Next Article in Journal
A Genetic Programming-Based Low-Level Instructions Robot for Realtimebattle
Previous Article in Journal
Why the Mittag-Leffler Function Can Be Considered the Queen Function of the Fractional Calculus?
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Discrete Transforms and Matrix Rotation Based Cancelable Face and Fingerprint Recognition for Biometric Security Applications

1
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh 84428, Saudi Arabia
2
Department of Industrial Electronics and Control Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
3
Electrical Engineering Department, Faculty of Engineering-Shoubra, Benha University, Cairo 11629, Egypt
4
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
5
Department of Electronics and Communications, Faculty of Engineering, Zagazig University, Zagazig 44519, Egypt
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(12), 1361; https://doi.org/10.3390/e22121361
Submission received: 8 August 2020 / Revised: 21 September 2020 / Accepted: 2 October 2020 / Published: 30 November 2020

Abstract

:
The security of information is necessary for the success of any system. So, there is a need to have a robust mechanism to ensure the verification of any person before allowing him to access the stored data. So, for purposes of increasing the security level and privacy of users against attacks, cancelable biometrics can be utilized. The principal objective of cancelable biometrics is to generate new distorted biometric templates to be stored in biometric databases instead of the original ones. This paper presents effective methods based on different discrete transforms, such as Discrete Fourier Transform (DFT), Fractional Fourier Transform (FrFT), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT), in addition to matrix rotation to generate cancelable biometric templates, in order to meet revocability and prevent the restoration of the original templates from the generated cancelable ones. Rotated versions of the images are generated in either spatial or transform domains and added together to eliminate the ability to recover the original biometric templates. The cancelability performance is evaluated and tested through extensive simulation results for all proposed methods on a different face and fingerprint datasets. Low Equal Error Rate (EER) values with high AROC values reflect the efficiency of the proposed methods, especially those dependent on DCT and DFrFT. Moreover, a comparative study is performed to evaluate the proposed method with all transformations to select the best one from the security perspective. Furthermore, a comparative analysis is carried out to test the performance of the proposed schemes with the existing schemes. The obtained outcomes reveal the efficiency of the proposed cancelable biometric schemes by introducing an average AROC of 0.998, EER of 0.0023, FAR of 0.008, and FRR of 0.003.

1. Introduction

According to the evolving methods of hacking on biometric databases, there is a great need to develop non-traditional techniques to yield secure biometrics from the original ones that can be used for identifying the individuals with the ability to replace them with other alternatives in hacking scenarios [1,2,3,4,5]. To achieve a high level of security of biometric data, it should not be stored in its original raw format. Cancelable biometrics is an effective solution that guarantees template protection by generating renewable revocable templates to be stored in the database [6,7,8,9,10].
Cancelable biometric systems (CBSs) should provide high privacy and high security by utilizing different transformation methods in both enrolment and authentication stages [10,11,12,13,14,15,16]. Thus, the main objective of cancelable biometrics is to produce new deformed versions of original biometric templates to be stored in databases and used in the authentication stage. Several researchers have worked on generating robust cancelable biometrics schemes. In this section, we summarize these previously introduced CBSs. Choudhury et al. [17] proposed a cancelable iris recognition system based on the concept of steganography to generate transformed biometric templates. They exploited a combination of Huffman encoding and the DCT to obtain non-invertible transformation functions. Their system has its limitation of the need for a large number of images and more processing power. They achieved an Equal Error Rate (EER) of 1.2% and an acceptable area under the Receiver Operating Characteristic (ROC) curve. Wang et al. [18] introduced a combination of Discrete Fourier Transform (DFT) and Partial Hadamard Transform (PHT) to generate cancelable fingerprint templates. Their approach depends on representing the biometric data in binary format for simplicity of feature representation. They applied the PHT on the DFT of the binary biometric templates to get complex vectors that provide a high security level of the original binary vectors to prevent their restoration. They tested their proposed system on three datasets, and achieved EERs of 1% for FVC2002DB1, 2% for FVC2002DB2, and 5.2% for FVC2002DB3. Soliman et al. [19] introduced two different cancelable approaches for iris and face biometric images. These approaches adopted feature vectors for the biometrics to be encrypted by the Double Random Phase Encoding (DRPE) algorithm. They exploited the Scale-Invariant Feature Transform (SIFT) and the Gabor filter to generate the feature matrix. Their approach achieved an EER of 0.17% and an AROC of 99.3%.
Kaur and Khanna [20] proposed a multi-level transform biometric template protection technique based on generating new distorted versions of the original biometrics using random projection followed by applying Log-Gabor transform to get both Log-Gabor magnitude and phase to be XORed with a Random Grid (RG) to give an encrypted template for each scale and orientation. The next step is to subject the encrypted template pattern to a non-linear median filter. The output of this step is then normalized, reshaped, and re-sampled to generate the final protected transformed biometric. Umer et al. [21] presented a cancelable iris recognition system that begins with localization and normalization of the iris object followed by applying the SIFT to extract dense SIFT descriptors. K-means clustering algorithm is applied on the collection of descriptors to form a dictionary pattern upon which sparse representation coding and spatial pyramid mapping are performed. The final step is to apply a modified bio-hashing technique to generate cancelable features to be stored in the database. The same sequence is applied in the authentication stage to test new templates against stored encrypted iris features to perform the iris recognition process. This system has been tested using six benchmark iris databases.
Yang et al. [22] presented a multi-biometric security system for fingerprint and finger vein biometrics based on combining different features extracted from these two biometrics. They used a minutiae-based technique to extract features of fingerprints and an image-based technique to extract finger vein features. The output feature vector produced for each biometric is subjected to a binary data conversion process to give binary feature vectors for both fingerprints and finger veins. They suggested three different fusion methods based on Enhanced Partial Discrete Fourier Transform (EP-DFT) to give a final feature vector to be stored in the database in the enrolment phase. A similar technique is implemented in the verification phase to give the query transformation feature vector based on EP-DFT. A similarity score is estimated to test the matching between the stored features and query actual features. This method achieved a high security level with a minimum EER of 0.12%. The second fusion method depends on the transformation of the two biometric features by EP-DFT, followed by the concatenation of the two output feature vectors, to give a single binary vector.
A random distance technique was proposed by Kaur and Khanna to generate cancelable biometric templates [23]. They applied this technique on different modalities. It meets important requirements of revocability and non-invertability. Cancelable fingerprint patterns are generated based on fusing structures at the feature level. Local and distant structures are computed from minutiae points of fingerprints to generate fused bit strings. In the next step, DFT is applied to get the cancelable fingerprint templates. This technique achieved an EER of 1.6% on the FVC 2002 DB2 database and an EER of 12.7% on the FVC 2004 DB2 database.
Choudhary and Naik [24] presented an overview of multiple biometrics used for authentication. They focused on challenges in multimodality biometrics by using fusion with different levels and different techniques. They discussed the factors to be considered to build a robust authentication system based on multimodality biometrics, such as the selection of the biometrics to be combined, the level of fusion, the effect of using multimodality biometrics on complexity and processing time, and the required storage space needed for the secure templates. They discussed also the concept of the integration of multimodality biometrics in order to generate a secure template and found that there is no single method that can be utilized with all biometrics.
Patil et al. [25] proposed a secret sharing and Radio Frequency Identification (RFID) scheme for biometric authentication. They succeeded in generating secure templates and storing them in the database. Their proposed approach can be extended to include multimodality biometrics. They achieved low computational complexity, high reliability, and high security. Namrata et al. [26] presented a biometric authentication system to verify the identity of the user. Their proposed model uses the orientation values from a fingerprint and the minutiae from another fingerprint to generate the combined template in the enrollment phase. For the authentication phase, the stored encrypted template will be used to decrypt the OTP to complete the electronic financial transaction. They worked with the most common evaluation metrics for authentication processes including False Match Rate (FMR), False Acceptance Rate (FAR), False Non-Match Rate (FNMR), False Rejection Rate (FRR), Failure to Acquire Rate (FTA), and Equal Error Rate (EER). Abou elazm et al. [27] proposed a cancelable face and fingerprint recognition scheme based on the 3D jigsaw transform and optical encryption. Their scheme exploits the Fractional Fourier Transform (FRFT) to generate encrypted biometric templates. They verified the efficiency of their proposed scheme against other traditional cryptosystems by computing the EER, the FAR, the FRR, and the AROC. They achieved an AROC value of 0.9997 with an EER of 9.3997 × 10−15.
Abdelatif et al. presented an approach for cancelable face recognition that depends on Convolutional Neural Networks (CNNs) [28,29]. Its idea begins by isolating the face, eyes, nose, and mouth regions. A CNN is designed for each region to extract deep features. The deep feature vectors are fused together for size preservation, and hence, a bio-convolving process is implemented to encrypt the extracted feature vector through a convolution process with a random mask. This approach presents good performance in the verification process. Unfortunately, it can be hacked if the convolution mask is known and a strong deconvolution algorithm is used. Abdelatif et al. developed their approach by incorporating hand-crafted features with their deep features [30]. They extract hand-crafted features from both face and iris images and apply a dimensionality reduction stage based on PCA to create features suitable in length to the deep features. Feature fusion is adopted in the last stage to generate a common feature vector that is encrypted through bio-convolution. Although the hand-crafted features add mode information to the recognition process, the bio-convoluting is still the weak point of this approach.
Soliman et al. investigated the utilization of different chaotic maps for encrypting iris image feature vectors [31]. Both logistic and modified logistic maps have been considered for this issue. A correlation-based approach has been used in the verification process of encrypted iris vectors. This approach achieved a good performance as a cancelable biometric recognition system, but its drawback is the weak encryption algorithm based on chaotic maps only.
Hashad et al. presented a cryptosystem that can be used for cancelable fingerprint recognition [32]. Its idea is based on a pre-processing step. This step is merely a fusion process between fingerprint images with few details and auxiliary images that are rich in details. The fusion masks the main discriminative patters of the fingerprints. After that, encryption is performed with chaotic maps to generate the cancelable masks. This approach succeeds in securing the fingerprints, but the encryption is not strong enough. Away from the encryption process to generate cancelable masks, Soliman et al. presented an approach for generating cancelable masks that depends on intended distortion of the biometric traits [33]. This approach depends on the utilization of the comb filter as a multi-band filter with several nulls to distort the iris feature vector. The comb filter is non-invertible as it has several nulls in its magnitude spectrum. This approach succeeded in giving high performance of the cancelable iris recognition system.
Algarani et al. worked on the topic of cancelable face recognition by adopting pre-processing of the biometric traits first [34]. Two trends have been presented in this paper. The first one depends on fuzzy logic to modify the image dynamic range and the second one depends on homomorphic decomposition of the images to isolate the more informative reflectivity components. After that, encryption with random projection is performed. The random projection encryption is applied on signatures extracted from the biometric traits. These signatures are not invertible. Hence, the merit of encryption here is to enhance the security, while keeping irreversibility.
Cherrat et al. [35] presented a hybrid system for multi-biometrics based on CNNs for feature extraction. They combine fingerprint, finger vein, and face biometric images after pre-processing and feature extraction, separately. For the fingerprint recognition, three processes are applied; pre-processing to extract the foreground and background regions, feature extraction based on CNNs, and classification based on a SoftMax layer. For the finger vein recognition, enhancement is performed based on image fusion using CNNs for feature extraction, and Random forest is conducted for the classification. Finally, the outputs of the three systems are fused according to a pre-determined score to improve the identification of biometrics. Hui Xua [36] presented a multi-modal biometric system based on a CNN for combining face, iris, and palm print. They studied the effect of changing the number of layers on the recognition process. The simulation results proved that fusion based on two layers improves the recognition accuracy.
All the above-mentioned approaches have their own characteristics and limitations. This work is concerned with designing transformation methods to achieve sufficient distortion to be applied to all original biometric templates stored in the database in order to make them more complex and difficult to be inverted or identified. Therefore, the principal goal of this paper is to introduce an efficient method to generate cancelable biometric templates based on discrete transforms and matrix rotation. The rationale behind the utilization of discrete transforms, such as DCT, DFT, and DFrFT, is to perform some sort of data diffusion. Unfortunately, these transforms are invertible, and hence they are inappropriate for cancelable biometric applications. So, we suggest the utilization of matrix rotation in a transform domain and the addition of rotated versions. If an addition is carried out on the rotated versions, the reconstruction of the original transform domain matrix becomes impossible. Hence, if the transform inversion is implemented, the original biometric template is not recoverable. Cancelability is guaranteed through the variability of the rotation angles prior to the addition process. The DWT has another basis of operation, which is the sub-band decomposition. It is also investigated in this paper as a discrete transform to be implemented prior to the rotation process.
This article is structured as follows: Section 2 presents the basics of the related concepts used in this paper. The proposed cancelable biometric systems (CBSs) based on matrix rotation in discrete transform domains are introduced in Section 3. Section 4 provides the simulation outcomes and the comparison analyses to evaluate the performance of the suggested CBSs. Section 5 provides concluding remarks and some directions for future research.

2. Preliminaries

This section presents the main basic concepts of the matrix transformation methods used to generate the deformed versions of the original biometric templates.

2.1. Basics of the DFT

Fourier Transform is considered as an important conversion technique due to its wide range of applications. It has been introduced by Baptiste Fourier (1768–1830). Images in Fourier transform are decomposed into sine and cosine components. The two-dimensional Discrete Fourier Transform (DFT) is given by the following relation [37]:
F ( k , l ) = i = 0 N 1 j = 0 M 1 f ( i , j ) e 2 i π ( k i N + l j M )
where f(i,j) is the value of pixel intensity at (i,j) in the image of size N × M in the spatial domain. Generally, DFT uses complex mathematical relations that consume more computational time in processing.

2.2. Basics of the DFrFT

The DFrFT can be considered as the generalized configuration of the classical Fourier transform. It provides a more flexible frequency distribution than the conventional DFT [38,39]. Further security can be obtained for the system by adding another parameter called “α”. It is known that the Fourier transform is performed through the rotation of any signal by an angle of π/2 in the time-frequency plane. On the other hand, the DFrFT eliminates that limit and permits rotation with any angle ‘α’, which is not required to be a multiple of π/2. The DFrFT is similar to the ordinary Fourier transform when α = 1. The DFrFT was expressed in [38] for a signal f (t) for order ‘α’ as follows:
F p ( u , t ) =   f ( t ) K p ( u , t ) d t
where Kp is the kernel defined as follows:
K p ( u , t ) = 1 j c o t α 2 π exp j t 2 + u 2 2 cot α j u t c s e α α n π δ ( t u ) α = 2 n π δ ( t + u ) α = ( 2 n ± π )

2.3. Basics of the DCT

The DCT divides the image into different bands represented as a low-frequency band, a mid-frequency band, and a high-frequency band. The 2D-DCT can be represented as follows [40]:
F ( k , l ) = a ( k ) · a ( l ) i = 0 N 1 j = 0 M 1 f ( i , j ) · c o s [ ( 2 i + 1 ) k π 2 N ] c o s [ ( 2 j + 1 ) l π 2 M ]
where a ( k ) = { 1 N k = 0 2 N k = 1 ,   2 ,   . N 1 and a ( l ) = { 1 M l = 0 2 M l = 1 ,   2 ,   . N 1 .

2.4. Basics of the DWT

This transform maps the biometric images into the wavelet domain based on separating and decomposing the intensity values in images into a low-frequency band and a high-frequency band. The DWT is considered as a highly effective tool to be used in a wide range of applications in image processing. It decomposes the image into four blocks, normally labeled as LL, HL, LH, and HH [41,42,43].
The 2D-DWT can be represented with a 2D-scaling function φ ( x , y ) and three 2D wavelet functions: ψ H ( x , y ) ,   ψ V ( x , y ) ,   and   ψ D ( x , y ) ,   where each ψ ( . ) function measures variations along with horizontal, vertical, and diagonal directions. The DWT can be represented as:
W ( j 0 , m , n ) = 1 N M x = 0 N 1 y = 0 M 1 f ( x , y ) j 0 , m , n ( x , y )
W ψ i ( j , m , n ) = 1 N M x = 0 N 1 y = 0 M 1 f ( x , y ) Ψ j , m , n i ( x , y )
The scaling and translated functions are represented as follows:
j , m , n ( x , y ) = 2 j / 2 ( 2 j x m ,   2 j y n )
ψ j , m , n i ( x , y ) = 2 j / 2 ψ i ( 2 j x m ,   2 j y n )
where m and n are the translation quantities i ( H , V , D ) .

2.5. Basics of Matrix Rotation

The basic concept of rotating a two-dimensional image by an angle α as shown in Figure 1 is clarified in the following discussion [44,45]. A pixel at point P with spatial coordinates ( x , y )   in the original image can be rotated to new spatial coordinates ( x , y ) , hence,
x , = x · c o s α y · s i n α
y , = x · s i n α + y · c o s α
Based on the previous relations, the original pixels of an image can be rotated by different angles in a counter-clockwise direction or in a clockwise direction according to the sign of the rotation angle   α .

3. Proposed CBS Systems Based on Matrix Rotation in Discrete Transform Domains

In this section, we present an enhanced level of security for human biometric recognition. Our study depends on the generation of new revocable templates depending on adopting a bank of matrix rotations with different selected rotation angles combined with a matrix transformation method to meet cancelable biometrics requirements and achieve a high level of security and user privacy.

3.1. Proposed Bank of Rotations with DWT

The first proposed method is depicted in Figure 2 and in Algorithm 1, and it depends on the Wavelet-Based Bank of Rotations (WBBOR). It offers three degrees of freedom to ensure high efficiency. The first degree depends on pixel rotation from different angles. The second degree is represented in detailed rotated coefficients extracted from DWT and rearranged to form the second stage of biometric distortion. The final degree is represented in the bio-convolution based on a random kernel to produce high-level biometric distortion.
Algorithm 1 The pseudo code of the Wavelet-Based Bank of Rotations (WBBOR) method
  1:
Input: Biometric image I ( i , j ) .
  2:
Output: Distorted image I S ( i , j ) .
  3:
Step 1. Pre-processing adjustment is performed on each biometric image.
  4:
Step 2. Image rotation is applied with different rotation angles, θ n , where the total rotated image is computed by:
  5:
I r t o t a l ( i , j ) = ( I ( i , j ) , θ n )
  6:
Step 3. (a) DWT is applied on the rotated image by Equation (3).
  7:
(b) Components are rearranged to form:
  8:
I H ( i , j ) = [ L L   L H ; H L   H H ]
  9:
Step 4. Bio-convolution is applied to generate the final encrypted biometric image by:
  10:
I S = I H   R k e r n a l
The addition of multiple rotated versions of the biometric images guarantees some sort of distortion that is not reversible. The output of this stage is decomposed with wavelet decomposition into sub-bands, which are rearranged in an optional manner. Finally, encryption is performed as a last stage of security to secure the biometric templates. In cases of hacking, it is possible to change the rotation angles or the number of rotations. In addition, it is possible also to change the arrangement after DWT, the encryption algorithm or the key.

3.2. Proposed Bank of Rotations Based on DCT

The templates of cancelable biometrics are generated by the transformation of biometric templates with DCT followed by matrix rotation of the generated coefficients, as illustrated in Figure 3. The DCT transform gives some sort of data diffusion, but it is invertible. Moreover, matrix rotation is applied with different rotation angles. The addition of rotated versions gives more distortion of the data in the DCT domain. The addition of rotated versions is not invertible to obtain a high level of security.
In the proposed Bank of Rotations Based on the DCT (BRBDCT) method, as depicted in Algorithm 2, the DCT is applied on the raw biometric gray-scale image to generate an image in the DCT domain, which can be represented as I_dct [N × N]. Secondly, the DCT image is rotated with different angles ( θ n 1 ,   θ 2 ,   θ 3 ,   a n d   θ n 4 ). The four outputs are added together to generate a new image in the DCT domain. Finally, a secure template is generated using the Inverse DCT (IDCT). This template is stored in the database and the same process is performed in the authentication.
Algorithm 2 The pseudo code of the Bank of Rotations Based on the DCT (BRBDCT) method
  1:
Input: Biometric image I ( i , j ) .
  2:
Output: Distorted image I S ( i , j ) .
  3:
Step 1. A pre-processing adjustment is performed on each biometric image.
  4:
Step 2. The DCT is applied to produce the DCT coefficients using Equation (2).
  5:
Step 3. Image rotation is performed with different angles of rotation θ n for the DCT coefficients, while the total distorted image with rotation is computed by Equation (9).
  6:
Step 4. The deformed biometric template is obtained by employing the IDCT.

3.3. Proposed Bank of Rotations Based on FFT or FrFT

In this subsection, a proposed method based on the rotation of biometrics in the frequency domain is introduced to enhance the security of biometric templates as shown in Figure 4 and Algorithm 3. The Fourier transform allows us to represent an image by its frequency spectrum. Rotation and addition are performed on complex values leading to distorted complex patterns of biometrics. The added complex patterns are very difficult to recover.
To increase the security, the summation of the rotations is bio-convolved with a random kernel with the same size as the original template. Finally, the inverse FFT is applied to the output of the bio-convolution. This transformation can produce irreversible deformed patterns. More security is added to the system using the DFrFT to exploit its characteristics based on its inherent rotation angle.
Algorithm 3 The pseudo code of the Bank of Rotations Based on FFT (BRBFFT) method
  1:
Input: Biometric image I ( i , j ) .
  2:
Output: Distorted image I S ( i , j ) .
  3:
Step 1. A pre-processing adjustment is performed on each biometric image.
  4:
Step 2. Apply the DFT/DFrFT transformation to produce the frequency representation of the template using Equations (1) or (2).
  5:
Step 3. Image rotation is applied with different angles θ n for the DCT coefficients, while the total rotated image is computed by Equation (11).
  6:
Step 4. Bio-convolution is applied.
  7:
Step 5. Construction of the deformed biometric template is implemented by employing the inverse DFT/DFrFT.

4. Performance Evaluation and Test Results

Any biometric system is composed of two stages: the enrollment stage and the verification stage. The ultimate aim of cancelable biometric systems is that in the enrollment stage, the original biometric templates are converted into different forms by using non-invertible transformation functions. In the verification stage, query data are subjected to the same non-invertible transformations for matching.
In the suggested cancelable biometric technique, we employ four different transforms—DWT, DCT, DFT, and DFrFT—that have different characteristics to investigate the performance in spatial and transform domains. The suggested cancelable methods are composed of two different parts: the transformation which induces some confusion in the data and the bank of rotations to induce more distortion. Therefore, retrieving the raw template biometric data is infeasible and computationally difficult.
Experiments are carried out on the proposed methods to investigate and evaluate their performance using five different standard datasets: three different face datasets and two different fingerprint datasets. The tested facial images used in our simulations and evaluations are obtained from the Research Laboratory for Olivetti and Oracle (ORL) database [46], the NiST Face Recognition Technology (FERET) dataset [47], and the Mass Labelled Faces in the Wild (LFW) dataset of the University of Massachusetts’ Computer Vision laboratory [48]. The fingerprint images used in our simulations and evaluations are obtained from [49,50]. In order to ensure the validation of the proposed cancelable methods for both face and fingerprint recognition, we worked on 20 different samples of images from each of the face databases and 20 different samples of images from the fingerprint databases. These face and fingerprint images were chosen randomly. The samples of the face images and their histograms are illustrated in Figure 5, Figure 6 and Figure 7. The samples for the fingerprint images are illustrated in Figure 8 and Figure 9.
The obtained simulation results are evaluated depending on False Acceptance Rate (FAR), False Rejection Rate (FRR), and Equal Error Rate (EER). In addition, histograms of encrypted images, correlation scores for genuine and imposter patterns of biometric images, Probability Distribution Functions (PDFs) for genuine and imposter distributions, and ROC curves are used for evaluation.
The FAR of the system can be defined as the times an impostor accesses the system as a genuine user, which reflects the robustness of the system against a zero-effort attack. On the other side, the FRR denotes the times the system rejects genuine user access. The point at which the value of the FAR and FRR are equal is called “EER”. When this value is smaller, the performance of the biometric system is better.
In order to ensure the effectiveness of the matrix rotations, we will apply the rotation in the following cases:
  • Rotation in the spatial domain.
  • Rotation followed by DWT as depicted in Section 3.1.
  • Rotation in the frequency domain using DCT as explained in Section 3.2.
  • Rotation in the frequency domain using FFT as explained in Section 3.3.
  • Rotation in the FrFT domain in two different scenarios to select the best performance.
The output encrypted biometric images for faces and fingerprints are shown in Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14 for the matrix rotations in spatial and different discrete domains. Figure 15, Figure 16, Figure 17, Figure 18 and Figure 19 illustrate the histograms of the face and fingerprint encrypted images. It is clear that original image histogram patterns are masked to a large extent.
The efficiency of the proposed cancelable biometric methods is evaluated using the correlation coefficient and histogram between the protected biometrics stored in the database and their new biometric versions. The correlation coefficient can be measured as follows:
R x y = 1 N i = 1 N ( x i x ¯ ) ( y i y ¯ ) σ x σ y
where N is the total number of pixels, x and y are the protected biometrics template in the database and the new issue protected template.
A comparison between the correlation scores for authorized patterns of the face and fingerprint patterns for the proposed methods is illustrated in Figure 20, Figure 21, Figure 22, Figure 23 and Figure 24, respectively. The correlation score is estimated between the tested genuine biometric and that stored in the database for all methods. Furthermore, a comparison of the correlation coefficient values estimated for unauthorized records with all records stored in the database is illustrated in Figure 25, Figure 26, Figure 27, Figure 28 and Figure 29 for face and fingerprint patterns, respectively. From this comparison, it is clear that the DCT-based method achieves the highest degree of security.
Figure 30, Figure 31, Figure 32, Figure 33 and Figure 34 illustrate the probability distribution functions (PDFs) of the correlation coefficients in the genuine and imposter tests for the face and fingerprint biometrics. It can be noted that the two PDFs for genuine and imposter are distinctive except for the case of spatial-domain processing. The receiver operating characteristic (ROC) curves of the proposed methods for face and fingerprint biometrics are depicted in Figure 35, Figure 36, Figure 37, Figure 38 and Figure 39. As shown in the obtained results, the performance of rotation in the frequency domain using either the FFT or DFrFt is better than those of rotation in the DCT or DWT domain for face biometric datasets. Furthermore, the obtained results illustrate that the ROC plots of the DFrFT-based method that gives the best results at [90, 180], which confirms the superiority of the proposed rotation-based method in DFrFT domain and the effect of the angle “α” on the obtained results.
A comparative study between AROC values, mean of authorized correlation sores, mean of unauthorized correlation sores, FAR, FRR, and ERR for all proposed cancelable biometric methods is presented. The results of this comparison are tabulated in Table 1, Table 2, Table 3, Table 4 and Table 5 for the face and fingerprint datasets. The results reveal that the rotation in the DFrFT-based method achieves a high level of security for face and finger biometric templates.
To supplementary substantiate the effectiveness of the suggested cancelable biometric recognition method, test experimentations have been employed for comparing outcomes of the suggested cancellable biometric recognition method with those of the recent previous methods [19,31,34,51,52,53,54,55]. We compared the average EER, FAR, FRR, and AROC results of the suggested method with those of the methods in [19,31,34,51,52,53,54,55] as given in Table 6. Form the offered comparative outcomes in Table 6, we observe that the FRR, FAR, AROC, and EER outcomes of the suggested method are more recommended and appreciated contrasted to those of the other conventional methods.

5. Conclusions and Future Work

This paper dealt with the generation of cancelable biometric templates with sophisticated methods based on discrete transforms and matrix rotations. Two types of biometrics were processed with the proposed methods: faces and fingerprints. The main objective of the suggested methods is to generate cancelable templates with as simple algorithms as possible and avoid high-complexity encryption schemes. The diffusion characteristic of most discrete transforms is exploited to tailor a pattern upon which we can depend for the generation of the cancelable templates. In fact, these transforms are not enough as they are invertible. Hence, rotation is exploited. A single rotation is not a feasible action as it can be inverted easily. The solution suggested is to use multiple rotations, and hence an addition process of rotated versions. This process is irreversible, which is the characteristic that guarantees the security of original biometric templates. In addition, there is a freedom in selecting the number of rotations, and rotation angles to allow generation of multiple templates for different applications and for hacking scenarios. Simple rotations are not time-consuming, and hence the suggested methods have low complexity. Different discrete transforms have been exploited and compared in the proposed methods, including DWT, DCT, FFT, and FrFT transforms. Cancelability is tested and evaluated through extensive simulation results for all proposed methods. Low EER values with high AROC values reflect the efficiency of the proposed methods, especially those dependent on DCT and DFrFT. For future plans, we can test other different discrete transforms in the Quaternion domain by incorporating encryption, watermarking, and steganography techniques for building efficient cancelable biometric recognition systems.

Author Contributions

Conceptualization, N.F.S. and G.E.B.; methodology, A.D.A.; software, F.E.A.E.-S. and S.I.; validation, W.E.-S. and G.E.B.; formal analysis, W.E.-S.; investigation, N.F.S.; resources, A.D.A.; data curation, S.I.; writing—original draft preparation, S.I., N.F.S. and F.-E.A.; writing—review and editing, W.E.-S. and A.D.A.; visualization, W.E.-S. and F.E.A.E.-S.; supervision, A.D.A. and N.F.S.; project administration, F.E.A.E.-S. and G.E.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Deanship of Scientific Research at Princess Nourah bint Abdulrahman University (Grant No. 39/S/249).

Acknowledgments

The authors would like to thank the support of Deanship of Scientific Research at Princess Nourah bint Abdulrahman University.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hassaballah, M.; Aly, S. Face recognition: Challenges, achievements and future directions. IET Comput. Vis. 2015, 9, 614–626. [Google Scholar] [CrossRef]
  2. Learned-Miller, E.; Huang, G.B.; Roychowdhury, A.; Li, H.; Hua, G. Labeled Faces in the Wild: A Survey; Springer Science and Business Media LLC: Berlin/Heidelberg, Germany, 2016; pp. 189–248. [Google Scholar]
  3. Al-Waisy, A.S.; Al-Fahdawi, S.; Qahwaji, R. A Multi-biometric Face Recognition System Based on Multimodal Deep Learning Representations. In Deep Learning in Computer Vision; Informa UK Limited: Colchester, UK, 2020; pp. 89–126. [Google Scholar]
  4. Jain, A.K.; Ross, A.; Prabhakar, S. An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 2004, 14, 4–20. [Google Scholar] [CrossRef] [Green Version]
  5. Kanade, S.G.; Petrovska-Delacrétaz, D.; Dorizzi, B. Enhancing Information Security and Privacy by Combining Biometrics with Cryptography. Synth. Lect. Inf. Secur. Priv. Trust. 2012, 3, 1–140. [Google Scholar] [CrossRef] [Green Version]
  6. Gomez-Barrero, M.; Galbally, J. Reversing the irreversible: A survey on inverse biometrics. Comput. Secur. 2020, 90, 101700. [Google Scholar] [CrossRef]
  7. Rathgeb, C.; Uhl, A. A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011, 2011, 3. [Google Scholar] [CrossRef] [Green Version]
  8. Guo, Y.; Zhang, L.; Hu, Y.; He, X.; Gao, J. Ms-celeb-1m: A dataset and benchmark for large-scale face recognition. In European Conference on Computer Vision; Springer: Cham, Switzerland, 2016; pp. 87–102. [Google Scholar]
  9. Gomez-Barrero, M.; Galbally, J.; Rathgeb, C.; Busch, C. General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans. Inf. Forensics Secur. 2017, 13, 1406–1420. [Google Scholar] [CrossRef]
  10. Rosenberger, C. Evaluation of Biometric Template Protection Schemes based on a Transformation. In Proceedings of the 4th International Conference on Information Systems Security and Privacy, Madeira, Portugal, 22–24 January 2018; pp. 216–224. [Google Scholar]
  11. Yuan, L.; Ran, Q.; Zhao, T. Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional Fourier domain. Opt. Laser Technol. 2017, 88, 111–120. [Google Scholar] [CrossRef]
  12. Al-Afandy, K.; El-Shafai, W.; El-Rabaie, E.-S.M.; El-Samie, F.E.A.; Faragallah, O.S.; El-Mhalaway, A.; Shehata, A.M.; El-Banby, G.M.; El-Halawany, M.M. Robust hybrid watermarking techniques for different color imaging systems. Multimedia Tools Appl. 2018, 77, 25709–25759. [Google Scholar] [CrossRef]
  13. Hassaballah, M.; Awad, A.I. Detection and description of image features: An introduction. In Image Feature Detectors and Descriptors; Springer: Cham, Switzerland, 2016; pp. 1–8. [Google Scholar]
  14. Raj, J.R.F.; Vijayalakshmi, K.; Priya, S.K. Medical image denoising using multi-resolution transforms. Measurement 2019, 145, 769–778. [Google Scholar] [CrossRef]
  15. Xiong, Y.; Quan, C.; Tay, C. Multiple image encryption scheme based on pixel exchange operation and vector decomposition. Opt. Lasers Eng. 2018, 101, 113–121. [Google Scholar] [CrossRef]
  16. Sandhya, M.; Prasad, M.V. Securing fingerprint templates using fused structures. IET Biom. 2017, 6, 173–182. [Google Scholar] [CrossRef]
  17. Choudhury, B.; Then, P.; Raman, V.; Issac, B.; Haldar, M.K. Cancelable iris Biometrics based on data hiding schemes. In Proceedings of the IEEE Student Conference on Research and Development (SCOReD), Kuala Lumpur, Malaysia, 13–14 December 2016; pp. 1–6. [Google Scholar]
  18. Wang, S.; Deng, G.; Hu, J. A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations. Pattern Recognit. 2017, 61, 447–458. [Google Scholar] [CrossRef]
  19. Soliman, R.F.; El Banby, G.M.; Algarni, A.D.; Elsheikh, M.; Soliman, N.F.; Amin, M.; El-Samie, F.E.A. Double random phase encoding for cancelable face and iris recognition. Appl. Opt. 2018, 57, 10305–10316. [Google Scholar] [CrossRef]
  20. Kaur, H.; Khanna, P. Cancelable features using log-Gabor filters for biometric authentication. Multimedia Tools Appl. 2016, 76, 4673–4694. [Google Scholar] [CrossRef]
  21. Umer, S.; Dhara, B.C.; Chanda, B. A novel cancelable iris recognition system based on feature learning techniques. Inf. Sci. 2017, 406, 102–118. [Google Scholar] [CrossRef]
  22. Yang, W.; Wang, S.; Hu, J.; Zheng, G.; Valli, C. A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recognit. 2018, 78, 242–251. [Google Scholar] [CrossRef]
  23. Kaur, H.; Khanna, P. Random Distance Method for Generating Unimodal and Multimodal Cancelable Biometric Features. IEEE Trans. Inf. Forensics Secur. 2018, 14, 709–719. [Google Scholar] [CrossRef]
  24. Choudhary, S.K.; Naik, A.K. Multimodal Biometric Authentication with Secured Templates—A Review. In Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 23–25 April 2019; pp. 1062–1069. [Google Scholar]
  25. Patil, S.; Dhumal, P.; Lokhande, S.; Kamble, T. Design and implementation of secure biometric based authentication system using rfid and secret sharing. In Proceedings of the 2017 2nd International Conference for Convergence in Technology (I2CT), Mumbai, India, 7–9 April 2017; pp. 480–482. [Google Scholar]
  26. Bhartiya, N.; Jangid, N.; Jannu, S. Biometric Authentication Systems: Security Concerns and Solutions. In Proceedings of the 2018 3rd International Conference for Convergence in Technology (I2CT), Pune, India, 6–8 April 2018. [Google Scholar]
  27. Elazm, L.A.A.; Ibrahim, S.A.; Egila, M.G.; Shawky, H.; Elsaid, M.K.H.; El-Shafai, W.; El-Samie, F.E.A. Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimedia Tools Appl. 2020, 79, 14053–14078. [Google Scholar] [CrossRef]
  28. Abdellatef, E.; Ismail, N.A.; Elrahman, S.E.S.E.A.; Ismail, K.N.; Rihan, M.; El-Samie, F.E.A. Cancelable fusion-based face recognition. Multimedia Tools Appl. 2019, 78, 31557–31580. [Google Scholar] [CrossRef]
  29. Abdellatef, E.; Ismail, N.A.; Elrahman, S.E.S.E.A.; Ismail, K.N.; Rihan, M.; El-Samie, F.E.A. Cancelable multi-biometric recognition system based on deep learning. Vis. Comput. 2019, 36, 1097–1109. [Google Scholar] [CrossRef]
  30. Abdellatef, E.; Omran, E.M.; Soliman, R.F.; Ismail, N.A.; Elrahman, S.E.S.E.A.; Ismail, K.N.; Rihan, M.; El-Samie, F.E.A.; Eisa, A.A. Fusion of deep-learned and hand-crafted features for cancelable recognition systems. Soft Comput. 2020, 24, 15189–15208. [Google Scholar] [CrossRef]
  31. Soliman, R.F.; Amin, M.; El-Samie, F.E.A. A Modified Cancelable Biometrics Scheme Using Random Projection. Ann. Data Sci. 2018, 6, 223–236. [Google Scholar] [CrossRef]
  32. Hashad, F.G.; Zahran, O.; El-Rabaie, E.-S.M.; Elashry, I.F.; El-Samie, F.E.A. Fusion-based encryption scheme for cancelable fingerprint recognition. Multimedia Tools Appl. 2019, 78, 27351–27381. [Google Scholar] [CrossRef]
  33. Soliman, R.F.; Amin, M.; El-Samie, F.E.A. Cancelable Iris recognition system based on comb filter. Multimedia Tools Appl. 2019, 79, 2521–2541. [Google Scholar] [CrossRef]
  34. Algarni, A.D.; El Banby, G.M.; Soliman, N.F.; El-Samie, F.E.A.; Iliyasu, A.M. Efficient Implementation of Homomorphic and Fuzzy Transforms in Random-Projection Encryption Frameworks for Cancellable Face Recognition. Electronics 2020, 9, 1046. [Google Scholar] [CrossRef]
  35. Cherrat, E.M.; Alaoui, R.; Bouzahir, H. Convolutional neural networks approach for multimodal biometric identification system using the fusion of fingerprint, finger-vein and face images. PeerJ Comput. Sci. 2020, 6, e248. [Google Scholar] [CrossRef] [Green Version]
  36. Xu, H.; Qi, M.; Lu, Y. Multimodal Biometrics Based on Convolutional Neural Network by Two-Layer Fusion. In Proceedings of the 2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), Suzhou, China, 19–21 October 2019; pp. 1–6. [Google Scholar]
  37. Ghosal, S.; Mandal, J.K. On the use of the Stirling Transform in image steganography. J. Inf. Secur. Appl. 2019, 46, 320–330. [Google Scholar] [CrossRef]
  38. Maan, P.; Singh, H.; Kumari, A.C. Image encryption based on Walsh Hadamard and fractional fourier transform using Radial Hilbert Mask. In Proceedings of the 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), Gurgaon, India, 12–14 October 2017; pp. 179–183. [Google Scholar]
  39. Sharma, D. Robust Technique for Image Encryption and Decryption Using Discrete Fractional Fourier Transform with Random Phase Masking. Procedia Technol. 2013, 10, 707–714. [Google Scholar]
  40. Thanki, R.; Borra, S.; Dwivedi, V.; Borisagar, K. An efficient medical image watermarking scheme based on FDCuT–DCT. Eng. Sci. Technol. Int. J. 2017, 20, 1366–1379. [Google Scholar] [CrossRef]
  41. Tabassum, F.; Islam, I.; Amin, R. Comparison of filter banks of DWT in recovery of image using one dimensional signal vector. J. King Saud Univ. Comput. Inf. Sci. 2019. [Google Scholar] [CrossRef]
  42. Thanki, R.; Borra, S. A color image steganography in hybrid FRT–DWT domain. J. Inf. Secur. Appl. 2018, 40, 92–102. [Google Scholar] [CrossRef]
  43. Saravanan, G.; Yamuna, G. Real Time Implementation of Image Enhancement Based on 2D-DWT. Procedia Comput. Sci. 2016, 87, 105–110. [Google Scholar] [CrossRef] [Green Version]
  44. Chen, S.W.; Wang, X.S.; Sato, M. Uniform polarimetric matrix rotation theory and its applications. IEEE Trans. Geosci. Remote Sens. 2013, 52, 4756–4770. [Google Scholar] [CrossRef]
  45. Li, S.; Yuan, Y.; Shen, S.; Tan, H. Identification and correction of microlens array rotation error in plenoptic imaging systems. Opt. Lasers Eng. 2019, 121, 156–168. [Google Scholar] [CrossRef]
  46. ORL Database. Available online: https://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html (accessed on 1 July 2020).
  47. FERET Database. Available online: https://www.nist.gov/itl/products-and-services/color-feret-database (accessed on 1 July 2020).
  48. LFW Database. Available online: http://vis-www.cs.umass.edu/lfw/ (accessed on 1 July 2020).
  49. FVC2002 (DB1) Database. Available online: https://www.biometricsinstitute.org/resources/fingerprint-verification-competition-fvc (accessed on 1 July 2020).
  50. FVC2002 (DB2) Database. Available online: http://bias.csr.unibo.it/fvc2002/databases.asp (accessed on 1 July 2020).
  51. Tarif, E.B.; Wibowo, S.; Wasimi, S.; Tareef, A. A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system. Multimedia Tools Appl. 2018, 77, 2485–2503. [Google Scholar] [CrossRef]
  52. Sree, S.S.; Radha, N. Cancellable multimodal biometric user authentication system with fuzzy vault. In Proceedings of the 2016 International Conference on Computer Communication and Informatics (ICCCI), Coilmbatore, India, 7–9 January 2016; pp. 1–6. [Google Scholar]
  53. Dang, T.K.; Truong, Q.C.; Le, T.T.B.; Truong, H. Cancellable fuzzy vault with periodic transformation for biometric template protection. IET Biometrics 2016, 5, 229–235. [Google Scholar] [CrossRef] [Green Version]
  54. Kumar, P.; Joseph, J.; Singh, K. Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. Appl. Opt. 2011, 50, 1805–1811. [Google Scholar] [CrossRef]
  55. Réfrégier, P.; Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef]
Figure 1. Matrix rotation with an angle θ .
Figure 1. Matrix rotation with an angle θ .
Entropy 22 01361 g001
Figure 2. Proposed method based on a bank of rotations and DWT to generate the cancelable biometric templates.
Figure 2. Proposed method based on a bank of rotations and DWT to generate the cancelable biometric templates.
Entropy 22 01361 g002
Figure 3. Proposed method based on DCT and a bank of rotations to generate the cancelable biometric templates.
Figure 3. Proposed method based on DCT and a bank of rotations to generate the cancelable biometric templates.
Entropy 22 01361 g003
Figure 4. Proposed method based on DFT or DFrFT and a bank of rotations to generate the cancelable biometric templates.
Figure 4. Proposed method based on DFT or DFrFT and a bank of rotations to generate the cancelable biometric templates.
Entropy 22 01361 g004
Figure 5. Samples of ORL database faces used as original biometrics and their histograms. (a) Original biometrics; (b) Biometrics histograms.
Figure 5. Samples of ORL database faces used as original biometrics and their histograms. (a) Original biometrics; (b) Biometrics histograms.
Entropy 22 01361 g005
Figure 6. Samples of FERET database faces used as original biometrics and their histograms. (a) Original biometrics; (b) Biometrics histograms.
Figure 6. Samples of FERET database faces used as original biometrics and their histograms. (a) Original biometrics; (b) Biometrics histograms.
Entropy 22 01361 g006
Figure 7. Samples of LFW database faces used as original biometrics and their histograms. (a) Original biometrics; (b) Biometrics histograms.
Figure 7. Samples of LFW database faces used as original biometrics and their histograms. (a) Original biometrics; (b) Biometrics histograms.
Entropy 22 01361 g007
Figure 8. Samples of the first fingerprints database used as original biometrics and their histograms. (a) Original biometrics; (b) Biometrics histograms.
Figure 8. Samples of the first fingerprints database used as original biometrics and their histograms. (a) Original biometrics; (b) Biometrics histograms.
Entropy 22 01361 g008
Figure 9. Samples of the second fingerprints database used as original biometrics and their histograms. (a) Original biometrics; (b) Biometrics histograms.
Figure 9. Samples of the second fingerprints database used as original biometrics and their histograms. (a) Original biometrics; (b) Biometrics histograms.
Entropy 22 01361 g009
Figure 10. Encrypted ORL biometric faces. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 10. Encrypted ORL biometric faces. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g010aEntropy 22 01361 g010b
Figure 11. Encrypted FERET biometric faces. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 11. Encrypted FERET biometric faces. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g011aEntropy 22 01361 g011b
Figure 12. Encrypted LFW biometric faces. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 12. Encrypted LFW biometric faces. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g012
Figure 13. Encrypted first biometric fingerprints. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Figure 13. Encrypted first biometric fingerprints. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Entropy 22 01361 g013
Figure 14. Encrypted second biometric fingerprints. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Figure 14. Encrypted second biometric fingerprints. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Entropy 22 01361 g014aEntropy 22 01361 g014b
Figure 15. Histogram of encrypted images for ORL faces biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 15. Histogram of encrypted images for ORL faces biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g015aEntropy 22 01361 g015b
Figure 16. Histogram of encrypted images for FERET faces biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 16. Histogram of encrypted images for FERET faces biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g016
Figure 17. Histogram of encrypted images for LFW faces biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 17. Histogram of encrypted images for LFW faces biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g017
Figure 18. Histograms of encrypted images for the first database of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Figure 18. Histograms of encrypted images for the first database of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Entropy 22 01361 g018aEntropy 22 01361 g018b
Figure 19. Histograms of encrypted images for the second database of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Figure 19. Histograms of encrypted images for the second database of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Entropy 22 01361 g019aEntropy 22 01361 g019b
Figure 20. Correlation scores for authorized patterns of ORL face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 20. Correlation scores for authorized patterns of ORL face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g020aEntropy 22 01361 g020b
Figure 21. Correlation scores for authorized patterns of FERET face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 21. Correlation scores for authorized patterns of FERET face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g021
Figure 22. Correlation scores for authorized patterns of LFW face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 22. Correlation scores for authorized patterns of LFW face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g022
Figure 23. Correlation scores for authorized patterns of the first database of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Figure 23. Correlation scores for authorized patterns of the first database of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Entropy 22 01361 g023aEntropy 22 01361 g023b
Figure 24. Correlation scores for authorized patterns of the second database of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Figure 24. Correlation scores for authorized patterns of the second database of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Entropy 22 01361 g024aEntropy 22 01361 g024b
Figure 25. Correlation scores for unauthorized imposter patterns for ORL face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 25. Correlation scores for unauthorized imposter patterns for ORL face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g025aEntropy 22 01361 g025b
Figure 26. Correlation scores for unauthorized patterns of FERET face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 26. Correlation scores for unauthorized patterns of FERET face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g026
Figure 27. Correlation scores for unauthorized patterns of LFW face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 27. Correlation scores for unauthorized patterns of LFW face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g027
Figure 28. Correlation scores for unauthorized imposter patterns of the first database of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Figure 28. Correlation scores for unauthorized imposter patterns of the first database of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Entropy 22 01361 g028aEntropy 22 01361 g028b
Figure 29. Correlation scores for unauthorized imposter patterns of the second database of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Figure 29. Correlation scores for unauthorized imposter patterns of the second database of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Entropy 22 01361 g029aEntropy 22 01361 g029b
Figure 30. Probability Distributions Function (PDFs) for ORL face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 30. Probability Distributions Function (PDFs) for ORL face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g030aEntropy 22 01361 g030b
Figure 31. Probability Distributions Function (PDFs) for FERET face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 31. Probability Distributions Function (PDFs) for FERET face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g031
Figure 32. Probability Distributions Function (PDFs) for LFW face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 32. Probability Distributions Function (PDFs) for LFW face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g032
Figure 33. Probability Distributions Function (PDFs) for the first dataset of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Figure 33. Probability Distributions Function (PDFs) for the first dataset of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Entropy 22 01361 g033
Figure 34. Probability Distributions Function (PDFs) for the second dataset of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Figure 34. Probability Distributions Function (PDFs) for the second dataset of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Entropy 22 01361 g034aEntropy 22 01361 g034b
Figure 35. ROC curves for ORL face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 35. ROC curves for ORL face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g035aEntropy 22 01361 g035b
Figure 36. ROC curves for FERET face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 36. ROC curves for FERET face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g036
Figure 37. ROC curves for LFW face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Figure 37. ROC curves for LFW face biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [90, 90]; (f) Rotation in FrFT domain [370, 370].
Entropy 22 01361 g037
Figure 38. ROC curves for the first dataset of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Figure 38. ROC curves for the first dataset of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Entropy 22 01361 g038
Figure 39. ROC curves for the second dataset of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Figure 39. ROC curves for the second dataset of the fingerprint biometrics. (a) Rotation in spatial domain; (b) Rotation followed by DWT; (c) Rotation in FFT domain; (d) Rotation in DCT domain; (e) Rotation in FrFT domain [45, 45]; (f) Rotation in FrFT domain [180, 90].
Entropy 22 01361 g039aEntropy 22 01361 g039b
Table 1. Comparative results of the recognition methods on the ORL faces dataset.
Table 1. Comparative results of the recognition methods on the ORL faces dataset.
MethodAROCMean of Authorized Correlation ScoreMean of Un-Authorized Correlation ScoreFARFRRERR
Cancelable based rotation0.99860.92860.77250.00470.00240.0018
Rotation followed by DWT0.92440.70410.00240.1350.02280.0144
Rotation in FFT domain0.97840.7984−0.01520.03810.02090.0106
Rotation based on DCT0.86810.7228−0.00190.16410.10000.0568
Rotation based on FrFT [90, 90]0.99690.907−0.08970.01730.01120.0055
Rotation based on FrFT [180, 180]0.99670.8968−0.00920.01250.01040.005
Rotation based on FrFT [370, 370]0.99520.8976−0.03200.03110.01490.0072
Table 2. Comparative results of the recognition methods on the FERET faces dataset.
Table 2. Comparative results of the recognition methods on the FERET faces dataset.
MethodAROCMean of Authorized Correlation ScoreMean of Un-Authorized Correlation ScoreFARFRRERR
Cancelable based rotation0.99200.88020.54900.02660.02120.0107
Rotation followed by DWT0.92360.6961−0.00120.14240.03540.0184
Rotation in FFT domain0.96570.77880.01820.04970.00750.0042
Rotation based on DCT0.9140.751−0.00170.15590.05360.0245
Rotation based on FrFT [90, 90]0.99650.88100.06280.01710.01590.0091
Rotation based on FrFT [180, 180]0.99640.8971−0.00870.01590.01300.007
Rotation based on FrFT [370, 370]0.99410.88640.13040.02380.02200.0120
Table 3. Comparative results of the recognition methods on the LFW faces dataset.
Table 3. Comparative results of the recognition methods on the LFW faces dataset.
MethodAROCMean of Authorized Correlation ScoreMean of Un-Authorized Correlation ScoreFARFRRERR
Cancelable based rotation0.99530.91990.81040.01900.01820.0109
Rotation followed by DWT0.93630.7103−0.00320.11180.01610.0088
Rotation in FFT domain0.94040.79210.01000.15920.04190.0201
Rotation based on DCT0.9581 0.7462−0.00070.07490.02580.0158
Rotation based on FrFT [90, 90]0.95610.82310.25780.09730.02540.0172
Rotation based on FrFT [180, 180]0.99650.8966−0.00890.01310.01140.008
Rotation based on FrFT [370, 370]0.99660.90150.06160.00810.04180.0213
Table 4. Comparative results of the recognition methods on the first fingerprint database.
Table 4. Comparative results of the recognition methods on the first fingerprint database.
MethodAROCMean of Authorized Correlation ScoreMean of Un-Authorized Correlation ScoreFARFRRERR
Cancelable based rotation0.9930.910.8760.0260.0170.010
Rotation followed by DWT0.9250.67770.00040.1310.0280.0187
Rotation in FFT domain0.9530.76990.21350.1040.0140.0130
Rotation based on DCT0.9630.7720.05520.0420.6440.3251
Rotation based on FrFT [45, 45]0.9010.74200.30090.1940.0570.0278
Rotation based on FrFT [180, 180]0.9910.88790.05210.0390.0140.0076
Rotation based on FrFT [180, 90]0.9970.8980−0.07510.0120.0100.0052
Table 5. Comparative results of the recognition methods on the second fingerprint database.
Table 5. Comparative results of the recognition methods on the second fingerprint database.
MethodAROCMean of Authorized Correlation ScoreMean of Un-Authorized Correlation ScoreFARFRRERR
Cancelable based rotation0.99740.93380.88410.0080.0030.0030
Rotation followed by DWT0.94740.67710.00420.0760.0100.0081
Rotation in FFT domain0.96670.76230.22710.0600.0180.0097
Rotation based on DCT0.96080.75960.57710.0440.0350.0183
Rotation based on FrFT [45, 45]0.86830.74120.30490.2030.0380.0264
Rotation based on FrFT [180, 180]0.99090.88820.05310.0370.0150.0072
Rotation based on FrFT [180, 90]0.9970.89130.01200.0100.0030.0026
Table 6. The average statistical evaluation results for the proposed and traditional cancellable biometric methods [19,31,34,51,52,53,54,55].
Table 6. The average statistical evaluation results for the proposed and traditional cancellable biometric methods [19,31,34,51,52,53,54,55].
Cancellable
Biometric Method
EERFARFRRAROC
Proposed0.00230.0080.0030.998
Ref. [19]0.09240.05620.02570.868
Ref. [31]0.01780.00710.08760.896
Ref. [34]0.00980.01040.0180.952
Ref. [51]0.10810.09270.09670.907
Ref. [52]0.04160.19550.04890.873
Ref. [53]0.08590.04350.06270.718
Ref. [54]0.03570.09850.06120.863
Ref. [55]0.00460.02350.09290.883
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Algarni, A.D.; El Banby, G.; Ismail, S.; El-Shafai, W.; El-Samie, F.E.A.; F. Soliman, N. Discrete Transforms and Matrix Rotation Based Cancelable Face and Fingerprint Recognition for Biometric Security Applications. Entropy 2020, 22, 1361. https://doi.org/10.3390/e22121361

AMA Style

Algarni AD, El Banby G, Ismail S, El-Shafai W, El-Samie FEA, F. Soliman N. Discrete Transforms and Matrix Rotation Based Cancelable Face and Fingerprint Recognition for Biometric Security Applications. Entropy. 2020; 22(12):1361. https://doi.org/10.3390/e22121361

Chicago/Turabian Style

Algarni, Abeer D., Ghada El Banby, Sahar Ismail, Walid El-Shafai, Fathi E. Abd El-Samie, and Naglaa F. Soliman. 2020. "Discrete Transforms and Matrix Rotation Based Cancelable Face and Fingerprint Recognition for Biometric Security Applications" Entropy 22, no. 12: 1361. https://doi.org/10.3390/e22121361

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop