Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption
Biometric systems are widely used now for security applications. Two major problems are encountered in biometric systems: the security problem and the dependence on a single biometric for verification. The security problem arises from the utilization of the original biometrics in databases. So, if t...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2020-05, Vol.79 (19-20), p.14053-14078 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 14078 |
---|---|
container_issue | 19-20 |
container_start_page | 14053 |
container_title | Multimedia tools and applications |
container_volume | 79 |
creator | Abou elazm, Lamiaa A. Ibrahim, Sameh Egila, Mohamed G. Shawky, H. Elsaid, Mohamed K. H. El-Shafai, Walid Abd El-Samie, Fathi E. |
description | Biometric systems are widely used now for security applications. Two major problems are encountered in biometric systems: the security problem and the dependence on a single biometric for verification. The security problem arises from the utilization of the original biometrics in databases. So, if these databases are attacked, the biometrics are lost forever. Hence, there is a need to secure original biometrics by keeping them away from utilization in biometric databases. Cancelable biometrics is an emerging security trend in the field of biometric authentication. Cancelable biometric systems depend on the transformation of biometric features into new formats so that users can replace their biometric templates in the same or different systems. In this paper, we present a proposed cancelable face and fingerprint recognition algorithm based on the 3D jigsaw transform and optical encryption. The algorithm adopts the Fractional Fourier Transform (FRFT) in the optical encryption scheme with a single random phase mask. This structure can be implemented all optically with a single lens. The proposed cancelable biometric recognition algorithm employs an optical image encryption scheme that depends on two cascaded stages of 2D-FRFT with separable kernels in both dimensions. The two stages are separated with a random phase mask. A preceding bit plane permutation process is performed on the obtained biometrics prior to the FRFT operation to achieve a high level of security. To validate the proposed algorithm for cancelable biometric recognition, different sets of face and fingerprint images are used. A comparative study is presented between the proposed algorithm and the optical Double Random Phase Encoding (DRPE) algorithm. The simulations results obtained for performance evaluation show that the proposed algorithm is safe, reliable, and feasible. It has good encryption and cancelability that reveal good performance. |
doi_str_mv | 10.1007/s11042-019-08462-8 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2405451515</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2405451515</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-b8fd716dd318466f1b9367cd6aee3428d20d9a24baa096f86a14ade5c931f3b33</originalsourceid><addsrcrecordid>eNp9kE1PwzAMhisEEmPwBzhF4hyIkzRtj2h8SpO4wDly8zE6delIOqH9e7IViRvywT74sfU-RXEN7BYYq-4SAJOcMmgoq6XitD4pZlBWglYVh9M8i5rRqmRwXlyktGYMVMnlrDALDMb12PaOeDSOYLDEd2Hl4jZ2YSTRmWEVurEbAmkxOUvyMH46Ih7Iulsl_CZjxJD8EDdHeNiOncGeuGDifnvgLoszj31yV799Xnw8Pb4vXujy7fl1cb-kRkAz0rb2tgJlrYAcQXloG6EqYxU6JySvLWe2QS5bRNYoXysEidaVphHgRSvEvLiZ7m7j8LVzadTrYRdDfqm5ZKUsIVfe4tOWiUNK0Xmdg24w7jUwfZCpJ5k6y9RHmbrOkJigdLCS5fyd_of6AWI9eDk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2405451515</pqid></control><display><type>article</type><title>Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption</title><source>Springer Nature - Complete Springer Journals</source><creator>Abou elazm, Lamiaa A. ; Ibrahim, Sameh ; Egila, Mohamed G. ; Shawky, H. ; Elsaid, Mohamed K. H. ; El-Shafai, Walid ; Abd El-Samie, Fathi E.</creator><creatorcontrib>Abou elazm, Lamiaa A. ; Ibrahim, Sameh ; Egila, Mohamed G. ; Shawky, H. ; Elsaid, Mohamed K. H. ; El-Shafai, Walid ; Abd El-Samie, Fathi E.</creatorcontrib><description>Biometric systems are widely used now for security applications. Two major problems are encountered in biometric systems: the security problem and the dependence on a single biometric for verification. The security problem arises from the utilization of the original biometrics in databases. So, if these databases are attacked, the biometrics are lost forever. Hence, there is a need to secure original biometrics by keeping them away from utilization in biometric databases. Cancelable biometrics is an emerging security trend in the field of biometric authentication. Cancelable biometric systems depend on the transformation of biometric features into new formats so that users can replace their biometric templates in the same or different systems. In this paper, we present a proposed cancelable face and fingerprint recognition algorithm based on the 3D jigsaw transform and optical encryption. The algorithm adopts the Fractional Fourier Transform (FRFT) in the optical encryption scheme with a single random phase mask. This structure can be implemented all optically with a single lens. The proposed cancelable biometric recognition algorithm employs an optical image encryption scheme that depends on two cascaded stages of 2D-FRFT with separable kernels in both dimensions. The two stages are separated with a random phase mask. A preceding bit plane permutation process is performed on the obtained biometrics prior to the FRFT operation to achieve a high level of security. To validate the proposed algorithm for cancelable biometric recognition, different sets of face and fingerprint images are used. A comparative study is presented between the proposed algorithm and the optical Double Random Phase Encoding (DRPE) algorithm. The simulations results obtained for performance evaluation show that the proposed algorithm is safe, reliable, and feasible. It has good encryption and cancelability that reveal good performance.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-019-08462-8</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Biometric recognition systems ; Biometrics ; Comparative studies ; Computer Communication Networks ; Computer Science ; Computer simulation ; Data Structures and Information Theory ; Encryption ; Face recognition ; Fingerprint verification ; Fourier transforms ; Multimedia Information Systems ; Object recognition ; Performance evaluation ; Permutations ; Security ; Security management ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2020-05, Vol.79 (19-20), p.14053-14078</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-b8fd716dd318466f1b9367cd6aee3428d20d9a24baa096f86a14ade5c931f3b33</citedby><cites>FETCH-LOGICAL-c319t-b8fd716dd318466f1b9367cd6aee3428d20d9a24baa096f86a14ade5c931f3b33</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-019-08462-8$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-019-08462-8$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Abou elazm, Lamiaa A.</creatorcontrib><creatorcontrib>Ibrahim, Sameh</creatorcontrib><creatorcontrib>Egila, Mohamed G.</creatorcontrib><creatorcontrib>Shawky, H.</creatorcontrib><creatorcontrib>Elsaid, Mohamed K. H.</creatorcontrib><creatorcontrib>El-Shafai, Walid</creatorcontrib><creatorcontrib>Abd El-Samie, Fathi E.</creatorcontrib><title>Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Biometric systems are widely used now for security applications. Two major problems are encountered in biometric systems: the security problem and the dependence on a single biometric for verification. The security problem arises from the utilization of the original biometrics in databases. So, if these databases are attacked, the biometrics are lost forever. Hence, there is a need to secure original biometrics by keeping them away from utilization in biometric databases. Cancelable biometrics is an emerging security trend in the field of biometric authentication. Cancelable biometric systems depend on the transformation of biometric features into new formats so that users can replace their biometric templates in the same or different systems. In this paper, we present a proposed cancelable face and fingerprint recognition algorithm based on the 3D jigsaw transform and optical encryption. The algorithm adopts the Fractional Fourier Transform (FRFT) in the optical encryption scheme with a single random phase mask. This structure can be implemented all optically with a single lens. The proposed cancelable biometric recognition algorithm employs an optical image encryption scheme that depends on two cascaded stages of 2D-FRFT with separable kernels in both dimensions. The two stages are separated with a random phase mask. A preceding bit plane permutation process is performed on the obtained biometrics prior to the FRFT operation to achieve a high level of security. To validate the proposed algorithm for cancelable biometric recognition, different sets of face and fingerprint images are used. A comparative study is presented between the proposed algorithm and the optical Double Random Phase Encoding (DRPE) algorithm. The simulations results obtained for performance evaluation show that the proposed algorithm is safe, reliable, and feasible. It has good encryption and cancelability that reveal good performance.</description><subject>Algorithms</subject><subject>Biometric recognition systems</subject><subject>Biometrics</subject><subject>Comparative studies</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Computer simulation</subject><subject>Data Structures and Information Theory</subject><subject>Encryption</subject><subject>Face recognition</subject><subject>Fingerprint verification</subject><subject>Fourier transforms</subject><subject>Multimedia Information Systems</subject><subject>Object recognition</subject><subject>Performance evaluation</subject><subject>Permutations</subject><subject>Security</subject><subject>Security management</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kE1PwzAMhisEEmPwBzhF4hyIkzRtj2h8SpO4wDly8zE6delIOqH9e7IViRvywT74sfU-RXEN7BYYq-4SAJOcMmgoq6XitD4pZlBWglYVh9M8i5rRqmRwXlyktGYMVMnlrDALDMb12PaOeDSOYLDEd2Hl4jZ2YSTRmWEVurEbAmkxOUvyMH46Ih7Iulsl_CZjxJD8EDdHeNiOncGeuGDifnvgLoszj31yV799Xnw8Pb4vXujy7fl1cb-kRkAz0rb2tgJlrYAcQXloG6EqYxU6JySvLWe2QS5bRNYoXysEidaVphHgRSvEvLiZ7m7j8LVzadTrYRdDfqm5ZKUsIVfe4tOWiUNK0Xmdg24w7jUwfZCpJ5k6y9RHmbrOkJigdLCS5fyd_of6AWI9eDk</recordid><startdate>20200501</startdate><enddate>20200501</enddate><creator>Abou elazm, Lamiaa A.</creator><creator>Ibrahim, Sameh</creator><creator>Egila, Mohamed G.</creator><creator>Shawky, H.</creator><creator>Elsaid, Mohamed K. H.</creator><creator>El-Shafai, Walid</creator><creator>Abd El-Samie, Fathi E.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PHGZM</scope><scope>PHGZT</scope><scope>PKEHL</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQGLB</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20200501</creationdate><title>Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption</title><author>Abou elazm, Lamiaa A. ; Ibrahim, Sameh ; Egila, Mohamed G. ; Shawky, H. ; Elsaid, Mohamed K. H. ; El-Shafai, Walid ; Abd El-Samie, Fathi E.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-b8fd716dd318466f1b9367cd6aee3428d20d9a24baa096f86a14ade5c931f3b33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Biometric recognition systems</topic><topic>Biometrics</topic><topic>Comparative studies</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Computer simulation</topic><topic>Data Structures and Information Theory</topic><topic>Encryption</topic><topic>Face recognition</topic><topic>Fingerprint verification</topic><topic>Fourier transforms</topic><topic>Multimedia Information Systems</topic><topic>Object recognition</topic><topic>Performance evaluation</topic><topic>Permutations</topic><topic>Security</topic><topic>Security management</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Abou elazm, Lamiaa A.</creatorcontrib><creatorcontrib>Ibrahim, Sameh</creatorcontrib><creatorcontrib>Egila, Mohamed G.</creatorcontrib><creatorcontrib>Shawky, H.</creatorcontrib><creatorcontrib>Elsaid, Mohamed K. H.</creatorcontrib><creatorcontrib>El-Shafai, Walid</creatorcontrib><creatorcontrib>Abd El-Samie, Fathi E.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central (New)</collection><collection>ProQuest One Academic (New)</collection><collection>ProQuest One Academic Middle East (New)</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Applied & Life Sciences</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Abou elazm, Lamiaa A.</au><au>Ibrahim, Sameh</au><au>Egila, Mohamed G.</au><au>Shawky, H.</au><au>Elsaid, Mohamed K. H.</au><au>El-Shafai, Walid</au><au>Abd El-Samie, Fathi E.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2020-05-01</date><risdate>2020</risdate><volume>79</volume><issue>19-20</issue><spage>14053</spage><epage>14078</epage><pages>14053-14078</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Biometric systems are widely used now for security applications. Two major problems are encountered in biometric systems: the security problem and the dependence on a single biometric for verification. The security problem arises from the utilization of the original biometrics in databases. So, if these databases are attacked, the biometrics are lost forever. Hence, there is a need to secure original biometrics by keeping them away from utilization in biometric databases. Cancelable biometrics is an emerging security trend in the field of biometric authentication. Cancelable biometric systems depend on the transformation of biometric features into new formats so that users can replace their biometric templates in the same or different systems. In this paper, we present a proposed cancelable face and fingerprint recognition algorithm based on the 3D jigsaw transform and optical encryption. The algorithm adopts the Fractional Fourier Transform (FRFT) in the optical encryption scheme with a single random phase mask. This structure can be implemented all optically with a single lens. The proposed cancelable biometric recognition algorithm employs an optical image encryption scheme that depends on two cascaded stages of 2D-FRFT with separable kernels in both dimensions. The two stages are separated with a random phase mask. A preceding bit plane permutation process is performed on the obtained biometrics prior to the FRFT operation to achieve a high level of security. To validate the proposed algorithm for cancelable biometric recognition, different sets of face and fingerprint images are used. A comparative study is presented between the proposed algorithm and the optical Double Random Phase Encoding (DRPE) algorithm. The simulations results obtained for performance evaluation show that the proposed algorithm is safe, reliable, and feasible. It has good encryption and cancelability that reveal good performance.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-019-08462-8</doi><tpages>26</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2020-05, Vol.79 (19-20), p.14053-14078 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2405451515 |
source | Springer Nature - Complete Springer Journals |
subjects | Algorithms Biometric recognition systems Biometrics Comparative studies Computer Communication Networks Computer Science Computer simulation Data Structures and Information Theory Encryption Face recognition Fingerprint verification Fourier transforms Multimedia Information Systems Object recognition Performance evaluation Permutations Security Security management Special Purpose and Application-Based Systems |
title | Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-18T21%3A46%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cancelable%20face%20and%20fingerprint%20recognition%20based%20on%20the%203D%20jigsaw%20transform%20and%20optical%20encryption&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Abou%20elazm,%20Lamiaa%20A.&rft.date=2020-05-01&rft.volume=79&rft.issue=19-20&rft.spage=14053&rft.epage=14078&rft.pages=14053-14078&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-019-08462-8&rft_dat=%3Cproquest_cross%3E2405451515%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2405451515&rft_id=info:pmid/&rfr_iscdi=true |