S-DCTNet: Security-oriented biometric feature extraction technique

The proliferation of information technology has prompted researchers to create a multitude of new security solutions for secure electronic applications, especially on the Internet. Among them, security officials prefer authentication systems for user’s identity identification. Indeed, biometric authentication has proved to be superior in many respects compared to the traditional authentication means. Unfortunately, these systems are vulnerable to a variety of attacks, the most serious of which is perhaps the attack on the stored or transmitted template, which makes the safety of this template more important in the design of the biometric systems. This research, therefore, suggests an effective feature extraction method that can provide a deep and cancelable biometric feature. In this study, DCTNet deep learning is combined with chaotic systems to extract revocable palmprint/palm-vein features.

[1]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[2]  Matthew C. Valenti,et al.  Multibiometric secure system based on deep learning , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[3]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[4]  Christoph Busch,et al.  Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris , 2015, 3rd International Workshop on Biometrics and Forensics (IWBF 2015).

[5]  Anuj Mohamed,et al.  An Image Encryption Technique Using Logistic Map and Z-Order Curve , 2018, 2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR).

[6]  V. Sujitha,et al.  A Novel Technique for Multi Biometric Cryptosystem Using Fuzzy Vault , 2019, Journal of Medical Systems.

[7]  Tülay Yildirim,et al.  A multi-biometric recognition system based on deep features of face and gesture energy image , 2017, 2017 IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA).

[8]  Xiulai Li,et al.  Research on iris image encryption based on deep learning , 2018, EURASIP J. Image Video Process..

[9]  Zhe Jin,et al.  A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme , 2019, Symmetry.

[10]  Gaurav Bhatnagar,et al.  Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission , 2012, IEEE Transactions on Instrumentation and Measurement.

[11]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[12]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[13]  Loris Nanni,et al.  Handcrafted vs. non-handcrafted features for computer vision classification , 2017, Pattern Recognit..

[14]  Hung-I Hsiao,et al.  A novel fingerprint image encryption algorithm based on chaos using APFM nonlinear adaptive filter , 2013, 2013 IEEE International Symposium on Consumer Electronics (ISCE).

[15]  Arun Kumar Jindal,et al.  Face Template Protection Using Deep Convolutional Neural Network , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[16]  V. Phartchayanusit,et al.  Safety Property Analysis of Service-Oriented IoT Based on Interval Timed Coloured Petri Nets , 2018, 2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE).

[17]  Gaurav Bhatnagar,et al.  Enhancing the transmission security of biometric images using chaotic encryption , 2013, Multimedia Systems.

[18]  Tran Khanh Dang,et al.  A hybrid template protection approach using secure sketch and ANN for strong biometric key generation with revocability guarantee , 2018, Int. Arab J. Inf. Technol..

[19]  Martin Hasler,et al.  Bifurcation diagram for a piecewise-linear circuit , 1984 .

[20]  Andrew Beng Jin Teoh,et al.  DCTNet: A simple learning-free approach for face recognition , 2015, 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).

[21]  Arpita Sarkar,et al.  Cryptographic key generation from cancelable fingerprint templates , 2018, 2018 4th International Conference on Recent Advances in Information Technology (RAIT).

[22]  Mizanur Rahman,et al.  Novel remote authentication protocol using heart-signals with chaos cryptography , 2017, 2017 International Conference on Informatics, Health & Technology (ICIHT).

[23]  Husam Rajab,et al.  IoT based Smart Cities , 2018, 2018 International Symposium on Networks, Computers and Communications (ISNCC).

[24]  Vassil S. Dimitrov,et al.  Efficient Computation of the 8-point DCT via Summation by Parts , 2018, J. Signal Process. Syst..

[25]  Jian Shen,et al.  Finger vein secure biometric template generation based on deep learning , 2018, Soft Comput..

[26]  Jianping Fan,et al.  iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning , 2017, IEEE Transactions on Information Forensics and Security.

[27]  Muhammad Imran Ahmad,et al.  Score level normalization and fusion of iris recognition , 2016, 2016 3rd International Conference on Electronic Design (ICED).

[28]  Tao Wang,et al.  A Symmetric Image Encryption Scheme Using Chaotic Baker Map and Lorenz System , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[29]  Aditya Prasad,et al.  A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping , 2017, Comput. Secur..

[30]  Jian Qiu,et al.  Palmprint template protection scheme based on randomized cuckoo hashing and MinHash , 2020, Multimedia Tools and Applications.

[31]  Peizhen Wang,et al.  A new image encryption algorithm based on hyperchaotic mapping , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[32]  Gurjit Singh Walia,et al.  Secure multimodal biometric system based on diffused graphs and optimal score fusion , 2019, IET Biom..

[33]  Fathi E. Abd El-Samie,et al.  Cancelable multi-biometric recognition system based on deep learning , 2019, The Visual Computer.

[34]  Raul Sanchez-Reillo,et al.  Fuzzy Vault Scheme Based on Fixed-Length Templates Applied to Dynamic Signature Verification , 2020, IEEE Access.

[35]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[36]  Abdallah Meraoumia,et al.  Pattern recognition system: from classical methods to deep learning techniques , 2018, J. Electronic Imaging.

[37]  Qian Xiao,et al.  Meta-Control in Pigeons (Columba livia) and the Role of the Commissura Anterior , 2019, Symmetry.

[38]  Nam Ik Cho,et al.  Deep Face Image Retrieval for Cancelable Biometric Authentication , 2019, 2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).

[39]  Ik Rae Jeong,et al.  Efficient Cancelable Iris Template Generation for Wearable Sensors , 2019, Secur. Commun. Networks.

[40]  Tran Khanh Dang,et al.  Cancellable fuzzy vault with periodic transformation for biometric template protection , 2016, IET Biom..

[41]  Wu Xiaolin,et al.  A Novel Color Image Encryption Scheme Using Rectangular Transform-Enhanced Chaotic Tent Maps , 2017 .

[42]  Juan E. Tapiador,et al.  A Survey of Wearable Biometric Recognition Systems , 2016, ACM Comput. Surv..

[43]  Woo Chaw Seng,et al.  A review of biometric technology along with trends and prospects , 2014, Pattern Recognit..