Multimedia Tools and Applications

, Volume 78, Issue 22, pp 32333–32355 | Cite as

Cancelable multi-biometric security system based on double random phase encoding and cepstral analysis

  • Y. Zakaria
  • Rana M. NassarEmail author
  • Osama Zahran
  • Gamal Attia Hussein
  • El-Sayed M. El-Rabaie
  • Said E. El-Khamy
  • Waleed Al-Nuaimy
  • Ibrahim M. El-Dokany
  • Fathi E. Abd El-Samie


Biometric systems are widely used now for security applications. Two major problems are encountered in biometric systems: the security problem and the dependence on a single biometric for verification. The security problem arises from the utilization of the original biometrics in databases. So, if these databases are attacked, the biometrics are lost forever. Hence, there is a need to secure original biometrics by keeping them away from utilization in biometric databases. Cancelable biometrics is an emerging security trend in the field of biometric authentication. The objective of cancelable biometrics is to generate fake versions of the biometrics through non-invertible transforms or encryption methods to save the original biometrics from being compromised to guarantee their security. The other problem of biometric verification is the dependence on a single biometric, which reduces the trustiness of the verification results. Hence, there is a bad need to use multiple biometrics for trusted verification results. Multiple biometrics can be acquired for the same person and used for verification with a majority voting scenario to ensure trusted verification results. So, there is a need to save all biometrics in a secure way, which allows authentication from each of them, afterwards. The storage of multiple biometrics consumes storage space. Hence, there is a need for some sort of compression to save this storage space, while keeping the discrimination ability of subjects. This paper presents a novel approach that solves the security, trustiness, and storage problems of biometric systems. It is a cancelable multi-biometric security system based on Double Random Phase Encoding (DRPE) and cepstral analysis. Four biometrics are comprised in a unified biometric template for each person using Discrete Cosine Transform (DCT) compression. This unified biometric template is encrypted with the DRPE algorithm for security purposes. The cancelability is guaranteed through the ability to change the random phase sequences of the DRPE algorithm if the database is compromised. The multi-biometric compression is performed through keeping the most significant coefficients in the DCT domain for all four biometrics. The biometric recognition is performed by decrypting the unified biometric template and applying a cepstral approach for verification of the subject. A majority voting scheme can be followed for biometric verification at the receivers of remote-access biometric systems. The main advantage of the proposed cancelable multi-biometric system is the large degree of security, the immunity to communication channel effects through the utilization of a majority voting strategy at the receiver, the ability to withstand the compression effect, and the irreversibility through the implementation of cepstral features for biometric verification.


Cancelable biometrics Compression Encryption DCT DRPE Cepstral analysis 



  1. 1.
    Alfalou A, Alkolidi A (2005) “Implementation of an all- optical image compression architecture based on fourier transform which will be the core principle in the realization of DCT”, Proc. SPIE 5823, pp. 183: 190Google Scholar
  2. 2.
    Ali MM, Tahir N (2018) “Cancelable biometric technique for iris recognition”, IEEE, Electronic ISBN: 978-1-5386-3527-8, pp. 434:437Google Scholar
  3. 3.
    Alkolidi A, Alfalou A, Hamam M (2007) A new approach for optical colored image compression using the JEPG standards. Journal of Signal Processing 87(4):569–583CrossRefGoogle Scholar
  4. 4.
    “CASIA-IrisV3 database,” Accessed July 2018
  5. 5.
    "CASIAPalmprintDatabase, Accessed July 2018
  6. 6.
    Fingerdata base Accessed July 2018
  7. 7.
    Gowthamim AT, Mamatha HR (2015) “Fingerprint recognition using zone based linear binary patterns ”,Elsevier,Procedia computer science ,pp.552:557Google Scholar
  8. 8.
    Guitter H (1995) “La compression des images numeriques”, Hermes since publication, in franceis, ISBN 286601510X, pp. 1:80Google Scholar
  9. 9.
    Jain A, Ross A, Nandakumar K (2017) “Introduction to biometrics”, Springer, ISBN 978-0-387-77326-1, pp. 1:49Google Scholar
  10. 10.
    Neifeld MA, Mahalanobis A, Brady DJ (2006) Task Specific Sensing-introduction. Applied Optics 45(13):2857–2858CrossRefGoogle Scholar
  11. 11.
  12. 12.
    Qiu J, Li H, Dong J (2018) “Design of cancelable palm print templates based on look up table”, Iop Conf. Series: materials science and engineering, pp.60:70Google Scholar
  13. 13.
    Ratha N, Chikkerur S, Connell J, Bolle R (2007) Generating cancelable finger print templates. IEEE Trans Pattern Anal Mach Intell 29(4):561: 571CrossRefGoogle Scholar
  14. 14.
    Rathgeb C, Barrero M, Busch C, Galbally J, Fierrez J (2015) “Towards cancelable multi-biometric based on bloom filters a case study on feature level fusion of face and iris”, IEEE. Electronic ISBN: 978-1-4799-8105-2, pp. 1:6Google Scholar
  15. 15.
    Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett, Vol 20 769:707Google Scholar
  16. 16.
    Reif JH, Yoshida A (1992) “Optical Techniques for Image Compression”, IEEE Processing of Data Compression Conference, ISBN: 0-8186-2717-4, pp. 32:41, Snowbird, Utah, MarchGoogle Scholar
  17. 17.
    Sandhya M, Prasad M (2017) Cancelable finger print cryptosystem using multiple spiral curves and fuzzy commitment scheme. International Journal of Pattern Recognition and Artificial Intelligence 31(4):14–32CrossRefGoogle Scholar
  18. 18.
    So liman RF, Ramadan N, Amin M, Ahmed HH, El-Khamy S, El-Samie FEA (2018) “Efficient cancelable iris recognition scheme based on modified logistic map”. Proceedings of the National Academy of Sciences publishedGoogle Scholar
  19. 19.
    Soliman RF, Amin M, Abd El-Samie FE (2018) “A modified cancelable biometrics scheme using random projection”, Springer, Annals of Data Science, pp. 1–14Google Scholar
  20. 20.
    Soliman RF, El banby GM, Algarni AD, Elsheikh M, Soliman NF, Amin M, El-Samie FEA (2018) Utilization of double random phase encoding for cancelable face and Iris recognition. Applied Optics, (OSA) Optical Society of America 57(35):10305–10316Google Scholar
  21. 21.
    Soliman RF, Amin M, Abd El-Samie FE (2018) A double random phase encoding approach for cancelable Iris recognition. Springer, Optical and Quantum Electronics 50(326):1–12Google Scholar
  22. 22.
    Soualmi S, Alfalou A, Hamam H (2007) Optical image compression based on segmentation of the fourier plane: new approaches and critical analysis. Journal of Optics: Pure And Applied Optics 9:73–80Google Scholar
  23. 23.
    Abd El-Samie FE (2011) Information security for automatic speaker identification, 1st Edition, SpringerGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Y. Zakaria
    • 1
    • 2
  • Rana M. Nassar
    • 1
    Email author
  • Osama Zahran
    • 1
  • Gamal Attia Hussein
    • 3
  • El-Sayed M. El-Rabaie
    • 1
  • Said E. El-Khamy
    • 4
  • Waleed Al-Nuaimy
    • 5
  • Ibrahim M. El-Dokany
    • 1
  • Fathi E. Abd El-Samie
    • 1
  1. 1.Department of Electronics and Electrical Communication EngineeringFaculty of Electronic Engineering, Menoufia UniversityMenoufEgypt
  2. 2.Giza SystemsCairoEgypt
  3. 3.Alexandria Higher Institute of Engineering and Technology (AIET), King MariottAlexandriaEgypt
  4. 4.Department of Electrical EngineeringFaculty of Engineering, Alexandria UniversityAlexandriaEgypt
  5. 5.Department of Electronics and Electrical EngineeringUniversity of LiverpoolLiverpoolUK

Personalised recommendations