999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

An Efficient GCD-Based Cancelable Biometric Algorithm for Single and Multiple Biometrics

2021-12-15 08:11:10NaglaaSolimanAbeerAlgarniWalidElShafaiFathiAbdElSamie1andGhadaElBanby
Computers Materials&Continua 2021年11期

Naglaa F.Soliman,Abeer D.Algarni,Walid El-Shafai,Fathi E.Abd El-Samie1, and Ghada M.El Banby

1Department of Information Technology,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Riyadh,84428,Saudi Arabia

2Department of Electronics and Communications,Faculty of Engineering,Zagazig University,Zagazig,44519,Egypt

3Department of Electronics and Electrical Communications,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

4Department of Industrial Electronics and Control Engineering,Faculty of Electronic Engineering,Menoufai University,Menouf,32952,Egypt

Abstract:Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things(IoT)networks.The objective of using cancelable biometrics is to save the original ones from hacking attempts.A generalized algorithm to generate cancelable templates that is applicable on both single and multiple biometrics is proposed in this paper to be considered for cloud and IoT applications.The original biometric is blurred with two co-prime operators.Hence,it can be recovered as the Greatest Common Divisor (GCD) between its two blurred versions.Minimal changes if induced in the biometric image prior to processing with co-prime operators prevents the recovery of the original biometric image through a GCD operation.Hence,the ability to change cancelable templates is guaranteed,since the owner of the biometric can pre-determine and manage the minimal change induced in the biometric image.Furthermore,we test the utility of the proposed algorithm in the single-and multi-biometric scenarios.The multi-biometric scenario depends on compressing face,fingerprint,iris,and palm print images,simultaneously,to generate the cancelable templates.Evaluation metrics such as Equal Error Rate(EER)and Area and Receiver Operator Characteristic curve (AROC) are considered.Simulation results on single-and multi-biometric scenarios show high AROC values up to 99.59%,and low EER values down to 0.04%.

Keywords:Cloud;IoT;cancelable biometrics;GCD;single-and multi-biometrics;security applications

1 Introduction

Compared to authentication systems based on passwords,tokens,IDs,and biometrics,cancelable biometric recognition systems provide better security for human identification purposes.They are more suitable for remote access networks such as cloud and IoT networks.Cancelable biometric systems can be built with a single or uni-biometric,hence the name uCBS,or with multiple biometrics,hence the name mCBS.The uCBS are considered less secure compared to the mCBS [1].The general framework of uCBAS is presented in Fig.1,where the recognition process involves a sensor module for image capturing,a pre-processing module for data alignment and noise removal,and a segmentation module to extract the region of interest from the input image followed by the feature extraction process,which heralds the user identification.

Figure 1:Framework of typical uCBS

User validation schemes are impeded by overlapping facial biometrics as in twins,poor data acquisition in the case of dry fingerprints,or even missing data,in typical cases of occluded biometric images.Therefore,mCBS are required to enhance the outcomes of the recognition process.Human facial,iris,fingerprint,ear,signature,voice,and other biometric modalities are now widely exploited to build robust mCBS.At the same time,such behavioral biometrics suffer from unavailability or poor coverage over large databases,and they also exhibit poor recognition accuracy [2].Meanwhile,several studies focusing on numerical approaches to secure biometric templates have been published [3-5].Notwithstanding these efforts,safeguarding biometric templates from illicit tampering remains a top priority deserving improvement in the face of sophisticated techniques to violate their intensity.

For increasing the security,accuracy,and genuine acceptance rate,mCBS have been implemented [6].Different studies on improving the accuracy of mCBS have been published [6-17].Multimodal biometric systems take more than one biometric template to fuse them for the identification and validation purposes.An effective fusion scheme is an important step for effective mCBS.In this regard,Rathgeb et al.[7]presented a privacy preserving technique based on feature level fusion with bloom filter applied on face and iris biometrics.They reported an EER of 0.4%.Similarly,Paul et al.[8]presented a facial and ear cancelable biometric mechanism based on fusion.Both face and ear templates are partitioned into 25 blocks,and a random projection process is applied on each block.Subsequently,the average fused projected blocks are used to generate the cancelable templates.The results reported improvements of 12% and 14% in the recognition accuracy compared to those of the face and ear recognition systems,respectively.In their contribution,Dwivedi et al.[9]presented a two-level cancelable multi-biometric recognition system based on a score fusion technique.This system depends on a rectangular area weighting technique that is applied on scores from different modalities.It achieved a high authentication performance compared to those of the single-biometric recognition systems.Moreover,Kaur et al.[10]proposed a framework for multi-server biometrics that integrates a pseudo-biometric identity with a revoked version from a pseudo-template.The authors claimed enhanced security using pseudo-identities generated using a Random Distance Method (RDM).

Furthermore,Yang et al.[11]proposed an mCBS based on both fingerprint and fingervein.Their method generates cancelable templates by combining feature sets extracted from both biometrics.They accomplished feature-level fusion using Partial Discrete Fourier Transform (PDFT).They reported a higher security level for the Enhanced Partial Discrete Fourier Transform (EPDFT) compared to that of the PDFT.Goswami et al.[12]proposed feature-level fusion and classification for multi-modality biometric recognition.They applied a Group Sparse Representation Classifier (GSRC) on feature vectors extracted from multi-biometrics,which yields biometric authentication with an accuracy of 99.1%.Likewise,Canuto et al.[13]investigated four fusion approaches for mCBS using voice and iris biometrics.Their work proves that cancelable biometric schemes based on more than one transformation could offer more security,since these transformations complicate the verification task.In their effort,a fusion structure in the feature level for fingerprint templates was proposed by Sandhy et al.[14].Therein,two transformed features are computed from the fingerprint minutiae to produce a bit string to be used in the fusion process.They achieved an EER of 1.6% on the Fingerprint Verification Competition (FVC 2002) database.Meanwhile,Barrero et al.[15]introduced a multi-modality biometric recognition system based on homomorphic encryption.They applied three fusion levels:feature,score,and decision to safeguard their templates,and they reported a minimum EER of 0.12%.

Similarly,Lai et al.[16]proposed a cancelable iris recognition scheme based on hashing.It depends on a Hadamard product operation and a modulo threshold function.The authors claimed improved accuracy in addition to enhanced security.Finally,Umer et al.[17]introduced a bio-hashing approach with a spatial pyramidal feature extraction process.It depends on a user-specific independent token that can be generated by each user with his selected generation method.

This paper presents a new algorithm that can be applied for both uCBS and mCBS.The main idea of the proposed algorithm depends on the Greatest Common Divisor (GCD) to generate the cancelable templates.It is known that if two co-prime operators are used on the same biometric image to obtain two blurred versions of that image,the original biometric itself can be obtained again through the 2D GCD between the two blurred versions.If some intended change is induced in the biometric image prior to or after the application of one of the blurring operators,this will lead to a distorted output from the 2D GCD operation.This output can be used instead of the original biometric template as a cancelable template.This idea is adopted in this paper to build uCBS and mCBS.The remainder of this study is outlined as follows.The basics of the related 1-D and 2-D Sylvester GCD algorithms are discussed in Section 2.The proposed cancelable template generation algorithm for uCBS and mCBS is presented in Section 3.Extensive simulation experiments are presented in Section 4 to validate the proposed algorithm.Finally,the concluding remarks are summarized in Section 5.

2 Basics of the Sylvester GCD Algorithms

This section introduces the major fundamental theories of the 1-D and 2-D Sylvester GCD algorithms that will be exploited in the proposed cancelable biometric algorithm to create the distorted versions of the original biometrics.

2.1 One-Dimensional(1-D)Sylvester GCD Algorithm

LetA(z)andB(z)be two polynomials defined as:

and

Similarly,if the GCD between the two polynomials is equal toP(z),which is of degreer,then it can be computed in the form:

where

and

are two relatively co-prime polynomials.Consequently,it follows from [18]that

By equating the coefficients of like powers ofzon both sides of Eq.(6),a matrix equivalence in the form in (7) is obtained [18]:

where

Hence,S is defined as presented in Eq.(9) [18].

By analyzing the matrix S in Eq.(9),it can be deduced that it hasn2+n1-2r+2 rows andn2+n1-r+1 columns.Therefore,givenr,x can be obtained via the application of Singular Value Decomposition (SVD) on S.Furthermore,sinceC(z)andD(z)are two unique polynomials of degreesn2-randn1-r,it is deducible that x has a unique solution,and consequently,S must possessn2+n1-2r+1 linearly independent rows.As a result,the singular vector that corresponds to the zero singular value of S is the least-squares solution of Eq.(7) for x,and it contains the coefficient values ofC(z)andD(z)as explained in [18].

In some cases,the degreerof the GCD is unknown,and hence,S cannot be formed.In that case,we have [18]:

where

with

Therefore,S0can be computed using the standard Sylvester matrix presented in Eq.(13).

Using arguments in (9),it can be deduced that S0has dimensions of(n2+n1)×(n2+n1).Meanwhile,the necessary and sufficient condition forA(z)andB(z)to have a non-constant GCD is that the resultant Sylvester matrix S0is singular.The structural relation between S0and S is illustrated in Fig.2.Furthermore,if we denote the sub-matrix of size(n2+n1-2k)×(n2+n1-k)as Sk,which is obtained by striking out the firstkand lastkrows of S0and the firstkcolumns of S0,then forGCD{A(z),B(z)}=P(z)with degreer,S0,S1,...,Sr-1must be singular and Sr-1must be of rankn2+n1-2r+1.

Figure 2:Structure of the Sylvester matrix used to estimate the GCD

2.2 Two-Dimensional(2-D)Sylvester GCD Algorithm

The direct extension of the 1-D Sylvester algorithm to the 2-D case in terms of constant matrices generated from the given 2-D polynomial coefficients leads to very large-size matrices.ForN×Nimages,the matrix S will be of size 2N2×2N2.Since the SVD computation produces matrices with a size proportional to the cube of the original matrix size,operations ofO(N6)are required to execute the SVD,directly.Hence,a more efficient strategy is needed to extend the 1-D Sylvester algorithm to a 2-D algorithm.

In doing so,we assume that the two blurred versionsg1(n1,n2)andg2(n1,n2)of the original imagef(n1,n2)are bothN1×N2matrices.The coefficients of these matrices are the coefficients of thez-transforms of their respective images.Using the Conventional Discrete Fourier Transform Least Squares (CDFT-LS) approach,we substitutez1=e-j2πn1/N1,n1=0,1,…,N1-1,into bothG1(z1,z2)andG2(z1,z2).This results in two 1-D polynomials [17]:

wherek=1,2.

We scale each row by a constantc(n1)=So,we obtain:

Undertaking similar operations and substitutinginG1(z1,z2)andG2(z1,z2),whose 1-D GCD was obtained by substitution ofwe obtain another matrix,B(n1,n2)in Eq.(17),which is related to the discrete Fourier transform of the original image by column-wise scaling [18]:

From Eqs.(16) and (17),we have:

Eq.(18) can be written in matrix form as [18]:

where

and

Multiplying Eq.(21) byΓTyields [18]:

Eq.(22) can be solved using the least-squares solution to produce Eq.(23):

For an eigenvector y corresponding to the smallest eigenvalue ofΓTΓin Eq.(23),the estimated Fourier transform of the original image can be realized in the form [17]:

Finally,the inverse Fourier transform can be used to estimate the GCD.If we use two blurred images of the same biometric and estimate their 2D GCD,we can get the original biometric template.On the other hand,if we make a slight change induced by the user prior to or after blurring,we severely distort the 2D GCD result.The result of the GCD in this case can be used as a cancelable template.The minor changes can be induced in each biometric template in a user-specific manner.

3 Proposed GCD-Based Cancelable Biometric Algorithm

Fig.3 presents the outlines of the proposed algorithm.As seen in the figure,the original biometric images are firstly compressed using the Discrete Cosine Transform (DCT) compression algorithm.After that,they are merged together to form a unified biometric template.This template is blurred with an operatorh1(n1,n2).Simultaneously,another blurred version of the biometric template is generated with another operatorh2(n1,n2).

We have:

Applyingz-transform on (25) and (26),we get:

where

and

IfH1(z1,z2)andH2(z1,z2)are co-prime,then

and

As shown in Fig.3,if we induce some minimal change in the compressed template prior to blurring withh2(n1,n2),Eq.(31) does not hold.This leads to a distorted version of the fused templates that can be used as a cancelable template.

Figure 3:The proposed unified mCBS framework

4 Results and Discussion

In this section,the assessment of the suggested algorithm is introduced.Firstly,the security analysis of the suggested GCD-based algorithm as an encryption-like algorithm is presented in terms of visual analysis,correlation analysis,differential attack analysis,and entropy analysis [19]as provided in Tab.1.It is well-known that the algorithm must break the correlation amongst the adjacent pixels.It is observed from the obtained outcomes that the suggested GCD-based algorithm succeeds in demolishing the very high correlation of pixels in the original biometric templates.Moreover,Tab.1 demonstrates correlation,Unified Average Change Intensity (UACI),and Number of Changing Pixel Rate (NPCR) values [20]between two ciphered biometric templates.The outcomes reveal that the suggested GCD-based algorithm is robust and vulnerable to control parameters and secret keys.So,all results confirm that the suggested GCD-based algorithm can be executed,cost-effectively,for constructing an efficient and secure cancelable biometric recognition system.As a result,this encouraged us to develop it in our suggested work.

Table 1:Security analysis for evaluating the suggested GCD-based algorithm

Figure 4:Dataset 1 consisting of nine facial images [21]

Figure 5:Cancelable facial images for those in Fig.4 with GCD algorithm

Furthermore,in this section,several experiments are introduced to verify the validity of the proposed uCBS and mCBS that depend on 2D GCD.They have been implemented using a workstation equipped with MATLAB Intel ? Core ?i7-4210U on a CPU with a 1.7 GHz processor.Four datasets have been used in the uCBS experiments,namely ORL [21],FVC2000 DB1 [22],CASIA-IrisV3-Interval [23],and CASIA Palm print [24]for face,fingerprint,iris,and palm print images,respectively.

For the uCBS,the experiments are based on generating two blurred versions of each template and inducing a minor change in one of them prior to blurring.Hence,the 2D-GCD is implemented to generate the cancelable template of that biometric.The database of cancelable templates is composed,and hence the distance between new templates and those in the database is estimated based on the correlation score.Both EER and AROC values are estimated for the verification process.On the other hand,the proposed mCBS depends on estimating the DCTs of four biometric templates and generating a combined version based on the first quadrant of each DCT.This combined version is used as an initial template that is blurred twice.A minor change in one of these versions and the application of the 2D-GCD lead to the cancelable template.

Figure 6:Histograms of facial images (a) original images (b) cancelable templates

Figure 7:Correlation scores for original facial images (a) genuine (b) imposter

The Receiver Operating Characteristic (ROC) curve,which represents the relationship between the true-positive correlation and false-positive correlation [25,26],is used to assess the performance of the suggested CBS.The scores of all patterns are distributed around a mean score,which is higher for authorized patterns compared to unauthorized ones.

Figure 8:Authentication curves for facial biometrics (a) PFD curves (b) ROC curve

Figure 10:Cancelable fingerprint images for those in Fig.9 with GCD algorithm

Figure 11:Histograms of fingerprint images (a) original images (b) cancelable templates

Figure 12:Correlation scores for original fingerprint images (a) genuine (b) imposter

Figure 13:Authentication curves for cancelable fingerprint recognition (a) PFD curves (b) ROC curve

The multi-modal biometrics used to validate the proposed CBS consist of facial,fingerprint,iris,and palm print images as presented in Fig.4 (Faces),Fig.9 (Fingerprints),Fig.14 (Iris),and Fig.19 (Palm prints).Figs.5,10,15,and 20 present the unimodal cancelable templates with 2D GCD.The histograms of the pristine unimodal biometrics are presented in Figs.6,11,16,and 21 for facial,fingerprint,iris,and palm print biometrics,respectively.

Figure 14:Dataset 3 consisting of nine biometric iris images [23]

Figs.7,12,17,and 22 present the correlation scores for all nine unimodal biometric images used in the uCBS experiments.The PTD,PFD,and ROC curves for these biometrics are presented in Figs.8,13,18,and 23.These curves display the threshold values used to distinguish authorized users from unauthorized ones.Fig.24 presents the composite multi-biometric templates.Samples of the GCD cancelable multi-biometric templates and their respective histograms are presented in Fig.25.Correlation scores for both authorized and unauthorized patterns are introduced in Fig.26.Authentication curves for the proposed mCBS are presented in Fig.27.

Finally,the average A ROC,mean correlation scores,False Acceptance Rate (FAR),False Rejection Rate (FRR),and ERR for the GCD-based mCBS are presented in Tab.2.

Figure 15:Cancelable iris images for those in Fig.14 with GCD algorithm

Figure 16:Histograms of iris images (a) original images (b) cancelable templates

Figure 17:Correlation scores for original iris images (a) genuine (b) imposter

Figure 18:Authentication curves for cancelable iris recognition (a) PFD curves (b) ROC curve

Figure 19:Dataset 4 consisting of nine palm print images [24]

· Comparison with Other Related Works

To validate the suggested CBS,more test investigations have been carried out for comparison of the suggested CBS with the latest algorithms [25-32].We compared the average FAR,EER,AROC,and FRR of the suggested CBS with those of the CBS in [25-32]as presented in Tab.3.From the introduced comparative study in Tab.3,we ensure that the FAR,EER,AROC,and FRR of the suggested CBS are better than those of the other traditional CBS.

Figure 20:Cancelable palm print images for those in Fig.19 with GCD algorithm

Figure 21:Histograms of palm print images (a) original images (b) cancelable templates

Figure 22:Correlation scores for original palm print images (a) genuine (b) imposter

Figure 23:Authentication curves for cancelable palm print recognition (a) PFD curves (b) ROC curve

Figure 24:Composite DCT outputs of multi-biometric inputs and their histograms

Figure 25:Cancelable templates for the proposed mCBS and their histograms

Figure 26:Correlation scores for the proposed mCBS (a) genuine (b) imposter

Figure 27:Authentication curves for the proposed mCBS (a) PFD curves (b) ROC curve

Table 2:Results of the proposed uCBS and mCBS

Table 3:Average metric values for the proposed and traditional CBS [25-32]

5 Conclusions and Future Work

This paper presented a new approach to build efficient CBS using single-and multi-biometric inputs for cloud and IoT biometric applications.Pre-determined distortions are induced in the biometric images for single-and multi-biometric inputs with the GCD algorithm.As a selfdependent approach,the need for auxiliary data or images is eliminated.The GCD with some minimal changes can be used efficiently in the generation of cancelable biometric templates.We validated the proposed uCBS and mCBS on inputs consisting of facial,fingerprint,iris,and palm print images.AROC values above 99% were recorded for all the examined biometrics.This work can be easily implemented for cloud,IoT,and wireless access applications.In addition,it can be enhanced with the utilization of encryption algorithms with the GCD algorithm.In the future,we can incorporate deep learning algorithms for compressing and encrypting the biometric images for enhancing the cancelable biometric system performance.

Acknowledgement:The authors would like to thank the support of the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University.

Funding Statement:This research was funded by the Deanship of Scientific Research at Princess Nourah Bint Abdulrahman University through the Fast-track Research Funding Program to support publication in the top journal (Grant No.42-FTTJ-13).

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 亚洲乱码在线视频| 久久精品国产亚洲AV忘忧草18| 国产黄色片在线看| 国产成人成人一区二区| 亚洲天堂久久新| 亚洲天堂首页| 97se综合| 97狠狠操| 第一页亚洲| 8090午夜无码专区| 一本色道久久88| 国产无码精品在线播放| 99re热精品视频国产免费| 伊人天堂网| 国产系列在线| 亚洲无码不卡网| 在线国产毛片| 国产高清在线观看91精品| 丁香六月综合网| 午夜一级做a爰片久久毛片| 又大又硬又爽免费视频| 91在线国内在线播放老师| 青青青视频91在线 | 亚洲男人天堂2020| 成年片色大黄全免费网站久久| a级毛片视频免费观看| 亚洲国产成人自拍| 日韩av高清无码一区二区三区| 青青网在线国产| 伊人激情综合网| 国产免费怡红院视频| 再看日本中文字幕在线观看| 中文字幕在线看视频一区二区三区| 国产麻豆精品久久一二三| 91在线播放国产| 中文字幕va| 免费a在线观看播放| 国产真实二区一区在线亚洲| 欧美成人亚洲综合精品欧美激情| 另类综合视频| 9啪在线视频| 亚洲成A人V欧美综合天堂| 99视频免费观看| 欧美日韩一区二区在线免费观看 | 成人午夜网址| 欧美 亚洲 日韩 国产| AV在线天堂进入| a天堂视频| 欧美精品综合视频一区二区| 国产精品yjizz视频网一二区| 久久综合五月婷婷| 中文字幕在线播放不卡| 久久6免费视频| 这里只有精品在线| 亚洲成人在线免费观看| 国产精品七七在线播放| 亚洲中文字幕在线精品一区| 国产在线视频导航| 狠狠色噜噜狠狠狠狠奇米777 | 日韩无码真实干出血视频| 午夜视频在线观看免费网站 | 成年人福利视频| 97国产精品视频自在拍| 精品偷拍一区二区| 亚洲精品视频免费观看| 中文字幕波多野不卡一区| 99热这里只有免费国产精品 | 国产尤物视频在线| 麻豆AV网站免费进入| 国产精品蜜芽在线观看| 日本欧美午夜| 免费看黄片一区二区三区| 婷婷成人综合| 亚洲男人的天堂网| 五月天综合婷婷| 制服无码网站| 国产超薄肉色丝袜网站| 亚洲成综合人影院在院播放| 亚洲不卡无码av中文字幕| 2021国产精品自产拍在线| 亚洲品质国产精品无码| 99在线小视频|