Skip to main content

Advertisement

Log in

Privacy preservation of industrial access system users with cancellable face recognition based on inverse techniques

  • Research Article
  • Published:
Journal of Optics Aims and scope Submit manuscript

Abstract

To strengthen security, we now use biometric technologies instead of passwords or tokens in a variety of authentication applications. Biometrics depend on parts of the human body. They have an advantage of not being lost. This paper seeks to safeguard biometrics within recognition systems by inducing intended distortions in biometric traits prior to saving them in a database for preventing hackers from accessing the actual biometrics. We can still use the biometrics, even if they are stolen or hacked in this situation by changing the distorted versions. Two approaches for face biometric distortion are presented in this paper, namely a regularization approach and a Linear Minimum Mean Square Error (LMMSE) approach. The regularization strategy begins by adding noise to the original faces, and then applying a regularized inverse on the noisy face images to create face images with amplified fixed noise patterns. The process of noise amplification is really a masking process that helps in the generation of cancellable templates. These versions of the face images can be used as templates for verification that can be cancelled and replaced with new templates if required. The other approach is cancellable face recognition based on the LMMSE algorithm, which begins with noise addition to the original faces and then application of LMMSE algorithm to the face images to obtain new templates with magnified fixed noise patterns. Finally, we compare between the two approaches in the cancellable face recognition application.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B.V. Kumar, Biometric encryption using image processing, in Photonics West’98 Electronic Imaging, International Society for Optics and Photonics (1998), pp. 178–188

  2. N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacyin biometrics—based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    Article  Google Scholar 

  3. A.T.B. Jin, D.N.C. Ling, A. Goh, Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245–2255 (2004)

    Article  ADS  Google Scholar 

  4. Y. Sutcu, H.T. Sencar, N. Memon, A secure biometric authentication scheme based on robust hashing, in Proceedings of the 7th Workshop on Multimedia and Security ACM (2005) , pp. 111–116

  5. A.B.J. Teoh, D.C.L. Ngo, Biophasor: token supplemented cancellable biometrics, in IEEE 9th International Conference on Control, Automation, Robotics and Vision, ICARCV’06 (2006), pp. 1–5

  6. Y.W. Kuan, A.B. Teoh, D.C. Ngo, Secure hashing of dynamic hand signatures using wavelet—Fourier compression with biophasor mixing and 2n discretization. EURASIP J. Appl. Signal Process. 1, 32–32 (2007)

    MATH  Google Scholar 

  7. A. Teoh, C.T. Yuang, Cancelable biometrics realization with multispace random projections. IEEE Trans. Syst. Man Cybern. B Cybern. 37(5), 1096–1106 (2007)

    Article  Google Scholar 

  8. A. Lumini, L. Nanni, An improved biohashing for human authentication. Pattern Recogn. 40(3), 1057–1065 (2007)

    Article  ADS  MATH  Google Scholar 

  9. M. Savvides, B.V. Kumar, P.K. Khosla, Cancelable biometric filters for face recognition, in Proceedings of the 17th International Conference on Pattern Recognition, ICPR 2004, vol. 3 (IEEE, 2004), pp. 922–925

  10. N. Ratha, J. Connell, R.M. Bolle, S. Chikkerur, Cancelable biometrics: a case study in fingerprints, in 18th International Conference on Pattern Recognition, ICPR 2006, vol. 4 (IEEE, 2006), pp. 370–373

  11. S. Tulyakov, F. Farooq, V. Govindaraju, Symmetric hash functions for fingerprint minutiae, in Pattern Recognition and Image Analysis (Springer, 2005), pp. 30–38

  12. R. Ang, R. Safavi-Naini, L. McAven, Cancelable key-based fingerprint templates, in Information Security and Privacy (Springer, 2005), pp. 242–252.

  13. T.E. Boult, W.J. Scheirer, R. Woodworth, Revocable fingerprint biotokens: accuracyand security analysis, in IEEE Conference on Computer Vision and Pattern Recognition, CVPR’07 (IEEE, 2007), pp. 1–8

  14. F. Farooq, R.M. Bolle, T.Y. Jea, N. Ratha, Anonymous and revocable fingerprint recognition, in IEEE Conference on Computer Vision and Pattern Recognition, CVPR’07 (IEEE 2007), pp. 1–7.

  15. C. Lee, J. Kim, Cancelable fingerprint templates using minutiae-based bit-strings. J. Netw. Comput. Appl. 33(3), 236–246 (2010)

    Article  Google Scholar 

  16. ORLface Database, AT&T Laboratories Cambridge. http://www.cl.cam.ac.uk/

  17. A. Abaza, A. Ross, H. Christina, M. Harrison, M. Nixon, A survey on ear biometrics. ACM Comput. Surv. 45(2), 2 (2013). https://doi.org/10.1145/2431211.2431221

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abd El-Hamid Mohamed.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hassanin, AA.I.M., Abd El-Samie, F.E. & El-Hamid Mohamed, A. Privacy preservation of industrial access system users with cancellable face recognition based on inverse techniques. J Opt (2023). https://doi.org/10.1007/s12596-023-01155-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12596-023-01155-4

Keywords

Navigation