Skip to main content
Log in

A robust cancellable face and palmprint recognition system based on 3D optical chaos-DNA cryptosystem

  • Published:
Optical and Quantum Electronics Aims and scope Submit manuscript

Abstract

Several cancelable biometric procedures have been developed to preserve personal data security. This research presents a cancelable biometric authentication mechanism to ensure personal data security, while maintaining the biometric templates secure from hackers. Therefore, our major approach is to provide a new authentication system based on 3D chaotic maps, Piecewise Linear Chaotic Map (PWLCM), logistic map, and Deoxyribonucleic Acid (DNA) sequencing theory. The approach is based on confusion as well as a diffusion. Firstly, a 3D chaotic map is made up to allow 3D chaos creation, chaos histogram equalization, row rotation, column rotation, and XOR operation. Secondly, the PWLCM and the Logistic Map are used for generating the main values required to make use of the DNA theory to generate the key image. Thirdly, DNA theory is applied as a second encryption algorithm on the output of the 3D chaotic algorithm. Fourthly, the intermediate image is decoded, rotated 90 degrees anticlockwise, and used in the following step in the DNA encoding process. Finally, step 3 is repeated on columns to acquire the final encrypted image. The proposed framework hides all discriminative properties of biometric templates, resulting in a fully unspecified biometric pattern. Various face, as well as palmprint biometric datasets, have been examined and evaluated. Various evaluation factors are employed to examine the efficiency of the recommended cryptography algorithm including Area under the Receiver Operating Characteristic (AROC), False Acceptance Rate (FAR), histogram analysis, Histogram Deviation (\(D_{H}\)), correlation coefficient, Structural Similarity Index Metric (SSIM), and Peak Signal-to-Noise Ratio (PSNR). The computational results prove that the proposed cryptosystem is trustworthy. A comparative study of the recommended approach with various strategies is also provided. Simulation studies illustrate that the suggested approach produces an average AROC of approximately 1, an average FAR of \(6.2 \times 10^{ - 3}\), an average \(D_{H}\) of 0.8755, and finally, an average PSNR of 8.2061.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Availability of data and materials

All data are available upon request from the corresponding author.

Abbreviations

DNA:

Deoxyribonucleic acid

PWLCM:

Piecewise linear chaotic map

EER:

Equal error rate

AROC:

A receiver operating characteristic curve

FAR:

False acceptance rate

\(D_{H}\) :

Histogram deviation

PINs:

Personal identification numbers

DSP:

Digital signal processing

DRPE:

Double random phase encoding algorithm

RPM 1:

Random phase mask

RPM 2:

Random phase mask

FRFT:

Fractional Fourier transform

AF:

“À Trous” filtering

AT:

À Trous transform algorithm

A:

Adenine

T:

Thymine

C:

Cytosine

G:

Guanine

XOR:

Exclusive OR

MD5:

Message-digest mechanism 5

PSNR:

Peak signal to noise ratio

SSIM:

Structural similarity index metric

TPF:

True positive rate

FPF:

False positive rate

PTD:

Probability of true distribution

PFD:

Probability of false distribution

Var(G):

Variance (genuine correlation)

Var(F):

Variance (fake correlation)

\(x_{n}\) :

The initial value of the chaos map \(0 < x_{n} < 1\)

\(y_{n}\) :

The initial value of chaos map \(0 < y_{n} < 1\)

\(z_{n}\) :

The initial value of chaos map \(0 < z_{n} < 1\)

\(\mu\) :

Constant parameter = 4

\({\upgamma }\) :

Control parameter \(3.53 < \gamma < 3.81\)

\(\beta\) :

Control parameter \({ }0 < \beta < 0.022{ }\)

\(\alpha\) :

Control parameter \(0 < \alpha < 0.015\)

\(N_{2} ,N_{4} , N_{6}\) :

Random numbers > 10,000

\(M\) :

Number of columns

\({\text{N}}\) :

Number of rows

\(p\) :

Control parameter \(p \in \left( {0,0.5} \right)\)

\(d_{1} ,d_{2} ,d_{3} ,d_{4}\) :

Each of them represents a single byte

pixel:

The pixel value of the key image

Rule:

One of the 8 rules of DNA

\(process\) :

One of DNA operations \(\left( {XOR, + , - } \right)\)

\(C_{i,j}\) :

The correlation coefficient

\(i,j\) :

The grayscale values of two neighboring pixels in the image

\(E\) :

The expectation

\(E\left( i \right)\) :

Mean of \(i\)

\(E\left( j \right)\) :

Mean of \(j\)

\(\sqrt {D\left( i \right)}\) :

Standard deviation of \(i\)

\(\sqrt {D\left( j \right)}\) :

Standard deviation of \(j\)

\({\upmu }_{{\text{I}}}\) :

The average of an input image (I)

\(\mu_{T}\) :

The average of the encrypted image

\(\sigma_{I}^{2}\) :

The variance of the input image

\(\sigma_{T}^{2}\) :

The variance of the encrypted image

\(\sigma_{IT}\) :

Signifies the covariance between the input and encrypted images

\(S_{1}\) and \(S_{2}\) :

Small values

\(q_{i}\) :

The absolute difference between the pure and ciphered images' estimated histograms at a gray level i

n :

The number of bits/pixel

\(O\) :

The reference image

\(T\) :

The encrypted image

References

  • Abo-Hammour, Z.E., Alsmadi, O., Momani, S., Abu Arqub, O.: A genetic algorithm approach for prediction of linear dynamical systems. Math. Probl. Eng. 2013 (2013)

  • Abo-Hammour, Z., Abu Arqub, O., Momani, S., Shawagfeh, N.: Optimization solution of Troesch’s and Bratu’s problems of ordinary type using novel continuous genetic algorithm. Discrete Dyn. Nat. Soc. 2014 (2014)

  • Abu Arqub, O., Abo-Hammour, Z., Momani, S., Shawagfeh, N.: Solving singular two-point boundary value problems using continuous genetic algorithm. In: Abstract and Applied Analysis, vol. 2012. Hindawi (2012)

  • Ahmad, M., Alkanhel, R., El-Shafai, W., Algarni, A.D., El-Samie, F.E.A., Soliman, N.F.: Multi-objective evolution of strong s-boxes using non-dominated sorting genetic algorithm-II and chaos for secure telemedicine. IEEE Access 10, 112757–112775 (2022). https://doi.org/10.1109/ACCESS.2022.3209202

    Article  Google Scholar 

  • Alarifi, A., Sankar, S., Altameem, T., Jithin, K.C., Amoon, M., El-Shafai, W.: A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications. IEEE Access 8, 128548–128573 (2020)

    Article  Google Scholar 

  • Algarni, A.D., El Banby, G., Ismail, S., El-Shafai, W., El-Samie, F.E.A., Soliman, F., N.: Discrete transforms and matrix rotation based cancelable face and fingerprint recognition for biometric security applications. Entropy 22(12), 1361 (2020a)

    Article  ADS  MathSciNet  Google Scholar 

  • Algarni, A.D., El Banby, G.M., Soliman, N.F., El-Samie, F.E.A., Iliyasu, A.M.: Efficient implementation of homomorphic and fuzzy transforms in random-projection encryption frameworks for cancellable face recognition. Electronics 9(6), 1046 (2020b)

    Article  Google Scholar 

  • Almomani, I., Ahmed, M., El-Shafai, W.: DefOff: defensive/offensive system based on hiding technologies. In: 2022a 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH), pp. 214–219. IEEE (2022a)

  • Almomani, I., Alkhayer, A., El-Shafai, W.: A crypto-steganography approach for hiding ransomware within HEVC streams in android IoT devices. Sensors 22(6), 2281 (2022b)

    Article  ADS  Google Scholar 

  • Almomani, I., El-Shafai, W., AlKhayer, A., Alsumayt, A., Aljameel, S.S., et al.: Proposed biometric security system based on deep learning and chaos algorithms. Comput., Mater. Contin. 74(2), 3515–3537 (2023)

    Google Scholar 

  • Alqahtani, F., Amoon, M., El-Shafai, W.: A Fractional Fourier based medical image authentication approach. CMC-Comput. Mater. Contin. 70(2), 3133–3150 (2022)

    Google Scholar 

  • Alshammri, G.H., Samha, A.K., Hemdan, E.E.D., Amoon, M., El-Shafai, W.: An efficient intrusion detection framework in software-defined networking for cybersecurity applications. CMC-Comput. Mater. Contin. 72(2), 3529–3548 (2022)

    Google Scholar 

  • Arqub, O.A., Abo-Hammour, Z.: Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm. Inf. Sci. 279, 396–415 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  • Asaker, A.A., Elsharkawy, Z.F., Nassar, S., Ayad, N., Zahran, O., El-Samie, A., Fathi, E.: A novel cancellable Iris template generation based on salting approach. Multimedia Tools Appl. 80(3), 3703–3727 (2021)

    Article  Google Scholar 

  • Ayoup, A.M., Khalaf, A.A., Alraddady, F., Abd El-Samie, F.E., El-Safai, W., Eldin, S.M.S.: Cancelable multi-biometric template generation based on dual-tree complex wavelet transform (2022)

  • Ayoup, A.M., Khalaf, A.A., El-Shafai, W., Abd El-Samie, F.E., Alraddady, F., Eldin, S.M.S.: Cancellable multi-biometric template generation based on Arnold cat map and aliasing. CMC-Comput. Mater. Contin. 72(2), 3687–3703 (2022a)

    Google Scholar 

  • Ayoup, A.M., Khalaf, A.A., Alraddady, F., Abd El-Samie, F.E., El-Safai, W., Eldin, S.M.S.: Selective cancellable multi-biometric template generation scheme based on multi-exposure feature fusion. Intell. Autom. Soft Comput. 33(1), 549–565 (2022b)

    Article  Google Scholar 

  • Badr, I.S., Radwan, A.G., El-Rabaie, E.S.M., Said, L.A., El Banby, G.M., El-Shafai, W., Abd El-Samie, F.E.: Cancellable face recognition based on fractional-order Lorenz chaotic system and Haar wavelet fusion. Dig. Signal Process. 116, 103103 (2021)

    Article  Google Scholar 

  • Elazm, L.A.A., El-Shafai, W., Ibrahim, S., Egila, M.G., Shawkey, H., et al.: Efficient hardware design of a secure cancellable biometric cryptosystem. Intell. Autom. Soft Comput. 36(1), 929–955 (2023)

    Article  Google Scholar 

  • Eldesouky, S., El-Shafai, W., Ahmed, H.E.D.H., El-Samie, F.E.A.: Cancelable electrocardiogram biometric system based on chaotic encryption using three-dimensional logistic map for biometric-based cloud services. Secur. Priv. 5(2), e198 (2022)

    Article  Google Scholar 

  • El-Gazar, S., El Shafai, W., El Banby, G.M., Hamed, H.F., Salama, G.M., Abd-Elnaby, M., Abd El-Samie, F.E.: Cancelable speaker identification system based on optical-like encryption algorithms. Comput. Syst. Sci. Eng. 43(1), 87–102 (2022)

    Article  Google Scholar 

  • El-Hameed, H.A.A., Ramadan, N., El-Shafai, W., Khalaf, A.A., Ahmed, H.E.H., Elkhamy, S.E., El-Samie, F.E.A.: Cancelable biometric security system based on advanced chaotic maps. Vis. Comput. 38(6), 2171–2187 (2022)

    Article  Google Scholar 

  • El-Shafai, W., & Hemdan, E. E. D. (2021). Robust and efficient multi-level security framework for color medical images in telehealthcare services. J. Ambient Intell. Hum. Comput. 1–16

  • El-Shafai, W., Almomani, I.M., Alkhayer, A.: Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access 9, 35004–35026 (2021a)

    Article  Google Scholar 

  • El-Shafai, W., Khallaf, F., El-Rabaie, E.S.M., El-Samie, F.E.A.: Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications. J. Ambient. Intell. Hum. Comput. 12(10), 9007–9035 (2021b)

    Article  Google Scholar 

  • El-Shafai, W., Mohamed, F.A.H.E., Elkamchouchi, H.M., Abd-Elnaby, M., Elshafee, A.: Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm. IEEE Access 9, 77675–77692 (2021c)

    Article  Google Scholar 

  • El-Shafai, W., Almomani, I., Ara, A., et al.: An optical-based encryption and authentication algorithm for color and grayscale medical images. Multimed Tools Appl (2022a). https://doi.org/10.1007/s11042-022-14093-3

    Article  Google Scholar 

  • El-Shafai, W., Khallaf, F., El-Rabaie, E.S.M., El-Samie, F.E. A.: Proposed 3D chaos-based medical image cryptosystem for secure cloud-IoMT eHealth communication services. J. Ambient Intell. Hum. Comput. 1–28 (2022b)

  • El-Shafai, W., Khallaf, F., El-Rabaie, E.S.M., El-Samie, A., Fathi, E.: Proposed neural SAE-based medical image cryptography framework using deep extracted features for smart IoT healthcare applications. Neural Comput. Appl. 1–25 (2022c)

  • El-Shafai, W., Abd El-Hameed, H.A., Khalaf, A.A., Soliman, N.F., Alhussan, A.A., Abd El-Samie, F.E.: A hybrid security framework for medical image communication. CMC-Comput. Mater. Contin. 73(2), 2713–2730 (2022d)

    Google Scholar 

  • El-Shafai, W., Mesrega, A.K., Ahmed, H.E.H., El-Bahnasawy, N.A., Abd El-Samie, F.E.: An efficient multimedia compression-encryption scheme using latin squares for securing Internet-of-things networks. J. Inf. Secur. Appl. 64, 103039 (2022e)

    Google Scholar 

  • El-Shafai, W., Abd El-Hameed, H.A., El-Hag, N.A., Khalaf, A.A.M., Soliman, N.F., et al.: Proposed privacy preservation technique for color medical images. Intell. Autom. Soft Comput. 36(1), 719–732 (2023b)

    Article  Google Scholar 

  • El-Shafai, W., Elsayed, M.A., Rashwan, M.A., Dessouky, M.I., El-Fishawy, A.S., et al.: Optical ciphering scheme for cancellable speaker identification system. Comput. Syst. Sci. Eng. 45(1), 563–578 (2023a)

    Article  Google Scholar 

  • Faragallah, O.S., Afifi, A., El-Shafai, W., El-Sayed, H.S., Naeem, E.A., Alzain, M.A., et al.: Investigation of chaotic image encryption in spatial and FrFT domains for cybersecurity applications. IEEE Access 8, 42491–42503 (2020)

    Article  Google Scholar 

  • Faragallah, O.S., Naeem, E.A., El-Shafai, W., Ramadan, N., Ahmed, H.E.D.H., Elnaby, M.M.A., et al.: Efficient chaotic-Baker-map-based cancelable face recognition. J. Ambient Intell. Hum. Comput. 1–39 (2021a)

  • Faragallah, O.S., El-Sayed, H.S., El-Shafai, W.: Efficient opto MVC/HEVC cybersecurity framework based on arnold map and discrete cosine transform. J. Ambient Intell. Hum. Comput. 1–16 (2021b)

  • Faragallah, O.S., El-Shafai, W., Sallam, A.I., Elashry, I., EL-Rabaie, E.S.M., Afifi, A., et al.: Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. J. Ambient Intell. Hum. Comput. 13(2), 1215–1239 (2022)

    Article  Google Scholar 

  • Hammad, M., Luo, G., Wang, K.: Cancelable biometric authentication system based on ECG. Multimedia Tools Appl. 78(2), 1857–1887 (2019)

    Article  Google Scholar 

  • Hashad, F.G., Zahran, O., El-Rabaie, S., Elashry, I.F., Elbanby, G., Dessouky, M.I., et al.: Cancelable fingerprint recognition based on encrypted convolution kernel in different domains. Menoufia J. Electron. Eng. Res. 29(2), 133–142 (2020)

    Article  Google Scholar 

  • Hassan, H.A., Hemdan, E.E., El-Shafai, W., et al.: Intrusion detection systems for the internet of thing: a survey Study. Wirel. Pers. Commun. (2022). https://doi.org/10.1007/s11277-022-10069-6

    Article  Google Scholar 

  • Helmy, M., El-Shafai, W., El-Rabaie, E.S.M., El-Dokany, I.M., Abd El-Samie, F.E.: A hybrid encryption framework based on Rubik’s cube for cancelable biometric cyber security applications. Optik 258, 168773 (2022a)

    Article  ADS  Google Scholar 

  • Helmy, M., El-Shafai, W., El-Rabaie, S., El-Dokany, I.M., El-Samie, F.E.A.: Efficient security framework for reliable wireless 3D video transmission. Multidimens. Syst. Signal Process. 33(1), 181–221 (2022b)

    Article  Google Scholar 

  • Ibrahim, S., Egila, M.G., Shawkey, H., Elsaid, M.K., El-Shafai, W., Abd El-Samie, F.E.: Hardware implementation of cancellable biometric systems. In: 2020a 4th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 1145–1152. IEEE (2020a)

  • Ibrahim, S., Egila, M.G., Shawky, H., Elsaid, M.K., El-Shafai, W., El-Samie, A., Fathi, E.: Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimedia Tools Appl. 79(19), 14053–14078 (2020b)

    Google Scholar 

  • Leng, L., Teoh, A.B.J., Li, M., Khan, M.K.: Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition. Neurocomputing 131, 377–387 (2014)

    Article  Google Scholar 

  • Mohamed, F.A.H.E., El-Shafai, W., Elkamchouchi, H.M., ELfahar, A., Alarifi, A., Amoon, M., et al.: A cancelable biometric security framework based on RNA encryption and genetic algorithms. IEEE Access 10, 55933–55957 (2022)

    Article  Google Scholar 

  • Nagar, A., Nandakumar, K., Jain, A.K.: A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recogn. Lett. 31(8), 733–741 (2010)

    Article  ADS  Google Scholar 

  • Nassar, M., Ali, A.M., El-Shafai, W., Saleeb, A., AbdEl-Samie, F.E., et al.: Hybrid of distributed cumulative histograms and classification model for attack detection. Comput. Syst. Sci. Eng. 45(2), 2235–2247 (2023)

    Article  Google Scholar 

  • Qiu, J., Li, H., Zhao, C.: Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication. Comput. Secur. 82, 1–14 (2019)

    Article  ADS  Google Scholar 

  • Salama, G.M., El-Gazar, S., Omar, B., Nassar, R.M., Khalaf, A.A., El-Banby, G.M., et al.: Cancelable biometric system for IoT applications based on optical double random phase encoding. Opt. Express 30(21), 37816–37832 (2022)

    Article  ADS  Google Scholar 

  • Soliman, R.F., El Banby, G.M., Algarni, A.D., Elsheikh, M., Soliman, N.F., Amin, M., Abd El-Samie, F.E.: Double random phase encoding for cancelable face and iris recognition. Appl. Opt. 57(35), 10305–10316 (2018a)

    Article  ADS  Google Scholar 

  • Soliman, R.F., Amin, M., El-Samie, A., Fathi, E.: A double random phase encoding approach for cancelable iris recognition. Opt. Quant. Electron. 50(8), 1–12 (2018b)

    Article  Google Scholar 

  • Soliman, N.F., Khalil, M.I., Algarni, A.D., Ismail, S., Marzouk, R., El-Shafai, W.: Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication. Multimedia Tools Appl. 80(3), 4789–4823 (2021a)

    Article  Google Scholar 

  • Soliman, N.F., Algarni, A.D., El-Shafai, W., Abd El-Samie, F.E., El Banby, G.M.: An efficient GCD-based cancelable biometric algorithm for single and multiple biometrics. CMC-Comput. Mater. Contin. 69(2), 1571–1595 (2021b)

    Google Scholar 

Download references

Acknowledgements

The authors are very grateful to all the institutions in the affiliation list for successfully performing this research work. The authors would like to thank Prince Sultan University for their support.

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Contributions

All authors are equally contributed.

Corresponding author

Correspondence to Walid El-Shafai.

Ethics declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose.

Ethical approval and consent to participate

All authors are contributing and accepting to submit the current work.

Consent for publication

All authors are accepting to submit and publish the submitted work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Eldawy, H.A.A., El-Shafai, W., Hemdan, E.ED. et al. A robust cancellable face and palmprint recognition system based on 3D optical chaos-DNA cryptosystem. Opt Quant Electron 55, 970 (2023). https://doi.org/10.1007/s11082-023-04840-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11082-023-04840-7

Keywords

Navigation