Abstract
Most modern authentication systems adopt human biometrics to avoid the shortcomings that result from forgetting passwords and security codes utilized in traditional systems. To increase the security level of the original biometric traits against offensive attacks, cancelable biometric patterns are generated from the original ones to control the system access. This paper presents a new approach for cancelable face recognition based on the concept of Elliptic Curve Cryptography (ECC). The ECC has been classified as a public-key (asymmetric) encryption technique. In public-key encryption, each user (transmitter and receiver) has two keys: a public key and a private key. The proposed framework guarantees full distortion and encryption of the original biometric traits to be saved in the database to completely hide them for intruders. To validate the proposed approach, three sets of face biometric databases have been used. The Receiver Operating Characteristic (ROC) curve and correlation scores are estimated to test the performance. The simulation results prove that the proposed approach is efficient, robust and it achieves promising results.
Similar content being viewed by others
Availability of data and materials
All data are available upon request from the corresponding author.
References
Abd El-Samie, F.E., Nassar, R.M., Safan, M., Abdelhamed, M.A., Khalaf, A.A., El Banby, G.M., El-Shafai, W.: Efficient implementation of optical scanning holography in cancelable biometrics. Appl. Opt. 60(13), 3659–3667 (2021)
Abdelwahab, K.M., El-atty, A., Saied, M., El-Shafai, W., El-Rabaie, S., El-Samie, A.: Efficient SVD-based audio watermarking technique in FRT domain. Multimed. Tools Appl. 79(9), 5617–5648 (2020)
Alarifi, A., Amoon, M., Aly, M.H., El-Shafai, W.: Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system. IEEE Access 8, 221246–221268 (2020a)
Alarifi, A., Sankar, S., Altameem, T., Jithin, K.C., Amoon, M., El-Shafai, W.: A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications. IEEE Access 8, 128548–128573 (2020b)
Algarni, A.D., El Banby, G., Ismail, S., El-Shafai, W., El-Samie, F.E.A., Soliman, N.F.: Discrete transforms and matrix rotation based cancelable face and fingerprint recognition for biometric security applications. Entropy 22(12), 1361 (2020a)
Algarni, A.D., El Banby, G.M., Soliman, N.F., El-Samie, F.E.A., Iliyasu, A.M.: Efficient implementation of homomorphic and fuzzy transforms in random-projection encryption frameworks for cancelable face recognition. Electronics 9(6), 1046 (2020b)
Buriro, A., Crispo, B., Conti, M.: AnswerAuth: a bimodal behavioral biometric-based user authentication scheme for smartphones. J. Inf. Secur. Appl. 44, 89–103 (2019)
El-Hameed, H.A.A., Ramadan, N., El-Shafai, W., Khalaf, A.A., Ahmed, H.E.H., Elkhamy, S.E., El-Samie, F.E.A.: Cancelable biometric security system based on advanced chaotic maps. Vis. Comput. 38(6), 2171–2187 (2022)
El-Shafai, W.: Joint adaptive pre-processing resilience and post-processing concealment schemes for 3D video transmission. 3D Res. 6(1), 1–13 (2015)
El-Shafai, W., Mohamed, F.A.H.E., Elkamchouchi, H.M., Abd-Elnaby, M., Elshafee, A.: Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm. IEEE Access 9, 77675–77692 (2021a)
El-Shafai, W., Almomani, I.M., Alkhayer, A.: Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access 9, 35004–35026 (2021b)
Faragallah, O.S., AlZain, M.A., El-Sayed, H.S., Al-Amri, J.F., El-Shafai, W., Afifi, A., Soh, B.: Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimed. Tools Appl. 79(3), 2495–2519 (2020)
FERET Database. Available online: https://www.nist.gov/itl/products-and-services/color-feret-database (2020b). Accessed 1 June 2020
Gowthami, A., Mamatha, H.: Fingerprint recognition using zone based linear binary patterns. Procedia Comput. Sci. 58, 552–557 (2015)
Harkanson, R., Kim, Y.: Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications. In: Proceedings of the 12th Annual Conference on Cyber and Information Security Research, pp. 1–7. (2017, April)
Hayat, U., Azam, N.A.: A novel image encryption scheme based on an elliptic curve. Signal Process. 155, 391–402 (2019)
Helmy, M., El-Shafai, W., El-Rabaie, E.S.M., El-Dokany, I.M., Abd El-Samie, F.E.: A hybrid encryption framework based on Rubik’s cube for cancelable biometric cyber security applications. Optik 258, 168773 (2022)
Ibrahim, S., Egila, M.G., Shawky, H., Elsaid, M.K., El-Shafai, W., Abd El-Samie, F.E.: Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimed. Tools Appl. 79(10), 14053–14078 (2020)
Jain, A., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)
Kaur, H., Khanna, P.: Biometric template protection using cancelable biometrics and visual cryptography techniques. Multime. Tools Appl. 75(23), 16333–16361 (2016)
Kaur, G., Verma, C.K.: Comparative analysis of biometric modalities. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(4), 603–613 (2014)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
Laiphrakpam, D.S., Khumanthem, M.S.: Medical image encryption based on improved ElGamal encryption technique. Optik 147, 88–102 (2017)
Laiphrakpam, D.S., Khumanthem, M.S.: A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimed. Tools Appl. 77(7), 8629–8652 (2018)
Lauter, K.: The advantages of elliptic curve cryptography for wireless security. IEEE Wirel. Commun. 11(1), 62–67 (2004)
LFW Database. Available online http://vis-www.cs.umass.edu/lfw/ (2020b). Accessed 1 June 2020
Menezes, A.J., Okamoto, T., Vanstone, S.A.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theory 39(5), 1639–1646 (1993)
Miller, V. S.: Use of elliptic curves in cryptography. In: Conference on the Theory and Application of Cryptographic Techniques, pp. 417–426. Springer, Berlin, Heidelberg (1985)
Nishchal, N.K.: Optical cryptosystems. IOP Publishing (2019)
ORL Database. Available online https://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html (2020c). Accessed 1 June 2020
Patel, V.M., Ratha, N.K., Chellappa, R.: Cancelable biometrics: a review. IEEE Signal Process. Mag. 32(5), 54–65 (2015)
Punithavathi, P., Subbiah, G.: Can cancelable biometrics preserve privacy? Biom. Technol. Today 2017(7), 8–11 (2017)
Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)
Rathgeb, C., Busch, C.: Multi-biometric template protection: issues and challenges. New Trends Dev. Biom. (2012). https://doi.org/10.5772/52152
Soleymani, A., Nordin, M.J., Hoshyar, A.N., Ali, Z.M., Sundararajan, E.: An image encryption scheme based on elliptic curve and a novel mapping method. Int. J. Dig. Content Technol. Appl. 7(13), 85 (2013)
Soliman, R.F., El Banby, G.M., Algarni, A.D., Elsheikh, M., Soliman, N.F., Amin, M., Abd El-Samie, F.E.: Double random phase encoding for cancelable face and iris recognition. Appl. Opt. 57(35), 10305–10316 (2018)
Soliman, N.F., Algarni, A.D., El-Shafai, W., Abd El-Samie, F.E., El Banby, G.M.: An efficient GCD-based cancelable biometric algorithm for single and multiple biometrics. CMC-Comput. Mater. Contin. 69(2), 1571–1595 (2021a)
Soliman, N.F., Khalil, M.I., Algarni, A.D., Ismail, S., Marzouk, R., El-Shafai, W.: Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication. Multimed. Tools Appl. 80(3), 4789–4823 (2021b)
Toughi, S., Fathi, M.H., Sekhavat, Y.A.: An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Signal Process. 141, 217–227 (2017)
Washington, L.C.: Elliptic curves: number theory and cryptography. CRC Press (2008)
Xu, K.: Monolithically integrated Si gate-controlled light-emitting device: science and properties. J. Opt. 20(2), 024014 (2018)
Zhang, X., Wang, X.: Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE Access 6, 70025–70034 (2018)
Acknowledgements
The researchers would like to acknowledge Deanship of Scientific Research, Taif University for funding this work.
Funding
The researchers would like to acknowledge Deanship of Scientific Research, Taif University for funding this work.
Author information
Authors and Affiliations
Contributions
All authors equally contributed.
Corresponding author
Ethics declarations
Conflict of interest
The authors have neither relevant financial nor non-financial interests to disclose.
Ethical approval
Not applicable—The manuscript does not contain any human or animal studies.
Consent to participate
All authors contributed and accepted to submit the current work.
Consent to publication
All authors accepted to submit and publish the submitted work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Eltaieb, R.A., El-Banby, G.M., El-Shafai, W. et al. Efficient implementation of cancelable face recognition based on elliptic curve cryptography. Opt Quant Electron 55, 841 (2023). https://doi.org/10.1007/s11082-023-04641-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11082-023-04641-y