S-DCTNet: Security-oriented biometric feature extraction technique | Multimedia Tools and Applications Skip to main content
Log in

S-DCTNet: Security-oriented biometric feature extraction technique

An effective pathway to secure and reliable biometric systems

  • 1171: Real-time 2D/ 3D Image Processing with Deep Learning
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The proliferation of information technology has prompted researchers to create a multitude of new security solutions for secure electronic applications, especially on the Internet. Among them, security officials prefer authentication systems for user’s identity identification. Indeed, biometric authentication has proved to be superior in many respects compared to the traditional authentication means. Unfortunately, these systems are vulnerable to a variety of attacks, the most serious of which is perhaps the attack on the stored or transmitted template, which makes the safety of this template more important in the design of the biometric systems. This research, therefore, suggests an effective feature extraction method that can provide a deep and cancelable biometric feature. In this study, DCTNet deep learning is combined with chaotic systems to extract revocable palmprint/palm-vein features.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abdellatef E, Ismail NA, Abd Elrahman SE, Ismail KN, Rihan M, Abd ElSamie FE (2019) Cancelable multi-biometric recognition system based on deep learning. In: The visual computer international journal of computer graphics, Springer Link

  2. Azzouz A, Duhr R, Hasler M (1984) Bifurcation diagram for a piecewise-linear circuit. EEE Trans Circ Syst 31(6)

  3. Bendjenna H, Meraoumia A, Chergui O (2018) Pattern recognition system: From classical methods to deep learning techniques. J Electron Imaging 27(3):033008

    Article  Google Scholar 

  4. Bhatnagar G, Wu QMJ (2012) Chaos-based security solution for fingerprint data during communication and transmission. Proceedings of the IEEE Transactions on Instrumentation and Measurement 61(4)

  5. Bhatnagar G, Wu QMJ (2014) Enhancing the transmission security of biometric images using chaotic encryp-tion. Multimed Syst 20(2):203–214

    Article  Google Scholar 

  6. Blasco J, Chen TM, Tapiador J, Peris-Lopez P (2016) A survey of wearable biometric recognition systems. ACM Comput Surv 49(3):43

    Article  Google Scholar 

  7. Chai T-Y, Goi B-M, Tay Y-H, Jin Z (2019) A new design for Alignment-Free chaffed cancelable iris key binding scheme. Symmetry 2019 11(164):124. https://doi.org/10.3390/sym11020164

    Google Scholar 

  8. Coelho DF, Cintra RJ, Dimitrov VS (2018) Efficient computation of the 8-point DCT via summation by parts. In: J Signal Process Syst, vol 90, pp 1–10

  9. Dang TK, Huynh VQP, Truong QH (2018) A hybrid template protection approach using secure sketch and ann for strong biometric key generation with revocability guarantee. Int Arab J Inf Technol (IAJIT 15(2):331–340

    Google Scholar 

  10. Dang TK, Truong QC, Bao Le TT, Truong H (2016) Cancellable fuzzy vault with periodic transformation for biometric template protection. IET Biom 5(3):229–235. https://doi.org/10.1049/iet-bmt.2015.0029

    Article  Google Scholar 

  11. Dang T, Truong Q, Le T, Truong H (2016) Cancelable fuzzy vault with periodic transformation for biometric template protection. IET Biomet 5 (3):229–235

  12. Dwivedi R, Dey S, Singh R et al (2017) A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping. Comput. Secur 65:373–386

    Article  Google Scholar 

  13. Fu C, Li W-J, Meng Z-Y, Wang T, Li P-X (2013) A symmetric image encryption scheme using chaotic baker map and lorenz system. In: Ninth international conference on computational intelligence and security, Leshan. China

  14. Hamad N, Rahman M, Islam S (2017) Novel re-mote authentication protocol using heart-signals with chaos cryptography. In: International conference on informat- ics, health & technology (ICIHT). Riyadh, Saudi Arabia, pp 1–7

  15. Hong Kong Polytechnic University (PolyU) (2013) Multispectral palmprint database. In: http://www.comp.polyu.edu.hk/~biometrics

  16. Hsiao HI, Lee J (2013) A novel fingerprint image encryption algorithm based on chaos using APFM nonlinear adaptive filter. In: Proceedings of the IEEE 17th International Symposium on Consumer Electronics (ISCE ’13). Hsinchu, Taiwan, pp 95–96

  17. Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. In: EURASIP Journal on advances in signal processing, p 113

  18. Jang YK, Cho NL (2019) Deep face image retrieval for cancelable biometric authentication. In: Proceedings of the 16th IEEE international conference on advanced video and signal based surveillance (AVSS)

  19. Jeong JY, Ik RJ (2019) Efficient cancelable iris template generation for wearable sensors. In: Security and communication networks, hindawi, volume 2019, article ID 7473591. https://doi.org/10.1155/2019/7473591, pp 1–13

  20. Jindal AK, Chalamala S, Jami SK (2018) Face template protection using deep convolutional neural network. In: IEEE/CVF Conference on computer vision and pattern recognition workshops (CVPRW)

  21. Kurban OC, Yildirim T, Bilgic A (2017) A multi-biometric recognition system based on deep features of face and gesture energy image. In: INISTA, pp 361–364

  22. Li X, Jiang Y, Chen M, Li F (2018) Research on iris image encryption based on deep learning. EURASIP Journal on Image and Video Processing (126)

  23. Li H, Qiu J, Teoh ABJ (2020) Palmprint template protection scheme based on randomized cuckoo hashing and MinHash. Multimed tools appl 79:11947–11971. https://doi.org/10.1007/s11042-019-08446-8

    Article  Google Scholar 

  24. Liu Y, Ling J, Liu Z, Shen J, Gao C (2017) Finger vein secure biometric template generation based on deep learning. Soft Comput 22:2257–2265

    Article  Google Scholar 

  25. Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of Applied Cryptography. CRC Press, Boca Raton

    MATH  Google Scholar 

  26. Nanni L, Ghidoni S, Brahnam S (2017) Handcrafted vs. nonhandcrafted features for computer vision classification. In: Pattern recognition, vol 71, pp 158–172

  27. Ng CJ, Teoh ABJ (2015) DCTNet. A simple learning-free approach for face recognition. In: IEEE signal and information processing association annual summit and Conf. (APSIPA ’15), pp 761–768

  28. Phartchayanusit V, Rongviriyapanish S (2018) Safety property analysis of service-oriented IoT based on interval timed coloured petri nets. In: 15th international joint conference on computer science and software engineering (JCSSE)

  29. Ponce-Hernandez W, Blanco-Gonzalo R, Liu-Jimenez J, Sanchez-Reillo R (2020) Fuzzy vault scheme based on Fixed-Length templates applied to dynamic signature verification. IEEE Access 8:11152–11164

    Article  Google Scholar 

  30. Rajab H, Cinkelr T (2018) Iot based smart cities. In: International symposium on networks, computers and communications (ISNCC) Rome, Italy

  31. Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634

    Article  Google Scholar 

  32. Rathgeb C, Gomez-Barrero M, Busch C, Galbally J, Fierrez J (2015) Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris. In: 3rd international workshop on biometrics and forensics (IWBF)

  33. Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. In: EURASIP journal on information security

  34. Salami MJ, Eltahir W, Ali H (2011) Design and evaluation of a pressure based typing biometric authentication system. In: Riaz Z (ed) Biometric systems design and applications InTech, pp 235–262

  35. Sallehuddin AFH, Ahmad MI, Ngadiran R, Isa MNM (2016) Score level normalization and fusion of iris recognition. In: 3rd international conference on electronic design (ICED). Phuket, Thailand, pp 464–469

  36. Sarkar A, Singh BK (2018) Cryptographic key generation from cancelable fingerprint templates. In: 4th international conference on recent advances in information technology (RAIT), dhanbad, india. https://doi.org/10.1109/RAIT.2018.8389007, pp 1–6

  37. Shahna K, Mohamed A (2018) An image encryption technique using logistic map and Z-Order curve. In: IEEE International conference on emerging trends and innovations in engineering and technological research (ICETIETR). Ernakulam, India, pp 1–6

  38. Sujitha V, Chitra DA (2019) Novel technique for multi biometric cryptosystem using fuzzy vault. Int J Med Syst 43(112)

  39. Talreja V, Valenti MC, Nasrabadi NM (2017) Multibiometric secure system based on deep learning. In: IEEE Global conference on signal and information processing (global SIP)

  40. Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: Issues and challenges. Proc IEEE 92(6):948–960

    Article  Google Scholar 

  41. Unar J, Seng W, Abbasi A (2014) A review of biometric technology along with trends and prospects. Patt Recognit 47(8):2673–2688

    Article  Google Scholar 

  42. Walia GS, Rishi S, Asthana R, Kumar A, Gupta A (2018) Secure multimodal biometric system based on diffused graphs and optimal score fusion. IET Biometrics 8(4):231–242

    Article  Google Scholar 

  43. Wang P, Gao H, Cheng M, Ma X (2010) A new image encryption algorithm based on hyperchaotic mapping. In: International Conference on Computer Application and System Modeling (ICCASM). Taiyuan, China

  44. Wu X, Zhu B, Hu Y, Ran Y (2020) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. EEE Access 5:6429–6436

    Google Scholar 

  45. Yu J, Zhang B, Kuang Z, Lin D, Fan J (2017) iPrivacy: Image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Trans Inf Forens Secur 12(5):1005–1016

    Article  Google Scholar 

Download references

Acknowledgements

This work would not have been possible without the financial support of the Directorate General for Scientific Research and Technological Development (DGRSDT). The authors also appreciate the unknown referee’s valuable and profound comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Yassine Haouam.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Haouam, M.Y., Meraoumia, A., Laimeche, L. et al. S-DCTNet: Security-oriented biometric feature extraction technique. Multimed Tools Appl 80, 36059–36091 (2021). https://doi.org/10.1007/s11042-021-10936-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10936-7

Keywords

Navigation