Skip to main content
Log in

Secure cancelable face recognition system based on inverse filter

  • Research Article
  • Published:
Journal of Optics Aims and scope Submit manuscript

Abstract

Biometric systems have recently become popular for modern security applications. Unfortunately, these systems have been the target of many hacking attempts. Biometrics in biometric databases will be lost forever if they are hacked and stolen. As a result, there is an urgent need to implement modern upgradable biometric systems. Cancelable biometrics is based on the principle of transforming biometric data to alternate templates that cannot be easily exploited by an impostor or attacker and can be discarded if violated. The idea in this paper depends on the inverse filter in a cancelable face recognition system. Masked biometric images are produced in the proposed cancelable face recognition system by blurring, noise addition, and then inverse filtering. In image restoration theory, it is well understood that inverse filtering contributes to noise enhancement, which is an undesirable effect. On the contrary, this result would be desired in cancelable biometric systems. When noise is magnified, it can obscure the original biometrics, resulting in cancelable templates. This is the philosophy that underpins the proposed system. The proposed system was tested on the Olivetti and Oracle (ORL) dataset, the Labeled Faces in the Wild (LFW) database, and the Face Recognition Technology (FERET) database. Simulation results using evaluation metrics such as non-invertibility, unlinkability, visual inspection, false positive rate, false negative rate, Equal Error Rate (EER), decidability, correlation coefficient, and Area under the Receiver Operating Characteristic curve (AROC) show that the proposed cancelable biometric recognition system is quite effective for several security applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34

Similar content being viewed by others

References

  1. W. El-Shafai, I. Almomani, A. Alkhayer, Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access 2(9), 35004–35026 (2021)

    Article  Google Scholar 

  2. A. Alarifi, M. Amoon, M. Aly, W. El-Shafai, W, Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system. IEEE Access 3(8), 221246–221268 (2020)

    Article  Google Scholar 

  3. O. Faragallah, A. Afifi, H. El-Sayed, M. Alzain, J. Al-Amri, F. Abd El-Samie, W. El-Shafai, Efficient HEVC integrity verification scheme for multimedia cybersecurity applications. IEEE Access 7(8), 167069–167089 (2020)

    Article  Google Scholar 

  4. I. Elashry, W. El-Shafai, E. Hasan, S. El-Rabaie, A. Abbas, A. El-Samie, O. Faragallah, Efficient chaotic-based image cryptosystem with different modes of operation. Multimed. Tools Appl. 79(29), 20665–20687 (2020)

    Article  Google Scholar 

  5. N. Soliman, M. Khalil, A. Algarni, S. Ismail, R. Marzouk, W. El-Shafai, Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication. Multimed. Tools Appl. 80(3), 4789–4823 (2021)

    Article  Google Scholar 

  6. W. El-Shafai, Joint adaptive pre-processing resilience and post-processing concealment schemes for 3D video transmission. 3D Res. 6(1), 1–13 (2015)

    Article  Google Scholar 

  7. K. Abdelwahab, A. El-atty, M. Saied, W. El-Shafai, S. El-Rabaie, A. El-Samie, Efficient SVD-based audio watermarking technique in FRT domain. Multimed. Tools Appl. 79(9), 5617–5648 (2020)

    Article  Google Scholar 

  8. A. Algarni, G. El Banby, S. Ismail, W. El-Shafai, F. El-Samie, N.F. Soliman, Discrete transforms and matrix rotation based cancelable face and fingerprint recognition for biometric security applications. Entropy 22(12), 1361 (2020)

    Article  MathSciNet  PubMed  PubMed Central  ADS  Google Scholar 

  9. N. El-Hag, A. Sedik, W. El-Shafai, H. El-Hoseny, A. Khalaf, A. El-Fishawy, G. El-Banby, Classification of retinal images based on convolutional neural network. Microsc. Res. Tech. 84(3), 394–414 (2021)

    Article  PubMed  Google Scholar 

  10. L. Abou Elazm, S. Ibrahim, M. Egila, H. Shawky, M. Elsaid, W. El-Shafai, F. Abd El-Samie, Cancellable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimed Tools Appl. 7(9), 14053–14078 (2020)

    Article  Google Scholar 

  11. W. El-Shafai, S. El-Rabaie, M. El-Halawany, F. El-Samie, Enhancement of wireless 3d video communication using color-plus-depth error restoration algorithms and Bayesian Kalman filtering. Wirel Pers. Commun. 97(1), 245–268 (2017)

    Article  Google Scholar 

  12. O. Faragallah, W. El-Shafai, A. Sallam, I. Elashry, E. El-Rabaie, A. Afifi, H. El-sayed, Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. J. Ambient Intell. Humanid Comput. 13(2), 1215–1239 (2022)

    Article  Google Scholar 

  13. I. Badr, A. Radwan, E. El-Rabaie, L. Said, G. El Banby, W. El-Shafai, F. Abd El-Samie, Cancellable face recognition based on fractional-order Lorenz chaotic system and Haar wavelet fusion. Digital Sign. Process 11(6), 103103 (2021)

    Article  Google Scholar 

  14. W. El-Shafai, F. Mohamed, H. Elkamchouchi, M. Abd-Elnaby, A. Elshafee, Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm. IEEE Access 2(9), 77675–77692 (2021)

    Article  Google Scholar 

  15. F. Abd El-Samie, R. Nassar, M. Safan, M. Abdelhamed, A. Khalaf, G. El Banby, W. El-Shafai, Efficient implementation of optical scanning holography in cancelable biometrics. Appl. Opt. 60(13), 3659–3667 (2021)

    Article  PubMed  ADS  Google Scholar 

  16. S. Ibrahim, M. Egila, H. Shawkey, M. Elsaid, W. El-Shafai, F. Abd El-Samie, Hardware implementation of cancellable biometric systems, in Fourth IEEE International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 1145-1152 (October) (2020)

  17. H. El-Hameed, N. Ramadan, W. El-Shafai, A. Khalaf, H. Ahmed, S. Elkhamy, F. El-Samie, Cancelable biometric security system based on advanced chaotic maps. The V Comput 38(6), 2171–2187 (2021)

    Google Scholar 

  18. I. Almomani, W. El-Shafai, A. AlKhayer, A. Alsumayt, S. Aljameel, Proposed biometric security system based on deep learning and chaos algorithms. Comput., Mater. Contin. 74(2), 3515–3537 (2023)

    Google Scholar 

  19. L. Elazm, W. El-Shafai, S. Ibrahim, M. Egila, H. Shawkey, Efficient hardware design of a secure cancellable biometric cryptosystem. Intell. Autom. Soft Comput. 36(1), 929–955 (2023)

    Article  Google Scholar 

  20. W. El-Shafai, M. Elsayed, M. Rashwan, M. Dessouky, A. El-Fishawy, Optical ciphering scheme for cancellable speaker identification system. Comput. Syst. Sci. Eng. 45(1), 563–578 (2023)

    Article  Google Scholar 

  21. A. Ayoup, A. Khalaf, W. El-Shafai, F. Abd El-Samie, F. Alraddady, S. Eldin, Cancellable multi-biometric template generation based on arnold cat map and aliasing. CMC-Comp. Mater. Continua 72(2), 3687–3703 (2022)

    Article  Google Scholar 

  22. S. El-Gazar, W. El Shafai, G. El Banby, H. Hamed, G. Salama, M. Abd-Elnaby, F. Abd El-Samie, Cancelable speaker identification system based on optical-like encryption algorithms. Comput. Syst. Sci. Eng. 43(1), 87–102 (2022)

    Article  Google Scholar 

  23. A. Ayoup, A. Khalaf, F. Alraddady, F. Abd El-Samie, W. El-Shafai, Cancelable multi-biometric template generation based on dual-tree complex wavelet transform. Intell. Autom Soft Comput. 33(2), 1289–1304 (2022)

    Article  Google Scholar 

  24. I. Almomani, A. AlKhayer, W. El-Shafai, Novel ransomware hiding model using HEVC steganography approach. CMC Comput. Mater. Cont 70(2), 1209–1228 (2021)

    Google Scholar 

  25. A. Alarifi, S. Sankar, T. Altameem, K. Jithin, M. Amoon, W. El-Shafai, A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications. IEEE Access 8(2), 128548–128573 (2020)

    Article  Google Scholar 

Download references

Acknowledgement

The researchers would like to acknowledge Deanship of Scientific Research, Taif University for funding this work.

Funding

The researchers would like to acknowledge Deanship of Scientific Research, Taif University for funding this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walid El-Shafai.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Farouk, A.ER., Abd-Elnaby, M., Ashiba, H.I. et al. Secure cancelable face recognition system based on inverse filter. J Opt (2024). https://doi.org/10.1007/s12596-023-01233-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12596-023-01233-7

Keywords

Navigation