Proposed Cancelable Face Recognition System Based on Histogram of Oriented Gradients

Document Type : Original Article

Authors

1 Department of Electronics and Electrical communications Engineering, Faculty of Electronic Engineering, Menoufia University Menouf, Egypt

2 Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University Menouf, Egypt

3 Department of Industrial Electronics Engineering and Control, Faculty of Electronic Engineering, Menoufia University Menouf, Egypt

Abstract

nowadays have seen exponential growth in the usage of various biometric technologies in authenticated automatic recognition of humans. With the fast adaptation of biometric systems, there is a vital concern that biometric technologies may compromise the privacy and anonymity of individuals. To restrain the theft of biometric templates, it is desirable to alter them through noninvertible and revocable transformations to produce a cancelable biometric pattern. In this paper, we propose cancelable face pattern generation technique based on component Histogram of Oriented Gradients (HOG) and The Optical Double Random Phase Encoding (DRPE) algorithm. The proposed is evaluated by the security degree and receiver operating characteristic (ROC) Experiments carried out on diverse face databases assure the efficiency of the proposed approach. The proposed template succeeds to hide the details of the images and enhances ROC compared to the traditional standard.

Keywords


] S. Rane, Y. Wang, S. C. Draper, and P. Ishwar, ‘‘Secure biometrics: Concepts, authentication architectures and challenges,’’ IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 51–64, Sep. 2013
[2] I. Natgunanathan, A. Mehmood, Y. Xiang, G. Beliakov, and J. Yearwood, “Protection of Privacy in Biometric Data,” IEEEAccess, vol. 4, pp. 880–892,2016.
[3] K. Nandakumar and A. K. Jain, ‘‘Biometric template protection: Bridging the performance gap between theory and practice, IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 88–100, Sep. 2015
 [4] A. Hadid, N. Evans, S. Marcel, J. Fierrez, “Biometrics systems under spoofing attack an evaluation methodology and lessons learned,” IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 20–30, Sept 2015.
[5] Daniel F Smith, Arnold Wiliem, and Brian C Lovell, “Face recognition on consumer devices: Reflections on replay attacks,” IEEE Transactions on Information Forensics and Security, vol 10, no. 4, pp. 736–745, April 2015.
[6] M. Barni, G. Droandi, R. Lazzeretti, “Privacy protection in biometric-based recognition systems: a marriage between cryptography and signal processing,” IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 66–76, Sept 2015.
[7] V. M. Patel, N. K. Ratha, and R. Chellappa, “Cancelable biometrics: A review,” IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 54–65, Sept 2015
 [8] M. Lim, A.-B. Teoh, and J. Kim, ‘‘Biometric feature-type transformation: Making templates compatible for secret protection,’’, IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 77–87, Sep. 2015.
[9] A. Hadid, N. Evans, S. Marcel, and J. Fierro, ‘‘Biometrics systems under spoofing attack: An evaluation methodology and lessons learned,’’ IEEE Signal Processing Magazine., vol. 32, no. 5, pp. 20–30, Sep. 2015.
[10] J. K. Pillai, V. M. Patel, R. Chellappa and N. K. Ratha, ‘‘Sectored random projections for cancelable iris biometrics,’’ in ICASSP, 2010, pp. 1838–1841.
[11] J. K. Pillai, V. M. Patel, R. Chellappa and N. K. Ratha, ‘‘Secure and robust iris recognition using random projections and sparse representations,’’ IEEE Trans. Pattern Anal. Mach. Intell. 30(9), 1877 (2011)
 [12] P. P. Paul and M. Gavrilova, “Multimodal cancelable biometrics,’’ in Proc. Kyoto, pp. 43–49, August 22–24, 2012.
[13] N. K. Ratha, J. H. Connel and R. Bolle, ‘‘Enhancing security and privacy in biometrics-based authentication systems,’’ IBM System J. vol.40, no. 3, 614 (2001)
[14] E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia and A. Neri, ‘‘Cancelable templates for sequence-based biometrics with application to on-line signature recognition’’ IEEE Trans. Syst. Man Cybern. A, vol.40, no. 3, 525 (2010).
[15] A.B.J. Teoh, D.C.L. Ngo, A. Goh, “Personalised cryptographic key generation based on FaceHashing", Comput. Security J. vol.23 no.7, pp .606–614, 2004.
[16] C. Rathgeb, F. Breitinger, C. Busch and H. Baier, “On application of bloom filters to iris
biometrics," IET Biometrics vol.3, no.4, 2014.
 [17] T Adiono, KS Prakoso, CD Putratama, B Yuwono and S Fuada, “HOG-AdaBoost Implementation for Human Detection Employing FPGA ALTERA DE2-115"International Journal of Advanced Computer and Applications Processing Magazine, Vol. 9, No. 10, 2018.
[18] C. H. Chuang and Y. L. Chen, “Steganographic optical image encryption system based on reversible data hiding and double random phase encoding,” Opt. Eng. Processing Magazine, vol.52, no.2, 2013
[19] A. M. Elshamy, F. E. Abd El-Samie, O. S. Faragallah, E. M. Elshamy,H. S. El-Sayed, S. F. El-Zoghdy, A. N. Z. Rashed, A. A. Mohamed, and A. Q. Alhamad, “Optical image cryptosystem using double random phase encoding and Arnold’s Cat map,” Opt. QuantumElectron. Vol.48, pp.1–18, 2016.
[21] L. Lenc and P. Kral, “Automatic face recognition system based on the SIFT features,” Comput. Electr. Eng. 46, 256–272 (2015).
 
Volume 28, ICEEM2019-Special Issue
ICEEM2019-Special Issue: 1st International Conference on Electronic Eng., Faculty of Electronic Eng., Menouf, Egypt, 7-8 Dec.
2019
Pages 138-144