Cancelable Face Recognition System Based on Optical Scanning Holography

Document Type : Original Article

Authors

1 Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University: Menouf, Egypt

2 Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University, Egypt

Abstract

Recently, biometrics has emerged joined of the foremost necessary methods of template preservation and most modern security systems rely on biometrics. Unfortunately, these systems have experienced for quite a while hacking endeavors. If biometric databases are compromised and stolen, biometrics spared in these databases will be lost until the end of time. Consequently, there is an immediate need to grow new upgrade biometric systems. The concept behind cancelable biometrics is to convert biometric data or extracted feature to an alternative template, which can't be easily used by the impostor or intruder and can be eliminated if it is breached. In this paper, the optical scanning holography (OSH) algorithm is utilized as cancelable face recognition system. In the proposed cancelable face recognition technique, the encrypted images are generated by OSH technique. Simulation results using evaluation metrics False Positive Rate (FPR), False Negative Rate (FNR), Equal Error Rate (EER), Receiver Operating Characteristic (ROC) and Area under ROC (AROC) prove that the the proposed cancelable biometric technique is good.

Keywords


[1]     A. K. Jain, A. A. Ross, and K. Nandakumar,” Introduction to Biometrics”, Springer, 2017.
[2]     N. K.Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems”, IBM Systems Journal, Vol. 40, pp. 614–634, 2001.
[3]     N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelable fingerprint templates”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 29,pp. 561–572, 2007.
[4]     A. B. J. Teoh, D. Ngo, and A. Goh, “Biohashing: two factor authentication featuring fingerprint data and tokenised random number”, Pattern Recognition, Vol. 37, pp. 2245–2255, 2004.
[5]     M. Savvides, B.V. Kumar and P. K. Khosla, “Cancelable biometric filters for face recognition”, Proceedings of the 17th International Conference on Pattern Recognition (ICPR04), Vol. 3, pp. 922–925, 2004.
[6]     L. C. Jain, “Intelligent Biometric Techniques in Fingerprint and Face recognition”, 1999.
[7]     T. E. Boult, W. J. Scheirer and R. Woodworth, “Revocable fingerprint biotokens: Accuracy and security analysis”, IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–8, 2007.
[8]     E. Maiorana, P. Campisi, J. Ortega-Garcia, and A. Neri, “Cancelable Biometrics for HMM-based Signature Recognition”, IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS), 2008.
[9]     A. Juels, and M. Wattenberg, “A fuzzy commitment scheme”, Proceedings of the Sixth ACM Conference on Computer and communication Security (CCCS), pp. 28–36, 1999.
[10]  S. Kanade, D. camara, E. Krichen, D. Petrovska-Delacretaz, and B. Dorizzi, “Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris”, The 6th Biometrics Symposium (BSYM), 2008.
[11]  S. Kanade, D. Petrovska-Delacretaz, and B. Dorizzi, “Generating and Sharing Biometrics Based Session Keys for Secure Cryptographic Applications”, IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS), 2010.
[12]  S. Kanade, D. Petrovska-Delacretaz, and B. Dorizzi, “Obtaining Cryptographic Keys Using Feature Level Fusion of Iris and Face Biometrics for Secure User Authentication”, IEEE CVPR Workshop on Biometrics, 2010.
[13]  P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding", Optics Letters, Vol. 20, pp. 767-769, 1995.
[14]  T.-C. Poon, “Optical Scanning Holography with MATLAB”, Springer, New York, 2007.
[15]  B. D. Duncan and T.-C. Poon, “Gaussian beam analysis of optical scanning holography,” J. Opt. Soc. Am. 9, 229–236 (1992).
[16]  A. M. Elshamy, A. N. Z. Rashed, A. A. Mohamed, O. S. Faragallah, Y. Mu, S. A. Alshebeili, and F. E. Abd El-Samie, “Optical image encryption based on chaotic Baker map and double random phase encoding”, IEEE Journal of Lightwave Technology, Vol. 31, No.15, pp. 2533-2539, 2013.
[17]  SC. Pei, and MH. Yeh, “Two dimensional discrete fractional Fourier transform”, Signal Processing, Vol. 67, pp 99-108, 1998.
[18]  H. M. Ozaktas, “Fractional Fourier Domains”, Signal Processing, Vol. 46, pp. 119–124, 1995.
[19]  S. K. Rajputa, and N. K. Nishchal, “Optical double image security using random phase fractional Fourier domain encoding and phase-retrieval algorithm”, Optics Communications, Vol. 388, pp. 38–46, 2017.
[20]  R. Soliman, G. El-Banby, A. D. Algarni, M. Elsheikh,“Double Random Phase Encoding for Cancelable Face and Iris Recognition”, Applied optics, Vol. 57, pp. 10305–10316, 2018.
D. Giveki, M. A. Soltanshahi, and G. A. Montazer, " A new image feature descriptor for content based image retrieval using scale invariant feature transform and local derivative pattern", Optik - 
Volume 28, ICEEM2019-Special Issue
ICEEM2019-Special Issue: 1st International Conference on Electronic Eng., Faculty of Electronic Eng., Menouf, Egypt, 7-8 Dec.
2019
Pages 2-7