Abstract
In recent years, the protection of human biometrics has witnessed an exponential growth. Fingerprint recognition has been utilized for cell phone authentication, biometric passports, and airport security. To improve the fingerprint recognition process, different approaches have been proposed. To keep biometrics away from hacking attempts, non-invertible transformations or encryption algorithms have been proposed to provide cancelable biometric templates for biometric protection. This paper presents a scheme that depends on chaos-based image encryption with different chaotic maps. The chaotic maps are used instead of the simple random number generator to overcome the loss of randomness in the case of a large number of images. To preserve the authentication performance, we should convolve the training images with random kernels to build the encrypted biometric templates. We can obtain different templates from the same biometrics by varying the chaotic map used to generate the convolution kernels. A comparative study is introduced between the used chaotic maps to determine the one, which gives the best performance. The simulation experiments reveal that the enhanced quadratic map 3 achieves the lowest error probability of 3.861% in the cancelable fingerprint recognition system. The cancelable fingerprint recognition system based on this chaotic map achieves the largest probability of detection of 96.139%, with an Equal Error Rate (EER) of 0.593.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
Due to the quick development of advanced information, cloud computing, and Internet of Things (IoT) applications, protection, and individual data security have got extraordinary mindfulness. The main difficulties within the validation frameworks include codes, individual recognizable Proof Identification Numbers (PINs), and passwords. Refined frameworks of individual security can be used for better confirmation and identification. In this way, biometric traits are utilized in different validation, check, and recognizable proof applications. The essential capacity of these biometric frameworks incorporates selecting biometrics for certain people. After that, features are extracted and stored in datasets. Biometric schemes for the security of physiological traits of people, like face, iris, and fingerprint traits, are turning into a broad reality. The issue is that the clients use biometrics forever and cannot change them. It is recommended that irreversible transforms are applied to prevent biometrics from being stolen. To improve the security of fingerprint recognition, different features and algorithms have been proposed.
Generally, passwords and encryption keys are simply known to the client, yet can be utilized without the client's allowance. Accordingly, secrecy can not be achieved. In addition, biometrics like face, voice, and fingerprint can be recorded and abused without the client’s allowance. Therefore, these biometrics can be stolen, forever. Moreover, the stolen biometrics can be used in a cross-coordinating scenario [1].
To overcome the above-mentioned issues, the cancelable biometrics can be used. In a cancelable biometric framework, basic hashing functions or encryption schemes can be used to strengthen the protection and security of the framework. However, the hash functions are susceptible to minor changes in the information interaction. Practically, all biometric changes as indicated by environmental conditions may affect the obtained hash functions. For example, face and iris biometrics are exceptionally affected by light contrast. So, in practice, these functions cannot be used, directly.
In simple biometric encryption schemes, biometric traits are encrypted at the transmitter and decrypted at the receiver to allow authentication or verification using decrypted biometrics. Unfortunately, this strategy allows hacking scenarios as the decrypted biometrics may be stolen. On the other hand, the concept of cancelable biometrics depends on verification or authentication with encrypted or deformed biometrics. This trend of cancelable biometrics prevents cross-matching as a cancelable template can be generated for each application. In addition, it is infeasible for the attackers to try to get the original biometrics from the cancelable templates [2].
The main contributions of this paper can be summarized as follows:
-
1.
Different types of chaotic maps are investigated and compared for biometric encryption.
-
2.
A bio-convolving scheme is investigated, and new biometric encryption schemes are proposed.
-
3.
The suggested encryption schemes are implemented in a cancelable biometric framework.
The contents of this paper are organized as follows. Section 2 gives the related work. Section 3 gives the chaotic map description. Section 4 introduces a scheme for biometric encryption based on convolution kernels. Section 5 introduces the description of the chaos-based cancelable biometric recognition system, its architecture and the authentication metrics. Section 6 gives the simulation results and discussion. Finally, Sect. 7 gives the concluding remarks.
2 Related work
Several strategies for producing cancelable biometric templates were produced in [3] to overcome the problem of cross-matching between biometric databases. These strategies work on fingerprint images to generate multiple cancelable templates. In essence, a user can use biometric identifiers as needed by issuing a new transformation key. The identifiers can be cancelled and replaced, when attacked. These strategies were applied on face and fingerprint biometrics. The biometric templates can be changed in the signal or feature domain. In [4], an alignment-free scheme to produce cancelable fingerprint biometrics was presented. This scheme is based on a circular curtailed convolution algorithm, which is one-way in nature. It can protect the biometric templates without the possibility to retrieve them from the convolution outcomes. This scheme achieves improvement in the ability to generate cancelable templates and the diversity of these templates.
In [5], the authors tried to overcome the problems of security, and trustiness of biometric templates generated from their scheme. This scheme is dependent on Double Random Phase Encoding (DRPE) and cepstral analysis. In the merged biometric template for each person, four biometrics are combined through Discrete Cosine Transform (DCT) compression. To guarantee security, the authors encrypt the unified biometric templates with the DRPE algorithm. The ability to generate cancelable templates is warranted by changing the random phase sequences of the DRPE algorithm. The compression is performed for all four biometrics by maintaining the most significant coefficients in the DCT domain. In the biometric recognition phase, the unified biometric templates are decrypted, and then a cepstral analysis scheme is applied for biometric verification.
In [6], the authors proposed a fingerprint- and finger-vein-based cancelable multi-biometric scheme. This scheme provides template authentication and verification. It merges the minutia-based feature set of fingerprints and the image-based feature set of finger-veins. In [7], the authors studied biometric recognition based on a pore feature-based scheme. This scheme discovers pores in the input fingerprint images with a Convolutional Neural Network (CNN) model. Then, a patch CNN-based descriptor is estimated for each uncovered pore. This high-resolution fingerprint recognition scheme achieves EERs of 2.91% and 0.57% on partial DBI and complete DBII fingerprints for the standard Poly UHRF dataset. In [8], the authors presented a scheme for fingerprint recognition via deep learning using CNNs. In this scheme, fingerprint recognition was conducted on few available samples.
In [9], the authors provided a comprehensive review and insightful analysis of different types of biometric recognition schemes using deep learning. A comprehensive review of all schemes was presented, including network architectures, training data, and strategies. Both face, fingerprint, iris, palm print, ear, voice, signature, and gait recognition were considered in this paper. In [10], a cancelable fingerprint recognition scheme that depends on multiple spiral curves and fuzzy principles was presented. The fuzzy commitment scheme was used to perform encryption of minutiae features. This scheme achieved an EER of 1.17%. The authors of [11] stated that one of the advantages of cancelable biometrics is to save privacy. In order to save privacy, cancelable biometric transformations should be non-invertible. No information about the original biometric templates should be revealed from the cancelable templates. Also, the authors of [11] presented new cancelable biometric schemes based on bio-hashing. Those schemes depend on non-invertible transforms to protect privacy of users.
In [12], the authors presented a feature-based method for generating cancelable templates from 2D face images. The authors have used five public databases in their proposed scheme and used Speeded-Up Robust Features (SURF) and Scale-Invariant Feature Transform (SIFT) for feature extraction. The authors of [13] presented a merging scheme for aligning fingerprint images in the training set, followed by a learning descriptor for all pore patches using a patch matching model based on a CNN. The scheme in [14] presented a new feature descriptor for fake iris detection. This descriptor exploits the relationship between the center pixel and its hexa neighbor. A hexagonal shape using the six-neighbor approach is preferable to the rectangular structure due to its higher symmetry, consistent connectivity, and efficient use of space. The authors of [15] proposed some ideas to improve the bio-hashing scheme. This improved bio-hashing scheme was used to maintain a very low error rate, when nobody steals the hash key, and to reach a good performance when an attacker steals the hash key. The authors in [16] introduced a cancelable biometric recognition scheme based on producing secret keys for cryptographic methods. The authors of [17] proposed a scheme that encrypts the biometric templates, or training images, by convolving them with random convolution kernels. The authors used the seed to generate the random convolution kernels, which are utilized as the Personal Identification Numbers (PINs). The random kernels are saved and used in the authentication process.
In [18], a new architecture for template generation in the context of situation awareness systems in real and virtual applications was presented. The authors of this paper presented a cancelable biometric template generation algorithm using random biometric fusion, and random projection. This random cross-folding scheme generates cancelable biometric templates from multiple biometric traits.
In this paper, we investigate the efficiency of chaotic maps for the generation of cancelable biometric templates. In addition, the effect of chaotic map parameters on the cancelable biometric system is investigated. First, we investigate different types of chaotic maps to be used for the encryption of the biometric templates. Then, we discuss the effect of the kernel size.
3 Chaotic maps
Implementation of chaos-based cryptography depends on chaotic maps. A function whose domain (input) space and range (output) space are chaotic is called a chaotic map. Chaotic maps represent a class of dynamic systems in which time is discrete rather than being continuous. They exhibit a chaotic behavior for specific parameter values. In the next subsections, we present a brief description of some chaotic maps used in this paper.
3.1 Logistic map
Logistic map is a nonlinear dynamic map. It is one of the simple and popular chaotic maps [19]. The logistic map equation is as follows:
where Xn is a value between 0 and 1, n is the iteration index, and r is a positive number between 0 and 4.
-
Bifurcation
This property is referenced as qualitative bifurcation transition from regular behavior to chaotic behavior. It is achieved by changing the control parameter. The bifurcation diagram of the logistic map is shown in Fig. 1. This diagram contains three regions. The convergence region is at \(r \in [0,{\kern 1pt} 3]\). The bifurcation region is at \(r \in [3,{\kern 1pt} 3.57]\), where the phenomenon of period-doubling bifurcation occurs. The chaos region is at \(r \in [3.57,4],\) where there is a chaotic behavior.
-
Lyapunov Exponent
Lyapunov exponent λ reveals the nature of a chaotic system. It is used as a quantitative metric for the sensitivity to initial conditions. For example, for a discrete system represented as Xn+1 = f(Xn) with an orbit beginning with X0, the Lyapunov exponent can be characterized as follows [20,21,22]:
where f′ is the derivative of f. If λ is above 0, the system is chaotic as the evolution is sensitive to initial conditions. If λ is under 0, the system is not chaotic. If λ is 0, the system is stable, and this represents a steady-state mode. The largest λ defined by Eq. (2) is the Maximal Lyapunov Exponent (MLE). It defines the concept of predictability for a chaotic system.
When r is between 0 and 4, we can plot the Lyapunov exponent of the logistic map with Eq. (2), as shown in Fig. 2. From Fig. 2, we observe that all Lyapunov exponents are equal to 0 or less. The orbit is attracted to a fixed or stable point. When \(r \in [3.57,{\kern 1pt} 4]\), the Lyapunov exponents are larger than zero, leading to a chaotic behavior. The MLE of the logistic map is 0.6785 at r = 4.
3.2 Modified logistic map
The modified logistic chaotic map is a development of the classical logistic map given by Eq. (1), where two polynomial terms \((1 - X_{n - 1} )\), and \((1.2 - 2 \times X_{n - 1} )^{2}\) are added to the logistic map equation to enlarge the range of the parameter r. The modified logistic map is defined as follows [23]:
where Xn is a value between zero and one, n is the iteration index, and r is a number between 0 and 13.8.
-
Bifurcation
Figure 3 illustrates the bifurcation diagram of the modified logistic map. This chart contains three regions. When \(r \in [0,{\kern 1pt} 3.4]\), this refers to the convergence region. When \(r \in [3.4,5.2]\), this refers to the bifurcation region. Finally, for the chaos region, \(r \in [5.2,13.8]\).
-
Lyapunov exponent
We can plot the Lyapunov exponent of the modified logistic map as shown in Fig. 4. It is clear that when \(r \in [0,{\kern 1pt} 5.2]\), Lyapunov exponent is less than or equal to 0. When \(r \in [5.2,{\kern 1pt} 13.8]\), the Lyapunov exponents are positive, and the dynamic behavior is chaotic. The MLE of the modified logistic map is 1.0317 at r = 13.8. It is higher than the MLE of the classical logistic map.
3.3 Classical quadratic map
An essential example of a chaotic system is the quadratic map. The classical quadratic map equation is given by [23]:
where r is a parameter of the chaotic map, a is constant and n is the iteration index.
-
Bifurcation
Figure 5 shows the bifurcation diagram of the quadratic map. This diagram has three regions. The convergence region is at \(r \in [0,{\kern 1pt} 0.74]\). The bifurcation region is at \(r \in [0.74,1.5]\). The chaos region is at \(r \in [1.5,{\kern 1pt} 2]\).
-
Lyapunov exponent
Figure 6 shows the Lyapunov exponent of the quadratic map. It is clear that when \(r \in [0,{\kern 1pt} 1.5]\), all Lyapunov exponents are equal to or less than 0. When \(r \in [1.5,{\kern 1pt} 2]\), the Lyapunov exponents are above 0, and hence the behavior is chaotic. The MLE of the quadratic map is 0.6720.
3.4 Proposed quadratic maps
The proposed quadratic maps general equation is:
We supplant −(Xn)2 in Eq. (4) with the term (1 − aXn)2 and take the modulo 1 division. For three unique values of a = 2, 4, and 8, we analyze the proposed quadratic maps to illustrate the cycle state, bifurcation region, and Lyapunov exponent. Table 1 summarizes the characteristics of all chaotic maps. It reveals the values of both chaotic parameter r and MLE.
Figures 7, 8, and 9 show the bifurcation diagrams of the proposed quadratic maps 1, 2, and 3. It is shown that the proposed chaotic quadratic map 3 has a wider range of r that can be used for encryption. Figures 10, 11, and 12 reveal the Lyapunov exponent for quadratic maps 1, 2, and 3. The Lyapunov exponent for quadratic map 3 has positive values for all values of r except for r = {0.11, 1.11,….}. Hence, the MLE of the proposed quadratic map 3 is 3.4709, which is larger than those of the chaotic maps 1 and 2.
4 Encryption based on convolution kernels
The proposed encryption scheme is implemented through convolution with a random kernel generated using a key related to the plain image [24]. First, the convolution kernel is generated with one of the chaotic maps discussed above. The encryption process is performed through convolution operation between the random kernel and the fingerprint image.
5 Chaos-based cancelable biometric system
To maintain the users’ biometrics from hackers and to guarantee the ability to generate cancelable templates, the biometrics need to be encrypted. So, in the case of theft or loss, we can obtain a different encrypted biometric template from the same original biometric pattern. Chaos-based image encryption is very proper for biometric template encryption, as the chaotic maps are very sensitive to initial conditions. By making a small change in the initial conditions of the chaotic map, this radically changes the obtained encrypted biometric that can be reused in the same application. If the cancelable biometrics are stolen, they can be re-issued. In the following subsection, we explain, in detail, the architecture of the cancelable biometric system.
5.1 Architecture
The cancelable biometric system is divided into two phases: the enrollment phase and the authentication phase, as shown in Figs. 13 and 14. In the enrollment phase shown in Fig. 13, a fingerprint capturing device is used to generate the fingerprint images [25]. These images are then convolved with a random convolution kernel. In our scheme, the kernel is generated by a PIN generated by the user. To generate the random convolution kernel, the PIN is used as the initial condition. This random convolution kernel is convolved with the training images to generate the encrypted training templates.
The resulting encrypted training templates can be put away on a card and used afterwards to verify the users’ IDs. If the card is lost or stolen, it is possible to create an alternate wrapping kernel to generate different encoded biometric templates. If the attacker attempts to use the stolen card to reconstruct the users’ biometrics, he or she needs to know the circumvention kernel used in the recording stage. In order for the hackers to retrieve the original model, image decoding must be performed, which is incredibly hard to perform without knowing the client’s PIN and the encryption scheme [17]. Consequently, this is viewed as a significant degree of safety for biometric templates.
In the authentication phase shown in Fig. 14, the user presents an encrypted fingerprint in the same way as in the enrollment phase. The test images are correlated with stored templates. Distributions are generated for the correlation scores in genuine and imposter tests. Hence, a threshold is determined for the approval process for users.
5.2 Authentication metrics
To ensure the similarity between a test encrypted fingerprint and an encrypted biometric template in the dataset, the correlation score is used. The higher the correlation value is, the higher the similarity between patterns. If the individual correlation score is higher than a specific threshold, admittance to the system is confirmed. The scores of unapproved users ought to be consistently lower than those of approved users [26].
Because of various reasons in biometric frameworks, some arrangement mistakes may happen. For example, unapproved templates may create scores higher than those of some approved ones.
The threshold can be chosen to ensure that all unapproved scores do not exceed a predetermined threshold. Hence, the system does not acknowledge any templates, wrongly. In addition, approved templates with scores lower than the predetermined threshold are mistakenly rejected. Hence, we can choose the threshold, so that no authorized pattern is rejected, wrongly. In this case, some unapproved subjects are wrongly recognized. Generally, in a biometric verification system, test information contains approved and unapproved patterns. Scores for each of the approved and unapproved examples will be circulated somehow or another around a mean of the distribution. The mean score of approved templates is higher than that of unapproved templates.
Hence, the tools that can be utilized to check the obtained scores are the Probability of True Distribution (PTD) and the Probability of False Distribution (PFD) of correlation scores obtained in the validation stage. The PTD is the probability of correlation between authorized fingerprints and the encoded biometric templates in the database, while the PFD (unapproved designs) is the probability of correlation between an unauthorized fingerprint and those stored in the database. We allow admittance to the system if the new fingerprint score is higher than the predetermined threshold with a certain probability of error. The probability of correct detection can be easily obtained from the probability of error, and we can obtain a better system performance at lower error probabilities.
6 Simulation results
Our simulations experiments have been implemented on 20 different fingerprints for 20 persons as shown in Fig. 15 [27]. Each fingerprint is of size 300 × 300 pixels. We use the quadratic and logistic chaotic maps with keys related to the plain images. These keys are used to generate the random convolution kernels (see Fig. 16). The initial conditions of these chaotic maps are changed according to the PIN each user presents. Finally, we compare all chaotic maps.
In the enrollment phase, the user inserts his or her own PIN, and this produces equivalent kernels that are convolved with the training images. The resulting 20 encrypted biometric templates are stored in the database, see Fig. 17.
-
Probability of True Distribution (PTD) and Probability of False Distribution (PFD)
In the authentication phase, we use two fingerprints for testing. One of them belongs to authorized users, and the other belongs to unauthorized users. In both cases, the test user gives a PIN and produces a random wrap kernel. Hence, we obtain two encoded fingerprints for the test. We assume that the unauthorized person knows the correct PIN for an authorized user to test the system security.
We obtain correlation values between the two encrypted fingerprints and the 20 stored encrypted biometric templates. The PTD and PFD are ploted for the cancelable biometric systems for all chaotic maps to determine the error threshold and probability (see Figs. 18, 19, 20, 21, 22, 23). The intersection of the two curves determines the threshold value according to which we can define whether the user is authorized or not.
We examine the proposed quadratic chaotic map 3, because it has a wide range of the parameter r, extended to infinity. Hence, there is no restriction on the PIN chosen by the user. Finally, we compare all chaotic maps. The different sizes of the kernels are illustrated in Table 2.
In the enrollment phase, the user inserts his or her own PIN, and this creates the corresponding kernel, which is convolved with the fingerprint. In the authentication phase, we use two fingerprints for evaluation. One is for an approved person, and the other is for an unapproved person. In the two cases, the test person embeds the PIN and produces the random convolution kernel. Hence, two encoded test fingerprints can be obtained. The unapproved user is assumed to know the correct PIN for one of the approved users to test the level of security of our system. We get the correlation between the two encrypted fingerprints and the 20 stored encrypted biometric templates for each kernel size.
-
True Acceptance Distribution (TAD) and False Acceptance Distribution (FAD)
We plot the TAD and the FAD as shown in Figs. 24, 25, 26, 27, 28, and 29. The intersection between the two curves determines the threshold value to approve user access.
-
Kernel size effect
We study the effect of the kernel size in the enrollment phase, the authentication time, and the threshold value, as shown in Table 3.
As we see from Table 3, for a large kernel size, the threshold value becomes large or close to 1. This case is not preferred since the difference between the correlation distributions of the authorized, and unauthorized scores is very small. As the kernel size is decreased, the threshold value is also decreased until reaching 0.59 for the smallest kernel size of 8 × 8. This means that the distance between the distributions of the correlation for authorized and unauthorized fingerprints is large enough for the system to decide and reject the unauthorized users. The enrollment time, which is used to store the cancelable biometric fingerprints, is decreased as the kernel size is decreased, because the convolution is performed by sliding the kernel over the fingerprint image. As the kernel size is increased, the number of multiplication and addition operations is increased, and then the enrollment time is increased.
-
Chaotic map effect
Now, we study the effect of all chaotic maps we developed in this paper on the threshold value. The EER is used to predetermine the threshold value for the acceptance or rejection of users. The lower the EER value is, the higher the accuracy of the biometric system. As shown in Table 4, the threshold value with all chaotic maps decreased as the kernel size is decreased. However, the difference in the threshold values between all chaotic maps is very small. The reason is that convolving the training fingerprints with any random convolution kernel generated from any chaotic map does not modify the correlation output, significantly. As a result, the authentication reliability is preserved. In addition, different cancelable biometric templates can be created from the same biometric by altering the convolution kernels simply.
-
Performance comparison of different chaotic maps
We study the effect of the different chaotic maps according to the mean value of the authorized patterns, the mean value of the unauthorized patterns, the value of the threshold, the probability of error, and the authentication time as shown in Table 5. The probability of error is changed according to the chaotic map. The proposed quadratic map 3 achieves the smallest value of error probability among all chaotic maps, with 3.861%. The mean values of the authorized/unauthorized patterns and the authentication times per user are nearly the same for all chaotic maps. The difference in the threshold values between all chaotic maps is very small, since convolving the training images with arbitrary convolution kernels produced from different maps does not modify the subsequent correlation output, significantly. Accordingly, the authentication accuracy is kept high. In addition, by altering the PIN for every user, different cancelable biometric templates can be produced from similar biometrics. This is guaranteed through altering the underlying state of the chaotic map and henceforth altering the convolution kernel.
-
Comparison with Recent Related Studies
Table 6 provides a comparison between the proposed system that depends on enhanced quadratic map 3 and some other cancelable biometric systems (Sandhya et al. [15], Dahia and Segundo [17], Xu et al. [19], Anand et al. [7]). The results in Table 6 show superior performance with the enhanced quadratic map 3 with good EER values and a small processing burden.
7 Conclusion
Encryption and hashing schemes are regularly used to secure biometric templates. There are two issues with these strategies. First, the encoded biometrics need to be decoded for recognition. If the biometrics are decoded, this gives a chance for hacking attempts. Another problem is that minor changes in biometrics affect hash functions, severely. Hence, these functions, in practice, could not be used, directly. The concept of cancelable biometrics is introduced in this paper as a solution for these two problems. We presented a method to produce encrypted biometric templates that can be altered using different convolution kernels generated by different chaotic maps. The utilization of scrambled data in biometric systems allows the implementation of the verification process straightforwardly through a correlation test. Even if the attacker succeeds in stealing the encrypted biometric templates, he needs a deconvolution process with a random kernel generated through a certain key. The effect of the chaotic map on the threshold value, error probability, authentication time, and other parameters has been studied. Finally, a comparison between all the chaotic maps used in this paper show that the utilization of the proposed quadratic map 3 in the cancelable biometric system leads to the smallest error probability among all systems with different chaotic maps. Hence, the cancelable biometric system using the proposed quadratic map 3 has the best performance.
References
Ibrahim, S., Egila, M.G., Shawky, H., Elsaid, M.K., El-Shafai, W., Abd El-Samie, F.E.: Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimed. Tools Appl. 79(19), 14053–14078 (2020)
Alarifi, A., Amoon, M., Aly, M.H., El-Shafai, W.: Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system. IEEE Access 8, 221246–221268 (2020)
Algarni, A.D., El Banby, G., Ismail, S., El-Shafai, W., El-Samie, F.E.A., Soliman, F.: Discrete transforms and matrix rotation based cancelable face and fingerprint recognition for biometric security applications. Entropy 22(12), 1361 (2020)
Wang, S., Hu, J.: Design of alignment-free cancelable fingerprint templates via curtailed circular convolution. Pattern Recogn. 47(3), 1321–1329 (2014)
Zakaria, Y., Nassar, R.M., Zahran, O., Hussein, G.A., El-Rabaie, E.S.M., El-Khamy, S.E., et al.: Cancelable multi-biometric security system based on double random phase encoding and cepstral analysis. Multimed. Tools Appl. 78(22), 32333–32355 (2019)
Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C.: A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recogn. 78, 242–251 (2018)
Anand, V., Kanhangad, V.: Porenet: Cnn-based pore descriptor for high-resolution fingerprint recognition. IEEE Sens. J. 20(16), 9305–9313 (2020)
Minaee, S., Azimi, E., Abdolrashidi, A.: Fingernet: Pushing the limits of fingerprint recognition using convolutional neural network. (2019). arXiv preprint arXiv: 1907.12956
Minaee, S., Abdolrashidi, A., Su, H., Bennamoun, M., Zhang, D.: Biometrics recognition using deep learning: a survey. arXiv preprint arXiv: 1912.00271 (2019)
Rosenstein, M.T., Collins, J.J., De Luca, C.J.: A practical method for calculating largest Lyapunov exponents from small data sets. Phys. D 65(1–2), 117–134 (1993)
Kantz, H.: A robust method to estimate the maximal Lyapunov exponent of a time series. Phys. Lett. A 185(1), 77–87 (1994)
Gupta, S., Thakur, K., Kumar, M.: 2D-human face recognition using SIFT and SURF descriptors of face’s feature regions. Vis. Comput., pp. 1–10. (2020)
Ramadan, N., Ahmed, E.H., Elkhamy, E.S.: Hybrid ciphering system of images based on fractional Fourier transform and two chaotic maps. Int. J. Comput. Appl. 119(11), 12–17 (2015)
Agarwal, R., Jalal, A.S., Arya, K.V.: Local binary hexagonal extrema pattern (LBH X EP): a new feature descriptor for fake iris detection. Vis. Comput. 37, 1357–1368 (2021)
Sandhya, M., Prasad, M.V.: Cancelable fingerprint cryptosystem using multiple spiral curves and fuzzy commitment scheme. Int. J. Pattern Recognit Artif Intell. 31(04), 1756004 (2017)
Cheung, K.H., Kong, A.W.K., You, J., Zhang, D.: An Analysis on Invertibility of Cancelable Biometrics based on BioHashing. In CISST (Vol. 2005, pp. 40–45) (2005)
Dahia, G., Segundo, M.P.: Automatic dataset annotation to learn CNN pore description for fingerprint recognition. arXiv preprint arXiv: 1809.10229 (2018)
Paul, P.P., Gavrilova, M., Klimenko, S.: Situation awareness of cancelable biometric system. Vis. Comput. 30(9), 1059–1067 (2014)
Xu, Y., Lu, G., Lu, Y., Liu, F., Zhang, D.: Fingerprint pore comparison using local features and spatial relations. IEEE Trans. Circuits Syst. Video Technol. 29(10), 2927–2940 (2018)
El-Shafai, W., Almomani, I.M., Alkhayer, A.: Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access 9, 35004–35026 (2021)
Ibrahim, S., Egila, M.G., Shawkey, H., Elsaid, M.K., El-Shafai, W., Abd El-Samie, F.E.: Hardware Implementation of Cancellable Biometric Systems. In 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 1145–1152). IEEE. (2020)
Abd El-Samie, F.E., Nassar, R.M., Safan, M., Abdelhamed, M.A., Khalaf, A.A., El Banby, G.M., et al.: Efficient implementation of optical scanning holography in cancelable biometrics. Appl. Opt. 60(13), 3659–3667 (2021)
Badr, I.S., Radwan, A.G., El-Sayed, E.R., Said, L.A., El Banby, G.M., El-Shafai, W., Abd El-Samie, F.E.: Cancellable face recognition based on fractional-order Lorenz chaotic system and Haar wavelet fusion. Dig. Signal Process. 103103. (2021 ).
El-Shafai, W., Mohamed, F.A.H E., Elkamchouchi, H.M., Abd-Elnaby, M., ElShafee, A.: Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm. IEEE Acces (2021).
Faragallah, O.S., El-sayed, H.S., Afifi, A., El-Shafai, W.: Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform. Optics and Lasers in Engineering, 137, 106333 (2021).
Faragallah, O.S., Afifi, A., El-Sayed, H.S., Alzain, M.A., Al-Amri, J.F., Abd El-Samie, F.E., El-Shafai, W.: Efficient HEVC integrity verification scheme for multimedia cybersecurity applications. IEEE Access 8, 167069–167089 (2020)
FVC2002 (DB1) database. Available online: https://www.biometricsinstitute.org/resources/fingerprint-verification-competition-fvc. Accessed 1 July 2021.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
We declare that we have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
El-Hameed, H.A.A., Ramadan, N., El-Shafai, W. et al. Cancelable biometric security system based on advanced chaotic maps. Vis Comput 38, 2171–2187 (2022). https://doi.org/10.1007/s00371-021-02276-2
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00371-021-02276-2