Cancelable Fingerprint Recognition based on Encrypted Convolution Kernel in Different Domains

Document Type : Original Article

Authors

1 Electronics and Electrical Communications Engineering Department, Faculty of Electronic Engineering, Menouf 32951, Menoufia University.

2 Department of Electrical Engineering, Faculty of Engineering, Kafrelsheikh University, Egypt.

Abstract

Peoples’ biometrics, such as fingerprints, are unique , as a result it can be used in many evidence security requests, such as employees’ registration gate, crime investigation, and revealing smart phones. The security of fingerprints is very critical in protecting the peoples’ identity. In this research, a cancelable fingerprint recognition system is proposed. The proposed system is based on comprising four biometrics in a unified biometric template for each person using Discrete Cosine Transform (DCT) compression. This unified biometric template is encrypted with different convolution kernels produced by chaotic Baker map in different domains. The Integer Wavelet Transform (IWT) and the Discrete Wavelet Transform (DWT) are used to create different transformations of the fingerprint. In case a transformed fingerprint is compromised, the biometric fingerprint transformation is reorganized with another transformation. A comparative study between different transform-domains in the occurrence of attacks shows the authority of encryption in the DWT domain with different keys. Both Equal Error Rate (EER) and Area under Receiver Operating Characteristic (AROC) curve are used for performance evaluation revealing high performance of the proposed system.

Keywords


[1] A. K. Jain, A. A. Ross, and K. Nandakumar, “ Introduction to Biometrics,” Springer, 2011, http://www.csee.wvu.edu/ross/BiometricsTextBook.
[2] Ritu and M. Garg, “A Review on Fingerprint Based Identification System,” SBIET College IJARCCE, Vol. 3, No. 3, 2014.
[3] L. Kocarev, S. Lian, “Chaos-Based Cryptography”, Algorithms and Applications, vol. 354, Berlin 2011.
[4] C.C. Chang, M.S. Hwang, T.S. Chen, "A New Encryption Algorithm for Image Cryptosystems," Proceedings of the Journal of Syst. Software, vol. 58, pp. 83–91, 2001.
[5] Alfalou A, Alkolidi A (2005) “Implementation of an all- optical image compression architecture based on
[6] fourier transform which will be the core principle in the realization of DCT”, Proc. SPIE 5823, pp. 183: 190V. M. Patel, N. K. Ratha, and R. Chellappa, “Cancelable biometrics: A Review,” Proceedings of the IEEE Signal Processing Magazine 32(5), 54-65, 2015.
[7] A. Sarkar and B. K. Singh “Cancelable biometric based key generation for symmetric cryptography,” International Conference on Inventive Communication and Computational Technologies (ICICCT),doi:10.1109/icicct.2017.7975229,2017.
[8] H. Kaur and P. Khanna, “Non-invertible biometric encryption to generate Cancelable biometric templates,” Proceedings of the world Congress on Engineering and Computer Science, San Francisco USA I, October 25-27, 2017.
[9] Wei-Chao Liu and Hong-tao Guo, “Occluded Fingerprint Recognition Algorithm Based on Multi Association Features Match,” Proceedings of the Journal Of Multimedia, Vol. 9, No. 7, pp. 910 - 917, 2014.
[10] S. Wang, G. Deng, and J. Hu, “A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations,” Proceedings of the Pattern Recognition Vol. 61, pp. 447-458, 2017.
[11] W. Yang, S. Wang, J. Hu, G. Zheng, and C. Valli, “A fingerprint and finger-vein based cancelable multi-biometric system, ” Proceedings of the Pattern Recognition Vol. 78, pp. 242-251, 2018.
[12] Z. Jin, M.H.Lim, A.B.J.Teoh, B.M.Goi, “A non-invertible randomized graph- based Hamming embedding for generating cancelable fingerprint template,” Pattern Recognit. Lett., Vol. 42,
[13] S. Wang and J. Hu, “Design of alignment-free cancelable fingerprint templates via curtailed circular convolution,” Proceedings of the Elsevier J. Pattern Recognition. Vol.47, no. 3, pp. 1321- 1329, 2014.
[14] P. Das, K. Karthik and B. C. Garai, “A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs," Proceedings of the Elsevier J. Pattern Recognition. Vol. 45, no. 9, pp. 3373-3388 , 2012.
[15] Carmen Pellicer- Lostao, Ricardo Lopez-Ruiz, “Notions of Chaotic Cryptography, Sketch of a Chaos based Cryptosystem”, Proceedings of the Applied Cryptosystem and network Security (Intech Books), 1st Edition, pp. 267-294, March 2012.
[16] G. Bhatnagar, and Q. Wu, “Chaos-Based Security Solution for Fingerprint Data during Communication and Transmission,” Proceedings of the Instrumentation and Measurement, IEEE Transactions on, Vol. 61, No. 4, pp. 876-887, 2012.
[17] Ensherah A. Naeem, Mustafa M. Abd Elnaby , Naglaa F. Soliman , Alaa M. Abbas, Osama S. Faragallah, Noura Semary, Mohiy M. Hadhoud f, Saleh A. Alshebeili, Fathi E. Abd El-Samie, " Efficient implementation of chaotic image encryption in transform domains", Proceedings of the Journal of Systems and Software, Vol. 97, pp. 118–127 , 2014.
[18] B. V. K. V. Kumar, A. Mahalanobis, and R. D. Juday, “Correlation Pattern Recognition,” Cambridge Univ. Press, 2005.
[19] A. Sarkar, B. K. Singh, and U. Bhaumik, “Cryptographic Key Generation Scheme from Cancellable Biometrics,” Progress in Computing Analytics and Networking 265–272.doi:10.1007/978-981-10-7871-2_26, 2018.
[20] Soliman RF, Amin M, Abd El-Samie FE ," A double random phase encoding approach for cancelable Iris recognition," Springer, Optical and Quantum Electronics no.50, Vol.326, pp.1–12,2018.
[21] S. Wang, and J. Hu, “A blind system identification approach to cancelable fingerprint templates,” Proceedings of Pattern Recognition Vol. 54, pp. 14-22, 2016.
[22] Technical Document about FAR, FRR and ERR, Version 1.0, by SYRIS Technology Corporation, 2004.
[23] Wu, J. C., and Wilson, C. L., “An empirical study of sample size in ROC-curve analysis of fingerprint data,” Proceedings of the
Biometric Technology for Human Identification III (SPIE), Vol. 6202, DOI: 10.1117/12.665601, 2006.
[24] Fingerdata base http://bias.csr.unibo.it/fvc2002/databases.asp ,Accessed July 2018.
[25] CASIA-Iris V3 Database, http://www.cbsr.ia.ac.cn/ English/Iris Data base.asp. Accessed December 2018.
[26] CASIA Palmprint Database, http://biometrics.idealtest.org / Accessed July 2018.
[27] ORL database: https://www.cl.cam.ac.uk/research/dtg/ attarchive /facedatabase.html, Accessed July 2018.