Abstract
To strengthen security, we now use biometric technologies instead of passwords or tokens in a variety of authentication applications. Biometrics depend on parts of the human body. They have an advantage of not being lost. This paper seeks to safeguard biometrics within recognition systems by inducing intended distortions in biometric traits prior to saving them in a database for preventing hackers from accessing the actual biometrics. We can still use the biometrics, even if they are stolen or hacked in this situation by changing the distorted versions. Two approaches for face biometric distortion are presented in this paper, namely a regularization approach and a Linear Minimum Mean Square Error (LMMSE) approach. The regularization strategy begins by adding noise to the original faces, and then applying a regularized inverse on the noisy face images to create face images with amplified fixed noise patterns. The process of noise amplification is really a masking process that helps in the generation of cancellable templates. These versions of the face images can be used as templates for verification that can be cancelled and replaced with new templates if required. The other approach is cancellable face recognition based on the LMMSE algorithm, which begins with noise addition to the original faces and then application of LMMSE algorithm to the face images to obtain new templates with magnified fixed noise patterns. Finally, we compare between the two approaches in the cancellable face recognition application.
Similar content being viewed by others
References
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B.V. Kumar, Biometric encryption using image processing, in Photonics West’98 Electronic Imaging, International Society for Optics and Photonics (1998), pp. 178–188
N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacyin biometrics—based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)
A.T.B. Jin, D.N.C. Ling, A. Goh, Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245–2255 (2004)
Y. Sutcu, H.T. Sencar, N. Memon, A secure biometric authentication scheme based on robust hashing, in Proceedings of the 7th Workshop on Multimedia and Security ACM (2005) , pp. 111–116
A.B.J. Teoh, D.C.L. Ngo, Biophasor: token supplemented cancellable biometrics, in IEEE 9th International Conference on Control, Automation, Robotics and Vision, ICARCV’06 (2006), pp. 1–5
Y.W. Kuan, A.B. Teoh, D.C. Ngo, Secure hashing of dynamic hand signatures using wavelet—Fourier compression with biophasor mixing and 2n discretization. EURASIP J. Appl. Signal Process. 1, 32–32 (2007)
A. Teoh, C.T. Yuang, Cancelable biometrics realization with multispace random projections. IEEE Trans. Syst. Man Cybern. B Cybern. 37(5), 1096–1106 (2007)
A. Lumini, L. Nanni, An improved biohashing for human authentication. Pattern Recogn. 40(3), 1057–1065 (2007)
M. Savvides, B.V. Kumar, P.K. Khosla, Cancelable biometric filters for face recognition, in Proceedings of the 17th International Conference on Pattern Recognition, ICPR 2004, vol. 3 (IEEE, 2004), pp. 922–925
N. Ratha, J. Connell, R.M. Bolle, S. Chikkerur, Cancelable biometrics: a case study in fingerprints, in 18th International Conference on Pattern Recognition, ICPR 2006, vol. 4 (IEEE, 2006), pp. 370–373
S. Tulyakov, F. Farooq, V. Govindaraju, Symmetric hash functions for fingerprint minutiae, in Pattern Recognition and Image Analysis (Springer, 2005), pp. 30–38
R. Ang, R. Safavi-Naini, L. McAven, Cancelable key-based fingerprint templates, in Information Security and Privacy (Springer, 2005), pp. 242–252.
T.E. Boult, W.J. Scheirer, R. Woodworth, Revocable fingerprint biotokens: accuracyand security analysis, in IEEE Conference on Computer Vision and Pattern Recognition, CVPR’07 (IEEE, 2007), pp. 1–8
F. Farooq, R.M. Bolle, T.Y. Jea, N. Ratha, Anonymous and revocable fingerprint recognition, in IEEE Conference on Computer Vision and Pattern Recognition, CVPR’07 (IEEE 2007), pp. 1–7.
C. Lee, J. Kim, Cancelable fingerprint templates using minutiae-based bit-strings. J. Netw. Comput. Appl. 33(3), 236–246 (2010)
ORLface Database, AT&T Laboratories Cambridge. http://www.cl.cam.ac.uk/
A. Abaza, A. Ross, H. Christina, M. Harrison, M. Nixon, A survey on ear biometrics. ACM Comput. Surv. 45(2), 2 (2013). https://doi.org/10.1145/2431211.2431221
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Hassanin, AA.I.M., Abd El-Samie, F.E. & El-Hamid Mohamed, A. Privacy preservation of industrial access system users with cancellable face recognition based on inverse techniques. J Opt (2023). https://doi.org/10.1007/s12596-023-01155-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12596-023-01155-4