Skip to main content
Log in

Efficient implementation of cancelable face recognition based on elliptic curve cryptography

  • Published:
Optical and Quantum Electronics Aims and scope Submit manuscript

Abstract

Most modern authentication systems adopt human biometrics to avoid the shortcomings that result from forgetting passwords and security codes utilized in traditional systems. To increase the security level of the original biometric traits against offensive attacks, cancelable biometric patterns are generated from the original ones to control the system access. This paper presents a new approach for cancelable face recognition based on the concept of Elliptic Curve Cryptography (ECC). The ECC has been classified as a public-key (asymmetric) encryption technique. In public-key encryption, each user (transmitter and receiver) has two keys: a public key and a private key. The proposed framework guarantees full distortion and encryption of the original biometric traits to be saved in the database to completely hide them for intruders. To validate the proposed approach, three sets of face biometric databases have been used. The Receiver Operating Characteristic (ROC) curve and correlation scores are estimated to test the performance. The simulation results prove that the proposed approach is efficient, robust and it achieves promising results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Availability of data and materials

All data are available upon request from the corresponding author.

References

  • Abd El-Samie, F.E., Nassar, R.M., Safan, M., Abdelhamed, M.A., Khalaf, A.A., El Banby, G.M., El-Shafai, W.: Efficient implementation of optical scanning holography in cancelable biometrics. Appl. Opt. 60(13), 3659–3667 (2021)

    Article  ADS  Google Scholar 

  • Abdelwahab, K.M., El-atty, A., Saied, M., El-Shafai, W., El-Rabaie, S., El-Samie, A.: Efficient SVD-based audio watermarking technique in FRT domain. Multimed. Tools Appl. 79(9), 5617–5648 (2020)

    Article  Google Scholar 

  • Alarifi, A., Amoon, M., Aly, M.H., El-Shafai, W.: Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system. IEEE Access 8, 221246–221268 (2020a)

    Article  Google Scholar 

  • Alarifi, A., Sankar, S., Altameem, T., Jithin, K.C., Amoon, M., El-Shafai, W.: A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications. IEEE Access 8, 128548–128573 (2020b)

    Article  Google Scholar 

  • Algarni, A.D., El Banby, G., Ismail, S., El-Shafai, W., El-Samie, F.E.A., Soliman, N.F.: Discrete transforms and matrix rotation based cancelable face and fingerprint recognition for biometric security applications. Entropy 22(12), 1361 (2020a)

    Article  ADS  MathSciNet  Google Scholar 

  • Algarni, A.D., El Banby, G.M., Soliman, N.F., El-Samie, F.E.A., Iliyasu, A.M.: Efficient implementation of homomorphic and fuzzy transforms in random-projection encryption frameworks for cancelable face recognition. Electronics 9(6), 1046 (2020b)

    Article  Google Scholar 

  • Buriro, A., Crispo, B., Conti, M.: AnswerAuth: a bimodal behavioral biometric-based user authentication scheme for smartphones. J. Inf. Secur. Appl. 44, 89–103 (2019)

    Google Scholar 

  • El-Hameed, H.A.A., Ramadan, N., El-Shafai, W., Khalaf, A.A., Ahmed, H.E.H., Elkhamy, S.E., El-Samie, F.E.A.: Cancelable biometric security system based on advanced chaotic maps. Vis. Comput. 38(6), 2171–2187 (2022)

    Article  Google Scholar 

  • El-Shafai, W.: Joint adaptive pre-processing resilience and post-processing concealment schemes for 3D video transmission. 3D Res. 6(1), 1–13 (2015)

    Article  Google Scholar 

  • El-Shafai, W., Mohamed, F.A.H.E., Elkamchouchi, H.M., Abd-Elnaby, M., Elshafee, A.: Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm. IEEE Access 9, 77675–77692 (2021a)

    Article  Google Scholar 

  • El-Shafai, W., Almomani, I.M., Alkhayer, A.: Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access 9, 35004–35026 (2021b)

    Article  Google Scholar 

  • Faragallah, O.S., AlZain, M.A., El-Sayed, H.S., Al-Amri, J.F., El-Shafai, W., Afifi, A., Soh, B.: Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimed. Tools Appl. 79(3), 2495–2519 (2020)

    Article  Google Scholar 

  • FERET Database. Available online: https://www.nist.gov/itl/products-and-services/color-feret-database (2020b). Accessed 1 June 2020

  • Gowthami, A., Mamatha, H.: Fingerprint recognition using zone based linear binary patterns. Procedia Comput. Sci. 58, 552–557 (2015)

    Article  Google Scholar 

  • Harkanson, R., Kim, Y.: Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications. In: Proceedings of the 12th Annual Conference on Cyber and Information Security Research, pp. 1–7. (2017, April)

  • Hayat, U., Azam, N.A.: A novel image encryption scheme based on an elliptic curve. Signal Process. 155, 391–402 (2019)

    Article  Google Scholar 

  • Helmy, M., El-Shafai, W., El-Rabaie, E.S.M., El-Dokany, I.M., Abd El-Samie, F.E.: A hybrid encryption framework based on Rubik’s cube for cancelable biometric cyber security applications. Optik 258, 168773 (2022)

    Article  ADS  Google Scholar 

  • Ibrahim, S., Egila, M.G., Shawky, H., Elsaid, M.K., El-Shafai, W., Abd El-Samie, F.E.: Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimed. Tools Appl. 79(10), 14053–14078 (2020)

    Google Scholar 

  • Jain, A., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)

    Article  Google Scholar 

  • Kaur, H., Khanna, P.: Biometric template protection using cancelable biometrics and visual cryptography techniques. Multime. Tools Appl. 75(23), 16333–16361 (2016)

    Article  Google Scholar 

  • Kaur, G., Verma, C.K.: Comparative analysis of biometric modalities. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(4), 603–613 (2014)

    Google Scholar 

  • Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  • Laiphrakpam, D.S., Khumanthem, M.S.: Medical image encryption based on improved ElGamal encryption technique. Optik 147, 88–102 (2017)

    Article  ADS  Google Scholar 

  • Laiphrakpam, D.S., Khumanthem, M.S.: A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimed. Tools Appl. 77(7), 8629–8652 (2018)

    Article  Google Scholar 

  • Lauter, K.: The advantages of elliptic curve cryptography for wireless security. IEEE Wirel. Commun. 11(1), 62–67 (2004)

    Article  Google Scholar 

  • LFW Database. Available online http://vis-www.cs.umass.edu/lfw/ (2020b). Accessed 1 June 2020

  • Menezes, A.J., Okamoto, T., Vanstone, S.A.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theory 39(5), 1639–1646 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  • Miller, V. S.: Use of elliptic curves in cryptography. In: Conference on the Theory and Application of Cryptographic Techniques, pp. 417–426. Springer, Berlin, Heidelberg (1985)

  • Nishchal, N.K.: Optical cryptosystems. IOP Publishing (2019)

    Book  Google Scholar 

  • ORL Database. Available online https://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html (2020c). Accessed 1 June 2020

  • Patel, V.M., Ratha, N.K., Chellappa, R.: Cancelable biometrics: a review. IEEE Signal Process. Mag. 32(5), 54–65 (2015)

    Article  ADS  Google Scholar 

  • Punithavathi, P., Subbiah, G.: Can cancelable biometrics preserve privacy? Biom. Technol. Today 2017(7), 8–11 (2017)

    Article  Google Scholar 

  • Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)

    Article  Google Scholar 

  • Rathgeb, C., Busch, C.: Multi-biometric template protection: issues and challenges. New Trends Dev. Biom. (2012). https://doi.org/10.5772/52152

    Article  Google Scholar 

  • Soleymani, A., Nordin, M.J., Hoshyar, A.N., Ali, Z.M., Sundararajan, E.: An image encryption scheme based on elliptic curve and a novel mapping method. Int. J. Dig. Content Technol. Appl. 7(13), 85 (2013)

    Google Scholar 

  • Soliman, R.F., El Banby, G.M., Algarni, A.D., Elsheikh, M., Soliman, N.F., Amin, M., Abd El-Samie, F.E.: Double random phase encoding for cancelable face and iris recognition. Appl. Opt. 57(35), 10305–10316 (2018)

    Article  ADS  Google Scholar 

  • Soliman, N.F., Algarni, A.D., El-Shafai, W., Abd El-Samie, F.E., El Banby, G.M.: An efficient GCD-based cancelable biometric algorithm for single and multiple biometrics. CMC-Comput. Mater. Contin. 69(2), 1571–1595 (2021a)

    Google Scholar 

  • Soliman, N.F., Khalil, M.I., Algarni, A.D., Ismail, S., Marzouk, R., El-Shafai, W.: Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication. Multimed. Tools Appl. 80(3), 4789–4823 (2021b)

    Article  Google Scholar 

  • Toughi, S., Fathi, M.H., Sekhavat, Y.A.: An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Signal Process. 141, 217–227 (2017)

    Article  Google Scholar 

  • Washington, L.C.: Elliptic curves: number theory and cryptography. CRC Press (2008)

    Book  MATH  Google Scholar 

  • Xu, K.: Monolithically integrated Si gate-controlled light-emitting device: science and properties. J. Opt. 20(2), 024014 (2018)

    Article  ADS  Google Scholar 

  • Zhang, X., Wang, X.: Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE Access 6, 70025–70034 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

The researchers would like to acknowledge Deanship of Scientific Research, Taif University for funding this work.

Funding

The researchers would like to acknowledge Deanship of Scientific Research, Taif University for funding this work.

Author information

Authors and Affiliations

Authors

Contributions

All authors equally contributed.

Corresponding author

Correspondence to Walid El-Shafai.

Ethics declarations

Conflict of interest

The authors have neither relevant financial nor non-financial interests to disclose.

Ethical approval

Not applicable—The manuscript does not contain any human or animal studies.

Consent to participate

All authors contributed and accepted to submit the current work.

Consent to publication

All authors accepted to submit and publish the submitted work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Eltaieb, R.A., El-Banby, G.M., El-Shafai, W. et al. Efficient implementation of cancelable face recognition based on elliptic curve cryptography. Opt Quant Electron 55, 841 (2023). https://doi.org/10.1007/s11082-023-04641-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11082-023-04641-y

Keywords

Navigation