Enhanced Biometric Template Protection Schemes for Securing Face Recognition in IoT Environment

被引:4
作者
Sardar, Alamgir [1 ]
Umer, Saiyed [1 ]
Rout, Ranjeet Kumar [2 ]
Sahoo, Kshira Sagar [3 ,4 ]
Gandomi, Amir H. [5 ,6 ]
机构
[1] Aliah Univ, Dept Comp Sci & Engn, Kolkata 700156, India
[2] Natl Inst Technol Srinagar, Dept Comp Sci & Engn, Srinagar 190006, India
[3] Umea Univ, Dept Comp Sci, S-90187 Umea, Sweden
[4] SRM Univ, Dept Comp Sci & Engn, Amaravati 522502, India
[5] Univ Technol Sydney, Fac Engn & IT, Ultimo, NSW 2007, Australia
[6] Obuda Univ, Univ Res & Innovat Ctr EKIK, H-1034 Budapest, Hungary
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 13期
关键词
Bio-Cryptography; decryption; ElGamal; encryption; FaceHashing; Rivest Cipher version 5 (RC5); RSA; sliding-XOR (S-XOR); EL-GAMAL ALGORITHM; ENCRYPTION; INTERNET; THINGS; REPRESENTATION;
D O I
10.1109/JIOT.2024.3374229
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing use of biometrics in Internet of Things (IoT)-based applications, it is essential to ensure that biometric-based authentication systems are secure. Biometric characteristics can be accessed by anyone, which poses a risk of unauthorized access to the system through spoofed biometric traits. Therefore, it is important to implement secure and efficient security schemes suitable for real-life applications, less computationally intensive, and invulnerable. This work presents a hybrid template protection scheme for secure face recognition in IoT-based environments, which integrates Cancelable Biometrics and Bio-Cryptography. Mainly, the proposed system involves two steps: 1) face recognition and 2) face biometric template protection. The face recognition includes face image preprocessing by the tree structure part model (TSPM), feature extraction by ensemble patch statistics (EPS) technique, and user classification by multiclass linear support vector machine (SVM). The template protection scheme includes cancelable biometric generation by modified FaceHashing and a Sliding-XOR (called S-XOR)-based novel Bio-Cryptographic technique. A user biometric-based key generation technique has been introduced for the employed Bio-Cryptography. Three benchmark facial databases, CVL, FEI, and FERET, have been used for the performance evaluation and security analysis. The proposed system achieves better accuracy for all the databases of 200-D cancelable feature vectors computed from the 500-D original feature vector. The modified FaceHashing and S-XOR method shows superiority over existing face recognition systems and template protection.
引用
收藏
页码:23196 / 23206
页数:11
相关论文
共 49 条
[1]   Face Recognition using Gabor Filter based Feature Extraction with Anisotropic Diffusion as a pre-processing technique [J].
Abhishree, T. M. ;
Latha, J. ;
Manikantan, K. ;
Ramachandran, S. .
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 :312-321
[2]  
Ahmad S, 2020, IEEE/IAPR INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2020)
[3]   Deep Pain: Exploiting Long Short-Term Memory Networks for Facial Expression Classification [J].
Rodriguez, Pau ;
Cucurull, Guillem ;
Gonzalez, Jordi ;
Gonfaus, Josep M. ;
Nasrollahi, Kamal ;
Moeslund, Thomas B. ;
Roca, F. Xavier .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (05) :3314-3324
[4]  
[Anonymous], 2015, Int. J. Comput. Trends Technol., DOI DOI 10.14445/22312803/IJCTT-V20P103
[5]   Gabor Features for Single Sample Face Recognition on Multicolor Space Domain [J].
Belavadi, Bhaskar ;
Prashanth, K. V. Mahendra ;
Sanjay, G. ;
Shruthi, J. .
2017 INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ELECTRONICS AND COMMUNICATION TECHNOLOGY (ICRAECT), 2017, :211-215
[6]   Automated Vehicle Detection and Classification: Models, Methods, and Techniques [J].
Boukerche, Azzedine ;
Siddiqui, Abdul Jabbar ;
Mammeri, Abdelhamid .
ACM COMPUTING SURVEYS, 2017, 50 (05)
[7]  
Cahyono Ferry, 2020, 2020 4th International Conference on Vocational Education and Training (ICOVET), P57, DOI 10.1109/ICOVET50258.2020.9229888
[8]   Single-Sample Face Recognition Based on Intra-Class Differences in a Variation Model [J].
Cai, Jun ;
Chen, Jing ;
Liang, Xing .
SENSORS, 2015, 15 (01) :1071-1087
[9]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[10]  
Dissanayake W., 2018, International Journal of Computer Applications Technology and Research, V7, P40