems are vulnerable to a variety of attacks, the most serious of which is perhaps the attack on the stored or transmitted template, which makes the safety of this template more important in the design of the biometric systems. This research, therefore, suggests an effective feature extraction method that can provide a deep and cancelable biometric feature. In this study, DCTNet deep learning is combined with chaotic systems to extract revocable palmprint/palm-vein features.
Similar content being viewed by others
References
Abdellatef E, Ismail NA, Abd Elrahman SE, Ismail KN, Rihan M, Abd ElSamie FE (2019) Cancelable multi-biometric recognition system based on deep learning. In: The visual computer international journal of computer graphics, Springer Link
Azzouz A, Duhr R, Hasler M (1984) Bifurcation diagram for a piecewise-linear circuit. EEE Trans Circ Syst 31(6)
Bendjenna H, Meraoumia A, Chergui O (2018) Pattern recognition system: From classical methods to deep learning techniques. J Electron Imaging 27(3):033008
Bhatnagar G, Wu QMJ (2012) Chaos-based security solution for fingerprint data during communication and transmission. Proceedings of the IEEE Transactions on Instrumentation and Measurement 61(4)
Bhatnagar G, Wu QMJ (2014) Enhancing the transmission security of biometric images using chaotic encryp-tion. Multimed Syst 20(2):203–214
Blasco J, Chen TM, Tapiador J, Peris-Lopez P (2016) A survey of wearable biometric recognition systems. ACM Comput Surv 49(3):43
Chai T-Y, Goi B-M, Tay Y-H, Jin Z (2019) A new design for Alignment-Free chaffed cancelable iris key binding scheme. Symmetry 2019 11(164):124. https://doi.org/10.3390/sym11020164
Coelho DF, Cintra RJ, Dimitrov VS (2018) Efficient computation of the 8-point DCT via summation by parts. In: J Signal Process Syst, vol 90, pp 1–10
Dang TK, Huynh VQP, Truong QH (2018) A hybrid template protection approach using secure sketch and ann for strong biometric key generation with revocability guarantee. Int Arab J Inf Technol (IAJIT 15(2):331–340
Dang TK, Truong QC, Bao Le TT, Truong H (2016) Cancellable fuzzy vault with periodic transformation for biometric template protection. IET Biom 5(3):229–235. https://doi.org/10.1049/iet-bmt.2015.0029
Dang T, Truong Q, Le T, Truong H (2016) Cancelable fuzzy vault with periodic transformation for biometric template protection. IET Biomet 5 (3):229–235
Dwivedi R, Dey S, Singh R et al (2017) A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping. Comput. Secur 65:373–386
Fu C, Li W-J, Meng Z-Y, Wang T, Li P-X (2013) A symmetric image encryption scheme using chaotic baker map and lorenz system. In: Ninth international conference on computational intelligence and security, Leshan. China
Hamad N, Rahman M, Islam S (2017) Novel re-mote authentication protocol using heart-signals with chaos cryptography. In: International conference on informat- ics, health & technology (ICIHT). Riyadh, Saudi Arabia, pp 1–7
Hong Kong Polytechnic University (PolyU) (2013) Multispectral palmprint database. In: http://www.comp.polyu.edu.hk/~biometrics
Hsiao HI, Lee J (2013) A novel fingerprint image encryption algorithm based on chaos using APFM nonlinear adaptive filter. In: Proceedings of the IEEE 17th International Symposium on Consumer Electronics (ISCE ’13). Hsinchu, Taiwan, pp 95–96
Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. In: EURASIP Journal on advances in signal processing, p 113
Jang YK, Cho NL (2019) Deep face image retrieval for cancelable biometric authentication. In: Proceedings of the 16th IEEE international conference on advanced video and signal based surveillance (AVSS)
Jeong JY, Ik RJ (2019) Efficient cancelable iris template generation for wearable sensors. In: Security and communication networks, hindawi, volume 2019, article ID 7473591. https://doi.org/10.1155/2019/7473591, pp 1–13
Jindal AK, Chalamala S, Jami SK (2018) Face template protection using deep convolutional neural network. In: IEEE/CVF Conference on computer vision and pattern recognition workshops (CVPRW)
Kurban OC, Yildirim T, Bilgic A (2017) A multi-biometric recognition system based on deep features of face and gesture energy image. In: INISTA, pp 361–364
Li X, Jiang Y, Chen M, Li F (2018) Research on iris image encryption based on deep learning. EURASIP Journal on Image and Video Processing (126)
Li H, Qiu J, Teoh ABJ (2020) Palmprint template protection scheme based on randomized cuckoo hashing and MinHash. Multimed tools appl 79:11947–11971. https://doi.org/10.1007/s11042-019-08446-8
Liu Y, Ling J, Liu Z, Shen J, Gao C (2017) Finger vein secure biometric template generation based on deep learning. Soft Comput 22:2257–2265
Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of Applied Cryptography. CRC Press, Boca Raton
Nanni L, Ghidoni S, Brahnam S (2017) Handcrafted vs. nonhandcrafted features for computer vision classification. In: Pattern recognition, vol 71, pp 158–172
Ng CJ, Teoh ABJ (2015) DCTNet. A simple learning-free approach for face recognition. In: IEEE signal and information processing association annual summit and Conf. (APSIPA ’15), pp 761–768
Phartchayanusit V, Rongviriyapanish S (2018) Safety property analysis of service-oriented IoT based on interval timed coloured petri nets. In: 15th international joint conference on computer science and software engineering (JCSSE)
Ponce-Hernandez W, Blanco-Gonzalo R, Liu-Jimenez J, Sanchez-Reillo R (2020) Fuzzy vault scheme based on Fixed-Length templates applied to dynamic signature verification. IEEE Access 8:11152–11164
Rajab H, Cinkelr T (2018) Iot based smart cities. In: International symposium on networks, computers and communications (ISNCC) Rome, Italy
Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634
Rathgeb C, Gomez-Barrero M, Busch C, Galbally J, Fierrez J (2015) Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris. In: 3rd international workshop on biometrics and forensics (IWBF)
Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. In: EURASIP journal on information security
Salami MJ, Eltahir W, Ali H (2011) Design and evaluation of a pressure based typing biometric authentication system. In: Riaz Z (ed) Biometric systems design and applications InTech, pp 235–262
Sallehuddin AFH, Ahmad MI, Ngadiran R, Isa MNM (2016) Score level normalization and fusion of iris recognition. In: 3rd international conference on electronic design (ICED). Phuket, Thailand, pp 464–469
Sarkar A, Singh BK (2018) Cryptographic key generation from cancelable fingerprint templates. In: 4th international conference on recent advances in information technology (RAIT), dhanbad, india. https://doi.org/10.1109/RAIT.2018.8389007, pp 1–6
Shahna K, Mohamed A (2018) An image encryption technique using logistic map and Z-Order curve. In: IEEE International conference on emerging trends and innovations in engineering and technological research (ICETIETR). Ernakulam, India, pp 1–6
Sujitha V, Chitra DA (2019) Novel technique for multi biometric cryptosystem using fuzzy vault. Int J Med Syst 43(112)
Talreja V, Valenti MC, Nasrabadi NM (2017) Multibiometric secure system based on deep learning. In: IEEE Global conference on signal and information processing (global SIP)
Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: Issues and challenges. Proc IEEE 92(6):948–960
Unar J, Seng W, Abbasi A (2014) A review of biometric technology along with trends and prospects. Patt Recognit 47(8):2673–2688
Walia GS, Rishi S, Asthana R, Kumar A, Gupta A (2018) Secure multimodal biometric system based on diffused graphs and optimal score fusion. IET Biometrics 8(4):231–242
Wang P, Gao H, Cheng M, Ma X (2010) A new image encryption algorithm based on hyperchaotic mapping. In: International Conference on Computer Application and System Modeling (ICCASM). Taiyuan, China
Wu X, Zhu B, Hu Y, Ran Y (2020) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. EEE Access 5:6429–6436
Yu J, Zhang B, Kuang Z, Lin D, Fan J (2017) iPrivacy: Image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Trans Inf Forens Secur 12(5):1005–1016
Acknowledgements
This work would not have been possible without the financial support of the Directorate General for Scientific Research and Technological Development (DGRSDT). The authors also appreciate the unknown referee’s valuable and profound comments.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Haouam, M.Y., Meraoumia, A., Laimeche, L. et al. S-DCTNet: Security-oriented biometric feature extraction technique. Multimed Tools Appl 80, 36059–36091 (2021). https://doi.org/10.1007/s11042-021-10936-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10936-7