A Novel Cancelable FaceHashing Technique Based on Non-Invertible Transformation With Encryption and Decryption Template

被引:24
作者
Sardar, Alamgir [1 ]
Umer, Saiyed [1 ]
Pero, Chiara [2 ]
Nappi, Michele [2 ]
机构
[1] Aliah Univ, Dept Comp Sci & Engn, Kolkata 700156, India
[2] Univ Salerno, Dept Comp Sci, I-84084 Fisciano, Italy
关键词
Cancelable; FaceHashing; feature extraction; encryption; classification; FACE-RECOGNITION; BIOMETRIC AUTHENTICATION; FINGERPRINT; PROTECTION; PRIVACY; FUSION; SECURE; REPRESENTATION; TECHNOLOGY;
D O I
10.1109/ACCESS.2020.2999656
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel cancelable FaceHashing technique based on non-invertible transformation with encryption and decryption template has been proposed in this paper. The proposed system has four components: face preprocessing, feature extraction, cancelable feature extraction followed by the classification, and encryption/decryption of cancelable face feature templates. During face preprocessing, the facial region of interest has been extracted out to speed the process for evaluating discriminant features. In feature extraction, some optimization techniques such as Sparse Representation Coding, Coordinate descent, and Block coordinates descent have been employed on facial descriptors to obtain the best representative of those descriptors. The representative descriptors are further arranged in a spatial pyramid matching structure to extract more discriminant and distinctive feature vectors. To preserve them, the existing BioHashing technique has been modified and extended to some higher levels of security attacks and the modified BioHashing technique computes a cancelable feature vector by the combined effect of the facial feature vector and the assigned token correspond to each user. The elements of computed cancelable feature vector are in a numeric form that has been employed to perform both verifications as well as identification task in online while the original facial feature vectors are kept offline either in hard drive or disc. Then, to enhance more security levels and also to preserve the cancelable face features, an RSA based encryption-decryption algorithm has been introduced. The proposed system has been tested using four benchmark face databases: CASIA-FACE-v5, IITK, CVL, and FERET, and performance are obtained as correct recognition rate and equal error rate. The performance are compared to the state-of-the-art methods for the superiority of the proposed feature extraction technique and individual performance analysis has been performed at all the security levels of the proposed Cancelable FaceHashing Technique. These comparisons show the superiority of the proposed system.
引用
收藏
页码:105263 / 105277
页数:15
相关论文
共 33 条
[21]   A novel image encryption/decryption scheme based on chaotic neural networks [J].
Bigdeli, Nooshin ;
Farid, Yousef ;
Afshar, Karim .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2012, 25 (04) :753-765
[22]   Novel Scheme for Image Encryption and Decryption Based on a Hermite-Gaussian Matrix [J].
Alsaedi, Mohammed .
ADVANCES IN COMPUTER VISION, CVC, VOL 1, 2020, 943 :222-236
[23]   Cancelable binary biometric template generation scheme based on partial walsh transformation and MinHash algorithm [J].
Song, Shuaichao ;
Yang, Yeming ;
Yu, Miao ;
Liao, Yuming ;
Guo, Weilai ;
Li, Jiyuan ;
Guo, Songhui .
APPLIED SOFT COMPUTING, 2025, 175
[24]   Novel image encryption/decryption based on quantum Fourier transform and double phase encoding [J].
Yu-Guang Yang ;
Juan Xia ;
Xin Jia ;
Hua Zhang .
Quantum Information Processing, 2013, 12 :3477-3493
[25]   Novel image encryption/decryption based on quantum Fourier transform and double phase encoding [J].
Yang, Yu-Guang ;
Xia, Juan ;
Jia, Xin ;
Zhang, Hua .
QUANTUM INFORMATION PROCESSING, 2013, 12 (11) :3477-3493
[26]   A Novel Image Encryption Technique Based on Inter Block Difference [J].
Thamanam S.R. ;
Nagaraja P. ;
Naik B.B. ;
Manjunathachari K. .
Journal of Shanghai Jiaotong University (Science), 2021, 26 (4) :488-493
[27]   A novel algorithm of fingerprint encryption using minutiae-based transformation [J].
Chen, Haiyong ;
Chen, Hailiang .
PATTERN RECOGNITION LETTERS, 2011, 32 (02) :305-309
[28]   A Novel Face Template Protection Algorithm Based on the Fusion of Chaos Theory and RSA Encryption [J].
Liu Yunan ;
Zhao Fudong ;
Xu Yanli ;
Cao Yu .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06) :315-329
[29]   Encryption and Decryption of Marker Based 3-Dimensional Augmented Reality Image Using Modified Hill Cipher Technique for Secure Transfer [J].
Sharma, Abhilasha ;
Singh, Anshul ;
Kumar, Appu .
2022 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND ARTIFICIAL INTELLIGENCE (CCAI 2022), 2022, :155-159
[30]   A novel chaotic image encryption technique based on multiple discrete dynamical maps [J].
Khan, Majid ;
Masood, Fawad .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (18) :26203-26222