Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption

Biometric systems are widely used now for security applications. Two major problems are encountered in biometric systems: the security problem and the dependence on a single biometric for verification. The security problem arises from the utilization of the original biometrics in databases. So, if t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2020-05, Vol.79 (19-20), p.14053-14078
Hauptverfasser: Abou elazm, Lamiaa A., Ibrahim, Sameh, Egila, Mohamed G., Shawky, H., Elsaid, Mohamed K. H., El-Shafai, Walid, Abd El-Samie, Fathi E.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 14078
container_issue 19-20
container_start_page 14053
container_title Multimedia tools and applications
container_volume 79
creator Abou elazm, Lamiaa A.
Ibrahim, Sameh
Egila, Mohamed G.
Shawky, H.
Elsaid, Mohamed K. H.
El-Shafai, Walid
Abd El-Samie, Fathi E.
description Biometric systems are widely used now for security applications. Two major problems are encountered in biometric systems: the security problem and the dependence on a single biometric for verification. The security problem arises from the utilization of the original biometrics in databases. So, if these databases are attacked, the biometrics are lost forever. Hence, there is a need to secure original biometrics by keeping them away from utilization in biometric databases. Cancelable biometrics is an emerging security trend in the field of biometric authentication. Cancelable biometric systems depend on the transformation of biometric features into new formats so that users can replace their biometric templates in the same or different systems. In this paper, we present a proposed cancelable face and fingerprint recognition algorithm based on the 3D jigsaw transform and optical encryption. The algorithm adopts the Fractional Fourier Transform (FRFT) in the optical encryption scheme with a single random phase mask. This structure can be implemented all optically with a single lens. The proposed cancelable biometric recognition algorithm employs an optical image encryption scheme that depends on two cascaded stages of 2D-FRFT with separable kernels in both dimensions. The two stages are separated with a random phase mask. A preceding bit plane permutation process is performed on the obtained biometrics prior to the FRFT operation to achieve a high level of security. To validate the proposed algorithm for cancelable biometric recognition, different sets of face and fingerprint images are used. A comparative study is presented between the proposed algorithm and the optical Double Random Phase Encoding (DRPE) algorithm. The simulations results obtained for performance evaluation show that the proposed algorithm is safe, reliable, and feasible. It has good encryption and cancelability that reveal good performance.
doi_str_mv 10.1007/s11042-019-08462-8
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2405451515</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2405451515</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-b8fd716dd318466f1b9367cd6aee3428d20d9a24baa096f86a14ade5c931f3b33</originalsourceid><addsrcrecordid>eNp9kE1PwzAMhisEEmPwBzhF4hyIkzRtj2h8SpO4wDly8zE6delIOqH9e7IViRvywT74sfU-RXEN7BYYq-4SAJOcMmgoq6XitD4pZlBWglYVh9M8i5rRqmRwXlyktGYMVMnlrDALDMb12PaOeDSOYLDEd2Hl4jZ2YSTRmWEVurEbAmkxOUvyMH46Ih7Iulsl_CZjxJD8EDdHeNiOncGeuGDifnvgLoszj31yV799Xnw8Pb4vXujy7fl1cb-kRkAz0rb2tgJlrYAcQXloG6EqYxU6JySvLWe2QS5bRNYoXysEidaVphHgRSvEvLiZ7m7j8LVzadTrYRdDfqm5ZKUsIVfe4tOWiUNK0Xmdg24w7jUwfZCpJ5k6y9RHmbrOkJigdLCS5fyd_of6AWI9eDk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2405451515</pqid></control><display><type>article</type><title>Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption</title><source>Springer Nature - Complete Springer Journals</source><creator>Abou elazm, Lamiaa A. ; Ibrahim, Sameh ; Egila, Mohamed G. ; Shawky, H. ; Elsaid, Mohamed K. H. ; El-Shafai, Walid ; Abd El-Samie, Fathi E.</creator><creatorcontrib>Abou elazm, Lamiaa A. ; Ibrahim, Sameh ; Egila, Mohamed G. ; Shawky, H. ; Elsaid, Mohamed K. H. ; El-Shafai, Walid ; Abd El-Samie, Fathi E.</creatorcontrib><description>Biometric systems are widely used now for security applications. Two major problems are encountered in biometric systems: the security problem and the dependence on a single biometric for verification. The security problem arises from the utilization of the original biometrics in databases. So, if these databases are attacked, the biometrics are lost forever. Hence, there is a need to secure original biometrics by keeping them away from utilization in biometric databases. Cancelable biometrics is an emerging security trend in the field of biometric authentication. Cancelable biometric systems depend on the transformation of biometric features into new formats so that users can replace their biometric templates in the same or different systems. In this paper, we present a proposed cancelable face and fingerprint recognition algorithm based on the 3D jigsaw transform and optical encryption. The algorithm adopts the Fractional Fourier Transform (FRFT) in the optical encryption scheme with a single random phase mask. This structure can be implemented all optically with a single lens. The proposed cancelable biometric recognition algorithm employs an optical image encryption scheme that depends on two cascaded stages of 2D-FRFT with separable kernels in both dimensions. The two stages are separated with a random phase mask. A preceding bit plane permutation process is performed on the obtained biometrics prior to the FRFT operation to achieve a high level of security. To validate the proposed algorithm for cancelable biometric recognition, different sets of face and fingerprint images are used. A comparative study is presented between the proposed algorithm and the optical Double Random Phase Encoding (DRPE) algorithm. The simulations results obtained for performance evaluation show that the proposed algorithm is safe, reliable, and feasible. It has good encryption and cancelability that reveal good performance.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-019-08462-8</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Biometric recognition systems ; Biometrics ; Comparative studies ; Computer Communication Networks ; Computer Science ; Computer simulation ; Data Structures and Information Theory ; Encryption ; Face recognition ; Fingerprint verification ; Fourier transforms ; Multimedia Information Systems ; Object recognition ; Performance evaluation ; Permutations ; Security ; Security management ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2020-05, Vol.79 (19-20), p.14053-14078</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-b8fd716dd318466f1b9367cd6aee3428d20d9a24baa096f86a14ade5c931f3b33</citedby><cites>FETCH-LOGICAL-c319t-b8fd716dd318466f1b9367cd6aee3428d20d9a24baa096f86a14ade5c931f3b33</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-019-08462-8$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-019-08462-8$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Abou elazm, Lamiaa A.</creatorcontrib><creatorcontrib>Ibrahim, Sameh</creatorcontrib><creatorcontrib>Egila, Mohamed G.</creatorcontrib><creatorcontrib>Shawky, H.</creatorcontrib><creatorcontrib>Elsaid, Mohamed K. H.</creatorcontrib><creatorcontrib>El-Shafai, Walid</creatorcontrib><creatorcontrib>Abd El-Samie, Fathi E.</creatorcontrib><title>Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Biometric systems are widely used now for security applications. Two major problems are encountered in biometric systems: the security problem and the dependence on a single biometric for verification. The security problem arises from the utilization of the original biometrics in databases. So, if these databases are attacked, the biometrics are lost forever. Hence, there is a need to secure original biometrics by keeping them away from utilization in biometric databases. Cancelable biometrics is an emerging security trend in the field of biometric authentication. Cancelable biometric systems depend on the transformation of biometric features into new formats so that users can replace their biometric templates in the same or different systems. In this paper, we present a proposed cancelable face and fingerprint recognition algorithm based on the 3D jigsaw transform and optical encryption. The algorithm adopts the Fractional Fourier Transform (FRFT) in the optical encryption scheme with a single random phase mask. This structure can be implemented all optically with a single lens. The proposed cancelable biometric recognition algorithm employs an optical image encryption scheme that depends on two cascaded stages of 2D-FRFT with separable kernels in both dimensions. The two stages are separated with a random phase mask. A preceding bit plane permutation process is performed on the obtained biometrics prior to the FRFT operation to achieve a high level of security. To validate the proposed algorithm for cancelable biometric recognition, different sets of face and fingerprint images are used. A comparative study is presented between the proposed algorithm and the optical Double Random Phase Encoding (DRPE) algorithm. The simulations results obtained for performance evaluation show that the proposed algorithm is safe, reliable, and feasible. It has good encryption and cancelability that reveal good performance.</description><subject>Algorithms</subject><subject>Biometric recognition systems</subject><subject>Biometrics</subject><subject>Comparative studies</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Computer simulation</subject><subject>Data Structures and Information Theory</subject><subject>Encryption</subject><subject>Face recognition</subject><subject>Fingerprint verification</subject><subject>Fourier transforms</subject><subject>Multimedia Information Systems</subject><subject>Object recognition</subject><subject>Performance evaluation</subject><subject>Permutations</subject><subject>Security</subject><subject>Security management</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kE1PwzAMhisEEmPwBzhF4hyIkzRtj2h8SpO4wDly8zE6delIOqH9e7IViRvywT74sfU-RXEN7BYYq-4SAJOcMmgoq6XitD4pZlBWglYVh9M8i5rRqmRwXlyktGYMVMnlrDALDMb12PaOeDSOYLDEd2Hl4jZ2YSTRmWEVurEbAmkxOUvyMH46Ih7Iulsl_CZjxJD8EDdHeNiOncGeuGDifnvgLoszj31yV799Xnw8Pb4vXujy7fl1cb-kRkAz0rb2tgJlrYAcQXloG6EqYxU6JySvLWe2QS5bRNYoXysEidaVphHgRSvEvLiZ7m7j8LVzadTrYRdDfqm5ZKUsIVfe4tOWiUNK0Xmdg24w7jUwfZCpJ5k6y9RHmbrOkJigdLCS5fyd_of6AWI9eDk</recordid><startdate>20200501</startdate><enddate>20200501</enddate><creator>Abou elazm, Lamiaa A.</creator><creator>Ibrahim, Sameh</creator><creator>Egila, Mohamed G.</creator><creator>Shawky, H.</creator><creator>Elsaid, Mohamed K. H.</creator><creator>El-Shafai, Walid</creator><creator>Abd El-Samie, Fathi E.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PHGZM</scope><scope>PHGZT</scope><scope>PKEHL</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQGLB</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20200501</creationdate><title>Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption</title><author>Abou elazm, Lamiaa A. ; Ibrahim, Sameh ; Egila, Mohamed G. ; Shawky, H. ; Elsaid, Mohamed K. H. ; El-Shafai, Walid ; Abd El-Samie, Fathi E.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-b8fd716dd318466f1b9367cd6aee3428d20d9a24baa096f86a14ade5c931f3b33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Biometric recognition systems</topic><topic>Biometrics</topic><topic>Comparative studies</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Computer simulation</topic><topic>Data Structures and Information Theory</topic><topic>Encryption</topic><topic>Face recognition</topic><topic>Fingerprint verification</topic><topic>Fourier transforms</topic><topic>Multimedia Information Systems</topic><topic>Object recognition</topic><topic>Performance evaluation</topic><topic>Permutations</topic><topic>Security</topic><topic>Security management</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Abou elazm, Lamiaa A.</creatorcontrib><creatorcontrib>Ibrahim, Sameh</creatorcontrib><creatorcontrib>Egila, Mohamed G.</creatorcontrib><creatorcontrib>Shawky, H.</creatorcontrib><creatorcontrib>Elsaid, Mohamed K. H.</creatorcontrib><creatorcontrib>El-Shafai, Walid</creatorcontrib><creatorcontrib>Abd El-Samie, Fathi E.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central (New)</collection><collection>ProQuest One Academic (New)</collection><collection>ProQuest One Academic Middle East (New)</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Applied &amp; Life Sciences</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Abou elazm, Lamiaa A.</au><au>Ibrahim, Sameh</au><au>Egila, Mohamed G.</au><au>Shawky, H.</au><au>Elsaid, Mohamed K. H.</au><au>El-Shafai, Walid</au><au>Abd El-Samie, Fathi E.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2020-05-01</date><risdate>2020</risdate><volume>79</volume><issue>19-20</issue><spage>14053</spage><epage>14078</epage><pages>14053-14078</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Biometric systems are widely used now for security applications. Two major problems are encountered in biometric systems: the security problem and the dependence on a single biometric for verification. The security problem arises from the utilization of the original biometrics in databases. So, if these databases are attacked, the biometrics are lost forever. Hence, there is a need to secure original biometrics by keeping them away from utilization in biometric databases. Cancelable biometrics is an emerging security trend in the field of biometric authentication. Cancelable biometric systems depend on the transformation of biometric features into new formats so that users can replace their biometric templates in the same or different systems. In this paper, we present a proposed cancelable face and fingerprint recognition algorithm based on the 3D jigsaw transform and optical encryption. The algorithm adopts the Fractional Fourier Transform (FRFT) in the optical encryption scheme with a single random phase mask. This structure can be implemented all optically with a single lens. The proposed cancelable biometric recognition algorithm employs an optical image encryption scheme that depends on two cascaded stages of 2D-FRFT with separable kernels in both dimensions. The two stages are separated with a random phase mask. A preceding bit plane permutation process is performed on the obtained biometrics prior to the FRFT operation to achieve a high level of security. To validate the proposed algorithm for cancelable biometric recognition, different sets of face and fingerprint images are used. A comparative study is presented between the proposed algorithm and the optical Double Random Phase Encoding (DRPE) algorithm. The simulations results obtained for performance evaluation show that the proposed algorithm is safe, reliable, and feasible. It has good encryption and cancelability that reveal good performance.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-019-08462-8</doi><tpages>26</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2020-05, Vol.79 (19-20), p.14053-14078
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2405451515
source Springer Nature - Complete Springer Journals
subjects Algorithms
Biometric recognition systems
Biometrics
Comparative studies
Computer Communication Networks
Computer Science
Computer simulation
Data Structures and Information Theory
Encryption
Face recognition
Fingerprint verification
Fourier transforms
Multimedia Information Systems
Object recognition
Performance evaluation
Permutations
Security
Security management
Special Purpose and Application-Based Systems
title Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-18T21%3A46%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cancelable%20face%20and%20fingerprint%20recognition%20based%20on%20the%203D%20jigsaw%20transform%20and%20optical%20encryption&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Abou%20elazm,%20Lamiaa%20A.&rft.date=2020-05-01&rft.volume=79&rft.issue=19-20&rft.spage=14053&rft.epage=14078&rft.pages=14053-14078&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-019-08462-8&rft_dat=%3Cproquest_cross%3E2405451515%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2405451515&rft_id=info:pmid/&rfr_iscdi=true