Skip to main content
Log in

VLSI Implementation of Reliable and Secure Face Recognition System

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Biometric authentications systems are being recognized as the better way of securing data or personal devices as they are unique. Face is considered the best way to authenticate, among all the biometric authentication techniques, due to better FAR (False Acceptance Ratio), FRR (False Rejection Ratio), and minimized error as no physical contact is required with the system. Securing the biometric information is important as it is the personal information of the user which could be exploited. The paper presents the design and implement of face recognition system on FPGA (Field Programmable Gate Array) that would provide a secure and reliable face recognition system. In the proposed system, biometric data is not saved in the database directly, instead, random data is saved along with a hash function which is matched during authentication. Reed-Solomon codes along with hash functions are used to correct data along with the additional level of security. The proposed system has best FAR in comparison of similar previous work for biometric authentication. The accuracy of the proposed system also outperforms other related work. The hardware performance also reveals the usefulness of proposed system in real-time authentication applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Jannati, H., & Bahrak, B. (2017). An oblivious transfer protocol based on elgamal encryption for preserving location privacy. Wireless Personal Communications, 97(2), 3113–3123.

    Article  Google Scholar 

  2. Joshi, A., Mishra, V., & Patrikar, R. M. (2012). Real time implementation of digital watermarking algorithm for image and video application. In M.D. Gupta (Ed.), Watermarking (pp. 65–81). Rijeka, Croatia: Intech Publishers.

  3. Vashistha, A., & Joshi, A. M. (2016). Fingerprint based biometric watermarking architecture using integer DCT. In 2016 IEEE region 10 conference (TENCON) (pp. 2818–2821). IEEE.

  4. Yavuz, A. A., Mudgerikar, A., Singla, A., Papapanagiotou, I., & Bertino, E. (2017). Real-time digital signatures for time-critical networks. IEEE Transactions on Information Forensics and Security, 12(11), 2627–2639.

    Article  Google Scholar 

  5. Joshi, A. M., Mishra, V., & Patrikar, R. M. (2016). FPGA prototyping of video watermarking for ownership verification based on H. 264/AVC. Multimedia Tools and Applications, 75(6), 3121–3144.

    Article  Google Scholar 

  6. Joshi, A. M., & Bramha, A. (2020). Vlsi architecture of block matching algorithms for motion estimation in high efficiency video coding. Wireless Personal Communications, 112, 907–922. https://doi.org/10.1007/s11277-020-07081-z

  7. Telgad, R. L., Deshmukh, P. D., Siddiqui, A. M. N. (2014). Combination approach to score level fusion for multimodal biometric system by using face and fingerprint. In Recent Advances and Innovations in Engineering (ICRAIE), IEEE, (pp. 1–8).

  8. Joshi, A. M., Mishra, V., & Patrikar, R. M. (2015). Design of real-time video watermarking based on Integer DCT for H. 264 encoder. International Journal of Electronics, 102(1), 141–155.

    Article  Google Scholar 

  9. Kouser, Z., Singhal, M., & Joshi, A. M. (2016). FPGA implementation of advanced encryption standard algorithm. In 2016 International conference on recent advances and innovations in engineering (ICRAIE) (pp. 1–5). IEEE.

  10. Singh, N., Agrawal, A., & Khan, R. A. (2018). Voice biometric: A technology for voice based authentication. Advanced Science, Engineering and Medicine, 10(7–8), 754–759.

    Article  Google Scholar 

  11. Raghavendra, C., Kumaravel, A., & Sivasubramanian, S. (2017). Iris technology: A review on iris based biometric systems for unique human identification. In 2017 International conference on algorithms, methodology, models and applications in emerging technologies (ICAMMAET) (pp. 1–6), IEEE.

  12. Patel, V. M., Ratha, N. K., & Chellappa, R. (2015). Cancelable biometrics: A review. IEEE Signal Processing Magazine, 32(5), 54–65.

    Article  Google Scholar 

  13. Jin, Z., Hwang, J. Y., Lai, Y. L., Kim, S., & Teoh, A. B. J. (2017). Ranking-based locality sensitive hashing-enabled cancelable biometrics: Index-of-max hashing. IEEE Transactions on Information Forensics and Security, 13(2), 393–407.

    Article  Google Scholar 

  14. Chee, K. Y., Jin, Z., Cai, D., Li, M., Yap, W. S., Lai, Y. L., & Goi, B. M. (2018). Cancellable speech template via random binary orthogonal matrices projection hashing. Pattern Recognition, 76, 273–287.

    Article  Google Scholar 

  15. Xiang, C., Tang, C., Cai, Y., & Xu, Q. (2016). Privacy-preserving face recognition with outsourced computation. Soft Computing, 20(9), 3735–3744.

    Article  Google Scholar 

  16. Juels, A., & Sudan, M. (2006). A fuzzy vault scheme. Designs, Codes and Cryptography, 38(2), 237–257.

    Article  MathSciNet  Google Scholar 

  17. Sutcu, Y., Li, Q., & Memon, N. (2007). How to protect biometric templates. In Security, Steganography, and Watermarking of Multimedia Contents IX International Society for Optics and Photonics (Vol. 6505, p. 650514).

  18. Park, U., Park, J., & Jain, A. K. (2014). Robust keypoint detection using higher-order scale space derivatives: Application to image retrieval. IEEE Signal Processing Letters, 21(8), 962–965.

    Article  Google Scholar 

  19. Fathi, A., Alirezazadeh, P., & Abdali-Mohammadi, F. (2016). A new Global-Gabor-Zernike feature descriptor and its application to face recognition. Journal of Visual Communication and Image Representation, 38, 65–72.

    Article  Google Scholar 

  20. Rasti, S., Yazdi, M., & Masnadi-Shirazi, M. A. (2018). Biologically inspired makeup detection system with application in face recognition. IET Biometrics, 7(6), 530–535.

    Article  Google Scholar 

  21. Bhowmik, M. K., Saha, P., Singha, A., Bhattacharjee, D., & Dutta, P. (2019). Enhancement of robustness of face recognition system through reduced gaussianity in Log-ICA. Expert Systems with Applications, 116, 96–107.

    Article  Google Scholar 

  22. Cheng, E. J., Chou, K. P., Rajora, S., Jin, B. H., Tanveer, M., Lin, C. T., Young, K. Y., Lin, W. C., & Prasad, M. (2019). Deep sparse representation classifier for facial recognition and detection system. Pattern Recognition Letters, 125, 71–77.

    Article  Google Scholar 

  23. Joshi, A. M., Patrikar, R. M., & Mishra, V. (2012). Design of low complexity video watermarking algorithm based on Integer DCT. In 2012 International conference on signal processing and communications (SPCOM), 2012, July, (pp. 1–5). IEEE.

  24. Kevenaar, T. A., Schrijen, G. J., van der Veen, M., Akkermans, A. H., & Zuo, F. (2005). Face recognition with renewable and privacy preserving binary templates. In Fourth IEEE workshop on automatic identification advanced technologies (AutoID'05), (2005), October, (pp. 21–26), IEEE.

  25. Joshi, A. M., Ansari, S., & Ravikumar, M. (2017). VLSI architecture of integer DCT based watermarking with error correction capability. In TENCON 2017–2017 IEEE region 10 conference, (2017), November, (pp. 2961–2966), IEEE.

  26. Toygar, Ö., Alqaralleh, E., & Afaneh, A. (2018). Person identification using multimodal biometrics under different challenges. In G. Anbarjafari, & S. Escalera (Eds.), Human-Robot Interaction - Theory and Application Chapter 5, (pp. 81–96). https://doi.org/10.5772/intechopen.71667

  27. Dodis, Y., Reyzin, L., & Smith, A. (2004). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In International conference on the theory and applications of cryptographic techniques (pp. 523–540). Springer, Berlin, Heidelberg, (2004), May.

  28. Joshi, A., Mishra, V., & Patrikar, R. (2015). Real time implementation of integer DCT based video watermarking architecture. International Arab Journal of Information Technology (IAJIT), 12, 741–747.

Download references

Acknowledgements

The author would be thankful to Government of India who has supported various EDA tools at SMDP-C2SD Lab. The simulation and synthesis results are carried out through Xilinx Vivado Tool of SMDP-C2SD lab.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit M. Joshi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, V., Joshi, A.M. VLSI Implementation of Reliable and Secure Face Recognition System. Wireless Pers Commun 122, 3485–3497 (2022). https://doi.org/10.1007/s11277-021-09096-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09096-6

Keywords

Navigation