Efficient implementation of optical scanning holography in cancelable biometrics

被引:25
作者
Abd El-Samie, Fathi E. [1 ,2 ]
Nassar, Rana M. [3 ]
Safan, Mohamed [1 ]
Abdelhamed, Mohamed A. [4 ]
Khalaf, Ashraf A. M. [3 ]
El Banby, Ghada M. [5 ]
Zahran, Osama [1 ]
El-Rabaie, El-Sayed M. [1 ]
Mohamed, Abdelnaser A. [1 ]
El-Dokany, Ibrahim M. [1 ]
Ahmed, HossamElDin H. [1 ]
El-Khamy, Said [6 ]
Ramadan, Noha [7 ]
Soliman, Randa F. [8 ]
El-Shafai, Walid [1 ,9 ]
机构
[1] Menoufia Univ, Fac Elect Engn, Dept Elect & Elect Commun Engn, Menoufia 32952, Egypt
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, Riyadh 21974, Saudi Arabia
[3] Minia Univ, Fac Engn, Dept Elect & Elect Commun, Al Minya 61111, Egypt
[4] Elshorouk Acad, Higher Inst Engn, Dept Commun & Comp Engn, Elshorouk 11837, Egypt
[5] Menoufia Univ, Fac Elect Engn, Dept Ind Elect & Control Engn, Menoufia 32952, Egypt
[6] Alexandria Univ, Fac Engn, Dept Elect Engn, Alexandria, Egypt
[7] Ahram Canadian Univ, Fac Engn, Dept Elect Engn, 6th October City, Giza, Egypt
[8] Menoufia Univ, Fac Sci, Dept Math & Comp Sci, Shibin Al Kawm 32511, Egypt
[9] Prince Sultan Univ, Secur Engn Lab, Comp Sci Dept, Riyadh 11586, Saudi Arabia
关键词
VOICE ENCRYPTION; FOURIER PLANE; TEMPLATE; SECURITY; SCHEMES; ROBUST;
D O I
10.1364/AO.415523
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
This paper presents a new trend in biometric security systems, which is cancelable multi-biometrics. In general, traditional biometric systems depend on a single biometric for identification. These traditional systems are subject to different types of attacks. In addition, a biometric signature may be lost in hacking scenarios; for example, in the case of intrusion, biometric signatures can be stolen forever. To reduce the risk of losing biometric signatures, the trend of cancelable biometrics has evolved by using either deformed or encrypted versions of biometrics for verification. In this paper, several biometric traits for the same person are treated to obtain a single cancelable template. First, optical scanning holography (OSH) is applied during the acquisition of each biometric. The resulting outputs are then compressed simultaneously to generate a unified template based on the energy compaction property of the discrete cosine transform(DCT). Hence, the OSH is used in the proposed approach as a tool to generate deformed versions of human biometrics in order to get the unified biometric template through DCT compression. With this approach, we guarantee the possibility of using multiple biometrics of the same user to increase security, as well as privacy of the new biometric template through utilization of the OSH. Simulation results prove the robustness of the proposed cancelable multi-biometric approach in noisy environments. (C) 2021 Optical Society of America
引用
收藏
页码:3659 / 3667
页数:9
相关论文
共 56 条
[1]   Robust hybrid watermarking techniques for different color imaging systems [J].
Al-Afandy, Khalid A. ;
El-Shafai, Walid ;
El-Rabaie, El-Sayed M. ;
Abd El-Samie, Fathi E. ;
Faragallah, Osama S. ;
El-Mhalaway, Ahmed ;
Shehata, Ahmed M. ;
El-Banby, Ghada M. ;
El-Halawany, Mohamed M. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) :25709-25759
[2]  
Ali MAM, 2018, 2018 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS & INDUSTRIAL ELECTRONICS (ISCAIE 2018), P434, DOI 10.1109/ISCAIE.2018.8405512
[3]   A new approach for optical colored image compression using the JPEG standards [J].
Alkholidi, A. ;
Alfalou, A. ;
Hamam, H. .
SIGNAL PROCESSING, 2007, 87 (04) :569-583
[4]   Secure Storage and Analysis of Fingerprints for Criminal Investigation using Holographic Techniques [J].
Ambadiyil, Sajan ;
Prakash, Divya ;
Sheeja, M. K. ;
Pillai, V. P. Mahadevan .
MATERIALS TODAY-PROCEEDINGS, 2017, 4 (02) :4389-4395
[5]   A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system [J].
Ben Tarif, Eyad ;
Wibowo, Santoso ;
Wasimi, Saleh ;
Tareef, Afaf .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) :2485-2503
[6]   GAUSSIAN-BEAM ANALYSIS OF OPTICAL-SCANNING HOLOGRAPHY [J].
DUNCAN, BD ;
POON, TC .
JOURNAL OF THE OPTICAL SOCIETY OF AMERICA A-OPTICS IMAGE SCIENCE AND VISION, 1992, 9 (02) :229-236
[7]   Encoder-independent decoder-dependent depth-assisted error concealment algorithm for wireless 3D video communication [J].
El-Shafai, W. ;
El-Rabaie, S. ;
El-Halawany, M. M. ;
Abd El-Samie, Fathi E. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (11) :13145-13172
[8]   Efficient hybrid watermarking schemes for robust and secure 3D-MVC communication [J].
El-Shafai, W. ;
El-Rabaie, S. ;
El-Halawany, M. M. ;
Abd El-Samie, Fathi E. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (04)
[9]   Joint Adaptive Pre-processing Resilience and Post-processing Concealment Schemes for 3D Video Transmission [J].
El-Shafai, Walid .
3D RESEARCH, 2015, 6 (01)
[10]   Pixel-level Matching Based Multi-hypothesis Error Concealment Modes for Wireless 3D H.264/MVC Communication [J].
El-Shafai, Walid .
3D RESEARCH, 2015, 6 (03)