Privacy preservation of industrial access system users with cancellable face recognition based on inverse techniques

被引:0
作者
Hassanin, Abdel-Aziz I. M. [1 ]
Abd El-Samie, Fathi E. [1 ]
Mohamed, Abd El-Hamid [1 ]
机构
[1] Manoufia Univ, Fac Elect Engn, Commun & Elect Dept, Menoufia, Egypt
来源
JOURNAL OF OPTICS-INDIA | 2024年 / 53卷 / 04期
关键词
Cancellable biometrics; Regularization theory; LMMSE solution; Inverse techniques; CANCELABLE BIOMETRICS;
D O I
10.1007/s12596-023-01155-4
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
To strengthen security, we now use biometric technologies instead of passwords or tokens in a variety of authentication applications. Biometrics depend on parts of the human body. They have an advantage of not being lost. This paper seeks to safeguard biometrics within recognition systems by inducing intended distortions in biometric traits prior to saving them in a database for preventing hackers from accessing the actual biometrics. We can still use the biometrics, even if they are stolen or hacked in this situation by changing the distorted versions. Two approaches for face biometric distortion are presented in this paper, namely a regularization approach and a Linear Minimum Mean Square Error (LMMSE) approach. The regularization strategy begins by adding noise to the original faces, and then applying a regularized inverse on the noisy face images to create face images with amplified fixed noise patterns. The process of noise amplification is really a masking process that helps in the generation of cancellable templates. These versions of the face images can be used as templates for verification that can be cancelled and replaced with new templates if required. The other approach is cancellable face recognition based on the LMMSE algorithm, which begins with noise addition to the original faces and then application of LMMSE algorithm to the face images to obtain new templates with magnified fixed noise patterns. Finally, we compare between the two approaches in the cancellable face recognition application.
引用
收藏
页码:3910 / 3917
页数:8
相关论文
共 17 条
  • [1] A Survey on Ear Biometrics
    Abaza, Ayman
    Ross, Arun
    Hebert, Christina
    Harrison, Mary Ann F.
    Nixon, Mark S.
    [J]. ACM COMPUTING SURVEYS, 2013, 45 (02)
  • [2] Ang R, 2005, LECT NOTES COMPUT SC, V3574, P242
  • [3] [Anonymous], ORLFACE DAT
  • [4] Boult T.E., 2007, COMPUTER VISION PATT, P1
  • [5] Farooq F., IEEE C COMP VIS PATT, P1
  • [6] Biohashing: two factor authentication featuring fingerprint data and tokenised random number
    Jin, ATB
    Ling, DNC
    Goh, A
    [J]. PATTERN RECOGNITION, 2004, 37 (11) : 2245 - 2255
  • [7] Jin Teoh AndrewBeng., 2006, 9th International Conference on Control, Automation, Robotics and Vision, (ICARCV'06), P1
  • [8] Secure hashing of dynamic hand signatures using wavelet-fourier compression with BioPhasor mixing and 2N discretization
    Kuan, Yip Wai
    Teoh, Andrew B. J.
    Ngo, David C. L.
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2007, 2007 (1)
  • [9] Cancelable fingerprint templates using minutiae-based bit-strings
    Lee, Chulhan
    Kim, Jaihie
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (03) : 236 - 246
  • [10] An improved BioHashing for human authentication
    Lumini, Alessandra
    Nanni, Loris
    [J]. PATTERN RECOGNITION, 2007, 40 (03) : 1057 - 1065