An Efficient GCD-Based Cancelable Biometric Algorithm for Single and Multiple Biometrics
2021-12-15NaglaaSolimanAbeerAlgarniWalidElShafaiFathiAbdElSamie1andGhadaElBanby
Naglaa F.Soliman,Abeer D.Algarni,Walid El-Shafai,Fathi E.Abd El-Samie1, and Ghada M.El Banby
1Department of Information Technology,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Riyadh,84428,Saudi Arabia
2Department of Electronics and Communications,Faculty of Engineering,Zagazig University,Zagazig,44519,Egypt
3Department of Electronics and Electrical Communications,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt
4Department of Industrial Electronics and Control Engineering,Faculty of Electronic Engineering,Menoufai University,Menouf,32952,Egypt
Abstract:Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things(IoT)networks.The objective of using cancelable biometrics is to save the original ones from hacking attempts.A generalized algorithm to generate cancelable templates that is applicable on both single and multiple biometrics is proposed in this paper to be considered for cloud and IoT applications.The original biometric is blurred with two co-prime operators.Hence,it can be recovered as the Greatest Common Divisor (GCD) between its two blurred versions.Minimal changes if induced in the biometric image prior to processing with co-prime operators prevents the recovery of the original biometric image through a GCD operation.Hence,the ability to change cancelable templates is guaranteed,since the owner of the biometric can pre-determine and manage the minimal change induced in the biometric image.Furthermore,we test the utility of the proposed algorithm in the single-and multi-biometric scenarios.The multi-biometric scenario depends on compressing face,fingerprint,iris,and palm print images,simultaneously,to generate the cancelable templates.Evaluation metrics such as Equal Error Rate(EER)and Area and Receiver Operator Characteristic curve (AROC) are considered.Simulation results on single-and multi-biometric scenarios show high AROC values up to 99.59%,and low EER values down to 0.04%.
Keywords:Cloud;IoT;cancelable biometrics;GCD;single-and multi-biometrics;security applications
1 Introduction
Compared to authentication systems based on passwords,tokens,IDs,and biometrics,cancelable biometric recognition systems provide better security for human identification purposes.They are more suitable for remote access networks such as cloud and IoT networks.Cancelable biometric systems can be built with a single or uni-biometric,hence the name uCBS,or with multiple biometrics,hence the name mCBS.The uCBS are considered less secure compared to the mCBS [1].The general framework of uCBAS is presented in Fig.1,where the recognition process involves a sensor module for image capturing,a pre-processing module for data alignment and noise removal,and a segmentation module to extract the region of interest from the input image followed by the feature extraction process,which heralds the user identification.
Figure 1:Framework of typical uCBS
User validation schemes are impeded by overlapping facial biometrics as in twins,poor data acquisition in the case of dry fingerprints,or even missing data,in typical cases of occluded biometric images.Therefore,mCBS are required to enhance the outcomes of the recognition process.Human facial,iris,fingerprint,ear,signature,voice,and other biometric modalities are now widely exploited to build robust mCBS.At the same time,such behavioral biometrics suffer from unavailability or poor coverage over large databases,and they also exhibit poor recognition accuracy [2].Meanwhile,several studies focusing on numerical approaches to secure biometric templates have been published [3-5].Notwithstanding these efforts,safeguarding biometric templates from illicit tampering remains a top priority deserving improvement in the face of sophisticated techniques to violate their intensity.
For increasing the security,accuracy,and genuine acceptance rate,mCBS have been implemented [6].Different studies on improving the accuracy of mCBS have been published [6-17].Multimodal biometric systems take more than one biometric template to fuse them for the identification and validation purposes.An effective fusion scheme is an important step for effective mCBS.In this regard,Rathgeb et al.[7]presented a privacy preserving technique based on feature level fusion with bloom filter applied on face and iris biometrics.They reported an EER of 0.4%.Similarly,Paul et al.[8]presented a facial and ear cancelable biometric mechanism based on fusion.Both face and ear templates are partitioned into 25 blocks,and a random projection process is applied on each block.Subsequently,the average fused projected blocks are used to generate the cancelable templates.The results reported improvements of 12% and 14% in the recognition accuracy compared to those of the face and ear recognition systems,respectively.In their contribution,Dwivedi et al.[9]presented a two-level cancelable multi-biometric recognition system based on a score fusion technique.This system depends on a rectangular area weighting technique that is applied on scores from different modalities.It achieved a high authentication performance compared to those of the single-biometric recognition systems.Moreover,Kaur et al.[10]proposed a framework for multi-server biometrics that integrates a pseudo-biometric identity with a revoked version from a pseudo-template.The authors claimed enhanced security using pseudo-identities generated using a Random Distance Method (RDM).
Furthermore,Yang et al.[11]proposed an mCBS based on both fingerprint and fingervein.Their method generates cancelable templates by combining feature sets extracted from both biometrics.They accomplished feature-level fusion using Partial Discrete Fourier Transform (PDFT).They reported a higher security level for the Enhanced Partial Discrete Fourier Transform (EPDFT) compared to that of the PDFT.Goswami et al.[12]proposed feature-level fusion and classification for multi-modality biometric recognition.They applied a Group Sparse Representation Classifier (GSRC) on feature vectors extracted from multi-biometrics,which yields biometric authentication with an accuracy of 99.1%.Likewise,Canuto et al.[13]investigated four fusion approaches for mCBS using voice and iris biometrics.Their work proves that cancelable biometric schemes based on more than one transformation could offer more security,since these transformations complicate the verification task.In their effort,a fusion structure in the feature level for fingerprint templates was proposed by Sandhy et al.[14].Therein,two transformed features are computed from the fingerprint minutiae to produce a bit string to be used in the fusion process.They achieved an EER of 1.6% on the Fingerprint Verification Competition (FVC 2002) database.Meanwhile,Barrero et al.[15]introduced a multi-modality biometric recognition system based on homomorphic encryption.They applied three fusion levels:feature,score,and decision to safeguard their templates,and they reported a minimum EER of 0.12%.
Similarly,Lai et al.[16]proposed a cancelable iris recognition scheme based on hashing.It depends on a Hadamard product operation and a modulo threshold function.The authors claimed improved accuracy in addition to enhanced security.Finally,Umer et al.[17]introduced a bio-hashing approach with a spatial pyramidal feature extraction process.It depends on a user-specific independent token that can be generated by each user with his selected generation method.
This paper presents a new algorithm that can be applied for both uCBS and mCBS.The main idea of the proposed algorithm depends on the Greatest Common Divisor (GCD) to generate the cancelable templates.It is known that if two co-prime operators are used on the same biometric image to obtain two blurred versions of that image,the original biometric itself can be obtained again through the 2D GCD between the two blurred versions.If some intended change is induced in the biometric image prior to or after the application of one of the blurring operators,this will lead to a distorted output from the 2D GCD operation.This output can be used instead of the original biometric template as a cancelable template.This idea is adopted in this paper to build uCBS and mCBS.The remainder of this study is outlined as follows.The basics of the related 1-D and 2-D Sylvester GCD algorithms are discussed in Section 2.The proposed cancelable template generation algorithm for uCBS and mCBS is presented in Section 3.Extensive simulation experiments are presented in Section 4 to validate the proposed algorithm.Finally,the concluding remarks are summarized in Section 5.
2 Basics of the Sylvester GCD Algorithms
This section introduces the major fundamental theories of the 1-D and 2-D Sylvester GCD algorithms that will be exploited in the proposed cancelable biometric algorithm to create the distorted versions of the original biometrics.
2.1 One-Dimensional(1-D)Sylvester GCD Algorithm
LetA(z)andB(z)be two polynomials defined as:
and
Similarly,if the GCD between the two polynomials is equal toP(z),which is of degreer,then it can be computed in the form:
where
and
are two relatively co-prime polynomials.Consequently,it follows from [18]that
By equating the coefficients of like powers ofzon both sides of Eq.(6),a matrix equivalence in the form in (7) is obtained [18]:
where
Hence,S is defined as presented in Eq.(9) [18].
By analyzing the matrix S in Eq.(9),it can be deduced that it hasn2+n1-2r+2 rows andn2+n1-r+1 columns.Therefore,givenr,x can be obtained via the application of Singular Value Decomposition (SVD) on S.Furthermore,sinceC(z)andD(z)are two unique polynomials of degreesn2-randn1-r,it is deducible that x has a unique solution,and consequently,S must possessn2+n1-2r+1 linearly independent rows.As a result,the singular vector that corresponds to the zero singular value of S is the least-squares solution of Eq.(7) for x,and it contains the coefficient values ofC(z)andD(z)as explained in [18].
In some cases,the degreerof the GCD is unknown,and hence,S cannot be formed.In that case,we have [18]:
where
with
Therefore,S0can be computed using the standard Sylvester matrix presented in Eq.(13).
Using arguments in (9),it can be deduced that S0has dimensions of(n2+n1)×(n2+n1).Meanwhile,the necessary and sufficient condition forA(z)andB(z)to have a non-constant GCD is that the resultant Sylvester matrix S0is singular.The structural relation between S0and S is illustrated in Fig.2.Furthermore,if we denote the sub-matrix of size(n2+n1-2k)×(n2+n1-k)as Sk,which is obtained by striking out the firstkand lastkrows of S0and the firstkcolumns of S0,then forGCD{A(z),B(z)}=P(z)with degreer,S0,S1,...,Sr-1must be singular and Sr-1must be of rankn2+n1-2r+1.
Figure 2:Structure of the Sylvester matrix used to estimate the GCD
2.2 Two-Dimensional(2-D)Sylvester GCD Algorithm
The direct extension of the 1-D Sylvester algorithm to the 2-D case in terms of constant matrices generated from the given 2-D polynomial coefficients leads to very large-size matrices.ForN×Nimages,the matrix S will be of size 2N2×2N2.Since the SVD computation produces matrices with a size proportional to the cube of the original matrix size,operations ofO(N6)are required to execute the SVD,directly.Hence,a more efficient strategy is needed to extend the 1-D Sylvester algorithm to a 2-D algorithm.
In doing so,we assume that the two blurred versionsg1(n1,n2)andg2(n1,n2)of the original imagef(n1,n2)are bothN1×N2matrices.The coefficients of these matrices are the coefficients of thez-transforms of their respective images.Using the Conventional Discrete Fourier Transform Least Squares (CDFT-LS) approach,we substitutez1=e-j2πn1/N1,n1=0,1,…,N1-1,into bothG1(z1,z2)andG2(z1,z2).This results in two 1-D polynomials [17]:
wherek=1,2.
We scale each row by a constantc(n1)=So,we obtain:
Undertaking similar operations and substitutinginG1(z1,z2)andG2(z1,z2),whose 1-D GCD was obtained by substitution ofwe obtain another matrix,B(n1,n2)in Eq.(17),which is related to the discrete Fourier transform of the original image by column-wise scaling [18]:
From Eqs.(16) and (17),we have:
Eq.(18) can be written in matrix form as [18]:
where
and
Multiplying Eq.(21) byΓTyields [18]:
Eq.(22) can be solved using the least-squares solution to produce Eq.(23):
For an eigenvector y corresponding to the smallest eigenvalue ofΓTΓin Eq.(23),the estimated Fourier transform of the original image can be realized in the form [17]:
Finally,the inverse Fourier transform can be used to estimate the GCD.If we use two blurred images of the same biometric and estimate their 2D GCD,we can get the original biometric template.On the other hand,if we make a slight change induced by the user prior to or after blurring,we severely distort the 2D GCD result.The result of the GCD in this case can be used as a cancelable template.The minor changes can be induced in each biometric template in a user-specific manner.
3 Proposed GCD-Based Cancelable Biometric Algorithm
Fig.3 presents the outlines of the proposed algorithm.As seen in the figure,the original biometric images are firstly compressed using the Discrete Cosine Transform (DCT) compression algorithm.After that,they are merged together to form a unified biometric template.This template is blurred with an operatorh1(n1,n2).Simultaneously,another blurred version of the biometric template is generated with another operatorh2(n1,n2).
We have:
Applyingz-transform on (25) and (26),we get:
where
and
IfH1(z1,z2)andH2(z1,z2)are co-prime,then
and
As shown in Fig.3,if we induce some minimal change in the compressed template prior to blurring withh2(n1,n2),Eq.(31) does not hold.This leads to a distorted version of the fused templates that can be used as a cancelable template.
Figure 3:The proposed unified mCBS framework
4 Results and Discussion
In this section,the assessment of the suggested algorithm is introduced.Firstly,the security analysis of the suggested GCD-based algorithm as an encryption-like algorithm is presented in terms of visual analysis,correlation analysis,differential attack analysis,and entropy analysis [19]as provided in Tab.1.It is well-known that the algorithm must break the correlation amongst the adjacent pixels.It is observed from the obtained outcomes that the suggested GCD-based algorithm succeeds in demolishing the very high correlation of pixels in the original biometric templates.Moreover,Tab.1 demonstrates correlation,Unified Average Change Intensity (UACI),and Number of Changing Pixel Rate (NPCR) values [20]between two ciphered biometric templates.The outcomes reveal that the suggested GCD-based algorithm is robust and vulnerable to control parameters and secret keys.So,all results confirm that the suggested GCD-based algorithm can be executed,cost-effectively,for constructing an efficient and secure cancelable biometric recognition system.As a result,this encouraged us to develop it in our suggested work.
Table 1:Security analysis for evaluating the suggested GCD-based algorithm
Figure 4:Dataset 1 consisting of nine facial images [21]
Figure 5:Cancelable facial images for those in Fig.4 with GCD algorithm
Furthermore,in this section,several experiments are introduced to verify the validity of the proposed uCBS and mCBS that depend on 2D GCD.They have been implemented using a workstation equipped with MATLAB Intel ® Core ™i7-4210U on a CPU with a 1.7 GHz processor.Four datasets have been used in the uCBS experiments,namely ORL [21],FVC2000 DB1 [22],CASIA-IrisV3-Interval [23],and CASIA Palm print [24]for face,fingerprint,iris,and palm print images,respectively.
For the uCBS,the experiments are based on generating two blurred versions of each template and inducing a minor change in one of them prior to blurring.Hence,the 2D-GCD is implemented to generate the cancelable template of that biometric.The database of cancelable templates is composed,and hence the distance between new templates and those in the database is estimated based on the correlation score.Both EER and AROC values are estimated for the verification process.On the other hand,the proposed mCBS depends on estimating the DCTs of four biometric templates and generating a combined version based on the first quadrant of each DCT.This combined version is used as an initial template that is blurred twice.A minor change in one of these versions and the application of the 2D-GCD lead to the cancelable template.
Figure 6:Histograms of facial images (a) original images (b) cancelable templates
Figure 7:Correlation scores for original facial images (a) genuine (b) imposter
The Receiver Operating Characteristic (ROC) curve,which represents the relationship between the true-positive correlation and false-positive correlation [25,26],is used to assess the performance of the suggested CBS.The scores of all patterns are distributed around a mean score,which is higher for authorized patterns compared to unauthorized ones.
Figure 8:Authentication curves for facial biometrics (a) PFD curves (b) ROC curve
Figure 10:Cancelable fingerprint images for those in Fig.9 with GCD algorithm
Figure 11:Histograms of fingerprint images (a) original images (b) cancelable templates
Figure 12:Correlation scores for original fingerprint images (a) genuine (b) imposter
Figure 13:Authentication curves for cancelable fingerprint recognition (a) PFD curves (b) ROC curve
The multi-modal biometrics used to validate the proposed CBS consist of facial,fingerprint,iris,and palm print images as presented in Fig.4 (Faces),Fig.9 (Fingerprints),Fig.14 (Iris),and Fig.19 (Palm prints).Figs.5,10,15,and 20 present the unimodal cancelable templates with 2D GCD.The histograms of the pristine unimodal biometrics are presented in Figs.6,11,16,and 21 for facial,fingerprint,iris,and palm print biometrics,respectively.
Figure 14:Dataset 3 consisting of nine biometric iris images [23]
Figs.7,12,17,and 22 present the correlation scores for all nine unimodal biometric images used in the uCBS experiments.The PTD,PFD,and ROC curves for these biometrics are presented in Figs.8,13,18,and 23.These curves display the threshold values used to distinguish authorized users from unauthorized ones.Fig.24 presents the composite multi-biometric templates.Samples of the GCD cancelable multi-biometric templates and their respective histograms are presented in Fig.25.Correlation scores for both authorized and unauthorized patterns are introduced in Fig.26.Authentication curves for the proposed mCBS are presented in Fig.27.
Finally,the average A ROC,mean correlation scores,False Acceptance Rate (FAR),False Rejection Rate (FRR),and ERR for the GCD-based mCBS are presented in Tab.2.
Figure 15:Cancelable iris images for those in Fig.14 with GCD algorithm
Figure 16:Histograms of iris images (a) original images (b) cancelable templates
Figure 17:Correlation scores for original iris images (a) genuine (b) imposter
Figure 18:Authentication curves for cancelable iris recognition (a) PFD curves (b) ROC curve
Figure 19:Dataset 4 consisting of nine palm print images [24]
· Comparison with Other Related Works
To validate the suggested CBS,more test investigations have been carried out for comparison of the suggested CBS with the latest algorithms [25-32].We compared the average FAR,EER,AROC,and FRR of the suggested CBS with those of the CBS in [25-32]as presented in Tab.3.From the introduced comparative study in Tab.3,we ensure that the FAR,EER,AROC,and FRR of the suggested CBS are better than those of the other traditional CBS.
Figure 20:Cancelable palm print images for those in Fig.19 with GCD algorithm
Figure 21:Histograms of palm print images (a) original images (b) cancelable templates
Figure 22:Correlation scores for original palm print images (a) genuine (b) imposter
Figure 23:Authentication curves for cancelable palm print recognition (a) PFD curves (b) ROC curve
Figure 24:Composite DCT outputs of multi-biometric inputs and their histograms
Figure 25:Cancelable templates for the proposed mCBS and their histograms
Figure 26:Correlation scores for the proposed mCBS (a) genuine (b) imposter
Figure 27:Authentication curves for the proposed mCBS (a) PFD curves (b) ROC curve
Table 2:Results of the proposed uCBS and mCBS
Table 3:Average metric values for the proposed and traditional CBS [25-32]
5 Conclusions and Future Work
This paper presented a new approach to build efficient CBS using single-and multi-biometric inputs for cloud and IoT biometric applications.Pre-determined distortions are induced in the biometric images for single-and multi-biometric inputs with the GCD algorithm.As a selfdependent approach,the need for auxiliary data or images is eliminated.The GCD with some minimal changes can be used efficiently in the generation of cancelable biometric templates.We validated the proposed uCBS and mCBS on inputs consisting of facial,fingerprint,iris,and palm print images.AROC values above 99% were recorded for all the examined biometrics.This work can be easily implemented for cloud,IoT,and wireless access applications.In addition,it can be enhanced with the utilization of encryption algorithms with the GCD algorithm.In the future,we can incorporate deep learning algorithms for compressing and encrypting the biometric images for enhancing the cancelable biometric system performance.
Acknowledgement:The authors would like to thank the support of the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University.
Funding Statement:This research was funded by the Deanship of Scientific Research at Princess Nourah Bint Abdulrahman University through the Fast-track Research Funding Program to support publication in the top journal (Grant No.42-FTTJ-13).
Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.
杂志排行
Computers Materials&Continua的其它文章
- Classification of Epileptic Electroencephalograms Using Time-Frequency and Back Propagation Methods
- ANN Based Novel Approach to Detect Node Failure in Wireless Sensor Network
- Optimal Implementation of Photovoltaic and Battery Energy Storage in Distribution Networks
- Development of a Smart Technique for Mobile Web Services Discovery
- Small Object Detection via Precise Region-Based Fully Convolutional Networks
- An Optimized English Text Watermarking Method Based on Natural Language Processing Techniques