Next Article in Journal
Electrothermal Aging Model of Li-Ion Batteries for Vehicle-to-Grid Services Evaluation
Next Article in Special Issue
Industrial Ergonomics Risk Analysis Based on 3D-Human Pose Estimation
Previous Article in Journal
A Poisson Process Generator Based on Multiple Thermal Noise Amplifiers for Parallel Stochastic Simulation of Biochemical Reactions
Previous Article in Special Issue
Improvement of Identity Recognition with Occlusion Detection-Based Feature Selection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient Generation of Cancelable Face Templates Based on Quantum Image Hilbert Permutation

by
Hesham Alhumyani
1,
Ghada M. El-Banby
2,
Hala S. El-Sayed
3,
Fathi E. Abd El-Samie
4,5 and
Osama S. Faragallah
6,*
1
Department of Computer Engineering, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
2
Department of Industrial Electronics and Control Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
3
Department of Electrical Engineering, Faculty of Engineering, Menoufia University, Shebin El-Kom 32511, Egypt
4
Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
5
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
6
Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(7), 1040; https://doi.org/10.3390/electronics11071040
Submission received: 3 March 2022 / Revised: 22 March 2022 / Accepted: 22 March 2022 / Published: 26 March 2022
(This article belongs to the Special Issue Human Face and Motion Recognition in Video)

Abstract

:
The pivotal need to identify people requires efficient and robust schemes to guarantee high levels of personal information security. This paper introduces an encryption algorithm to generate cancelable face templates based on quantum image Hilbert permutation. The objective is to provide sufficient distortion of human facial biometrics to be stored in a database for authentication requirements through encryption. The strength of the proposed Cancelable Biometric (CB) scheme is guaranteed through the ability to generate cancelable face templates by performing the scrambling operation of the face biometrics after addition of a noise mask with a pre-specified variance and an initial seed. Generating the cancelable templates depends on a strategy with three basic steps: Initialization, Odd module, and Even module. Notably, the proposed scheme achieves high recognition rates based on the Area under the Receiver Operating Characteristic (AROC) curve, with a value up to 99.51%. Furthermore, comparisons with the state-of-the-art schemes for cancelable face recognition are performed to validate the proposed scheme.

1. Introduction

Document fraud, identity theft, terrorism, and cybercrime are serious issues that need to be considered and studied carefully. Therefore, security solutions have been extended widely to face unauthorized access to modern systems with abundant data communication. Biometric solutions are reliable security solutions that depend on physical or behavioral analysis for authentication of persons [1,2,3]. Biometric technologies are classified according to the required application as follows: physiological against behavioral, mono-modal against multimodal, cooperative against non-cooperative, contact against touchless, near against remote, server-based against mobile-based, and human against automated.
Universally, biometric systems are adopted for security in several applications such as forensics, surveillance, logical and physical access control, attendance management, etc. However, biometric systems are recommended wherever identification and authentication are critical. Recently, biometric technology has flourished greatly, particularly in identity documents based on individual specific characteristics in a short time. For distinguishing individuals, biometric identifiers involve statistical analysis for physiological and behavioral measurements [4,5,6,7,8,9,10,11,12,13,14,15].
Physiological patterns may be morphological, such as the iris, retina, face, hand shape, fingerprint, and vein pattern, or non-morphological such as the DNA, blood, saliva, urine, and police forensics. The most common behavioral measurements involve gesture, gait, voice, keystroke, signature dynamics, etc. Masek provided a well-known algorithm with its open-source code for iris recognition [16]. It depends on the circular Hough transform with some sort of pre-processing for initial iris localization. The science of biometric recognition is rapidly evolving in several applications using different modalities such as fingerprint, face, iris, hand geometry, ear, and gait, which are discussed and covered in detail in [17].
The main objective of this research is to present a CB recognition scheme based on quantum image Hilbert permutation. Flexible Quantum Image Representation (FRQI) is proposed to allow image representation on quantum computers in the form of a natural model. The FRQI captures and transforms image information into normalized quantum states based on colors and positions in order to allow better management of image information. The strategy adopted in this scheme is used to save the original biometrics from being stored in databases, and use their encrypted versions instead. The verification or identification task is implemented on the encrypted versions through correlation estimation and thresholding. Each user has the ability to change his templates through a user-specific operation. That is why the proposed CB scheme improves both biometrics security and users privacy. The proposed scheme also maintains high accuracy of operation.
The remainder of this paper is sectioned as follows. The state-of-the-art work is explored in Section 1. Preliminaries of the FRQI, in addition to Hilbert image scrambling and quantum gates, are presented in Section 3. The design of the proposed CB recognition scheme based on quantum encryption is introduced in Section 4. Tests with quantitative and qualitative evaluation are given in Section 5. Conclusions are finally discussed in Section 6.

2. Related Work

The biometric authentication systems are more effective than conventional Personal Identification Number (PIN)/password-based authentication systems, which are not protected [18]. The authors of [19] presented a fusion-based multimodal system with enhanced verification accuracy, larger feature space, and higher security against spoofing than those of the unimodal biometric systems. This scheme depends on extracting features such as finger-vein, fingerprint, retina, and then key generation via the Rivest-Shamir-Adleman (RSA) algorithm. The system has been evaluated experimentally using MATLAB 2014, which showed high performance with a Genuine Acceptance Rate (GAR) of 95.3% and a False Acceptance Rate (FAR) of 0.01%.
A biometric template authentication scheme was presented by applying secret sharing [20]. This scheme stores the generated shared specifics of the biometric templates in the database and a Radio Frequency Identification (RFID) card, leading to a robust and secure database. A biometric system was initiated for personal authentication to provide digital security. The authors of [21] introduced a scheme for face recognition based on a patching technique and 2D Discrete Wavelet Transform (2D-DWT). A patching strategy was suggested to reflect the structural features of the face image and retain the integrity of local information for all samples. Patches of training and testing samples are obtained by applying a patch segmentation strategy. To examine the validity of the recognition method, several experiments were carried out on several face datasets such as FERET, Extended Yale B, and LFW. The results demonstrated that this scheme provides good performance compared to the recent conventional 2D-DWT and the state-of-the-art cancelable face recognition techniques. In [22], multimodal biometrics have been used to solve the problems of unimodal biometrics such as non-universality, effect of noise and low security. The partition-based DWT and the 2D Principal Component Analysis (2D PCA) were employed for extracting image features. The obtained results for this unimodal scheme demonstrated an acceptable performance with Equal Error Rates (EERs) of 0.16 and 0.24 for face and palm print recognition, respectively. On the other hand, results obtained for the multimodal scheme are better with a 0.08 EER.
In [23], biometric features were used for implementing steganography via the image skin tone region. The Hue, Saturation and Value (HSV) color space is used for detecting the skin color tone. Furthermore, the DWT is employed for data embedding in a high-frequency sub-band through tracing the skin pixels in order to present a decoder key. This steganography achieved higher security with a satisfactory Peak Signal-to-Noise Ratio (PSNR).
Although biometric identification is a unique research field, it suffers from some problems, such as security and privacy limitations. Security limitations are represented in the ability of intruders to capture the original biometrics or their features. On the other hand, privacy limitations are represented in the inability of users to change or modify their biometrics, when using them in an identification or a verification system. To avoid these limitations, there is a need for biometric systems that allow the user to secure his biometrics either through non-invertible transforms or through encryption. Moreover, the user should have the ability to generate his user-specific templates from his biometrics. The CB recognition schemes are good candidates for this task. Both encryption and non-invertible transforms can be used in these schemes. With CB recognition schemes, the cancelable templates could be reissued if compromised.
Biometric template protection schemes are classified into biometric cryptosystems and intended distortion systems. The objective of template protection is to generate intentionally distorted templates for enrolling them in the authentication process. Such schemes are designed with the potential of meeting the irreversibility, high performance and unlinkability criteria [24].
In [25], a survey of CB recognition schemes was presented revealing their merits and drawbacks. This survey covered several challenges of the CB recognition schemes. In addition, this survey presented high-security CB recognition schemes depending on Discrete Cosine Transform (DCT), non-invertible functions and Huffman encoding. In [26], the authors presented alignment-free cancelable fingerprint recognition schemes with the aid of blind system identification. These schemes were studied on FVC2002 DB1, DB2, and DB3 datasets. Their results demonstrated good performance represented in alignment-free templates. However, the generated templates cannot be canceled and reissued, when the biometric authentication system is attacked. The authors of [27] introduced a CB recognition scheme with the potential of increasing privacy and security of biometric templates based on left and right irises as input biometric traits. Results showed that all template protection requirements were achieved with good recognition performance.
In [28], a steganography-based CB recognition for iris images was introduced using non-invertible transforms. A non-invertible function is combined with Huffman encoding and DCT to perform some sort of modification of the iris coefficients extracted through the DCT. This scheme guarantees high security, since it is impossible to regenerate the source iris template from the stego iris template with an improved segmentation and normalization process.
The study in [29] presented a fingerprint template protection scheme based on feature-level fusion structures. This scheme depends on local and distant structures as bit strings to compute the transformed features. Bit-string feature-level-based fusion is employed to create the cancelable templates. This scheme achieved 2.19, 1.6 and 6.14% in ERR, when applied on FVC 2002 Database DB1 through DB3 and 11.89, 12.71, and 17.6% EER when applied on FVC 2004 DB1 through DB3. In [30], the authors addressed security and privacy issues arising from the use of CB templates. The introduced random distance transformation method changes the original user biometric identity to a pseudo-biometric identity to store and match. The experimental results proved good matching performance. In addition, this transformation was tested for unlinkability, non-invertibility, and resistance to different types of attacks such as dictionary, record, false accept, multiplicity and brute-force attacks.
In [31], a comparative study, based on discrete transforms with matrix rotation, was presented to achieve revocability. The implemented tests for all transformations proved efficiency of the presented CB recognition schemes. The authors of [32] presented a face/fingerprint CB recognition scheme based on 3D jigsaw transformation with optical encryption. This scheme was validated using several groups of face and fingerprint images. The results obtained demonstrated that it is secure, feasible, and reliable. In [33], the Indexing-First-One (IFO) hashing-based cancelable iris recognition scheme was presented to achieve the balance between accuracy and privacy requirements. This scheme depends on two efficient mechanisms: modulo threshold function and P-order Hadamard product, to increase the IFO hashing strength. Experiments on the CASIA-v3 iris benchmark database ensured efficient performance in the presence of several security and privacy attacks. In [34], the authors proposed two secure key agreement protocols based on biometrics. They depend on the analysis of fingerprints to achieve security and complexity of reconstruction. These protocols were tested against complexity, brute-force, replay, and impersonation attacks to prove their quality.
Quantum image processing has some preliminaries including Qubit Lattice, quantum wavelet transform [35], quantum discrete cosine transform [36] and quantum Fourier transform [37], which are more efficient in quantum computations than classical ones. Based on quantum image representation methods [38,39,40,41,42,43,44], quantum image encryption approaches were investigated in both spatial domain and frequency domain [45]. In [46], Ye et al. proposed a cryptosystem based on an improved diffusion mechanism. It is designed with two stages. The first one is multi-image compression, and the second one is the encryption process based on quaternion discrete fractional Hartley transform. They achieved good results in the presence of different attacks. In [47], the authors presented an encoding system based on generalized Arnold transform with double random phase encoding. Their algorithm showed effective encryption with low complexity. Zhou et al. [48] designed an encryption scheme based on wavelet transform and 3D encryption. They achieved a high security level.
In [49], both wavelet fusion and fractional chaotic systems were exploited for digital face encryption. This scheme was experimentally verified on FERET, LFW, and ORL datasets. Evaluation metrics revealed EER close to zero and 100% AROC at low and mild noise scales. To protect face templates, a cancelable transform, namely Nonlinear Multi-dimension Spectral Hashing (NMDSH) was presented in [50]. The NMDSH transforms a real-valued deep face feature vector into a binary code with a strong non-inverting property. Experimental results with and without attacks proved that the NMDSH has no impact on the system accuracy. The authors of [51] built a CB recognition scheme based on a speeded-up robust features approach to extract and select features. Experiments were conducted on Yale and ORL datasets producing an acceptable performance.
In [52], two CB recognition schemes for template protection were presented. A trous Wavelet Transform (AWT) is applied to divide the face image into seven sub-bands, followed by Homomorphic Filter Masking (HFM) encoding. The second scheme is applied for features detection of Facial Expression Recognition (FER). This is performed through a segmentation procedure using Canny edge detection and Hough Transform (HT). Simulation results proved success of both schemes.

3. Preliminaries: Quantum Image Processing (QIP)

Quantum Image Processing (QIP) is a research area that depends on the image representation using quantum information and quantum operators. Unlike classical theory, quantum theory concepts depend on qubits [53]. The FRQI model involves information about the color and the corresponding pixel position in an image. The general quantum representation of an image of size 2 n × 2 n is given by the following mathematical relation:
I ( θ = 1 2 n i = 0 2 2 n 1 | c i | i
| c i = cos θ i | 0 + sin θ i | 1 ,   θ i [ 0 ,   π 2 ] ,   i = 0 ,   1 ,   , 2 2 n 1
where the following relation gives the vertical and horizontal coordinates for | c i , which encodes color information with their corresponding pixel positions | i :
| i = | y | x = | y n 1   y n 2 y 0 | x n 1   x n 2 x 0
For n = 1, the 2 × 2 FRQI template image will be described by the following equation:
| I = 1 2 [ ( cos θ 0 | 0 + sin θ 0 | 1 ) | 00 +      ( cos θ 1 | 0 + sin θ 1 | 1 ) | 01 +      ( cos θ 2 | 0 + sin θ 2 | 1 ) | 10 +      ( cos θ 3 | 0 + sin θ 3 | 1 ) | 11 ]
The Hilbert scanning matrix is vital to allow image scrambling by performing permutation on each pixel to a new position to transform a meaningful image into a distorted non-meaningful encrypted image. Therefore, the Hilbert scanning matrix is given by the following relations [54]:
H n + 1 = { ( H n 4 n E n + H n T ( 4 n + 1 + 1 ) E n H n u d ( 3 × 4 n + 1 ) E n ( H n l r ) T ) ,    n   is   even . ( H n ( 4 n + 1 + 1 ) E n H n l r 4 n E n + H n T     ( 3 × 4 n + 1 ) E n ( H n T ) l r ) ,    n   is   odd .
where n represents a positive integer. The initial matrix is
H 1 = ( 1 2 4 3 )
and
E n = ( 1 1 1 1 1 1 . . . . . . . . 1 1 1 )
The geometric transformation of the matrix image A in the form 2 m × 2 m is given as follows:
A = ( a 1 , 1 a 1 , 2 a 1 , m a 2 , 1 a 2 , 2 a 2 , m . . . . . . . . a m , 1 a m , 2 a m , m ) ,
Then,
A T = ( a 1 , 1 a 2 , 1 a m , 1 a 1 , 2 a 2 , 2 a m , 2 . . . . . . . . a 1 , m a 2 , m a m , m ) A l r = ( α 1 , μ α 1 , 2 α 1 , 1 α 2 , μ α 2 , 2 α 2 , 1 . . . . . . . . α μ , μ α μ , 2 α μ , 1 ) A u d = ( a m , 1 a m , 2 a m , m . . . . . . . . a 2 , 1 a 2 , 2 a 2 , m a 1 , 1 a 1 , 2 a 1 , m ) A p p = ( a m , m a m , 2 a m , 1 . . . . . . . . a 2 , m a 2 , 2 a 2 , 1 a 1 , m a 1 , 2 a 1 , 1 )
The scrambling process of the original image is composed of the three basic operations as illustrated in Figure 1, including initialization, Even and Odd modules. The size of the Hilbert scanning matrix begins with 2 × 2 and increases gradually with each operation step. The scrambling starts with partitioning of the image into blocks and working on each block according to Equation (1). PARTITION (0) is performed in the initialization step to divide the 2 n × 2 n input image into 2 n 1 × 2 n 1 sub-images with size 2 × 2. Then, each block is denoted by ( a b c d ) . Next, swapping operation is performed on the last two pixels of every sub-image to be ( a b d c ) . Then, PARTITION (1) divides the output image into 4 × 4 sub-images. This is followed by an Odd module that changes every block into ( a d p p b T c T ) . Then, the Even module is performed to generate ( a b T d p p c T ) . The Odd and Even modules are performed, alternatively, until Even(n−1)/Odd(n−1) that is if (n−1) is an even value, the final operation is Even(n−1); otherwise, the final operation will be Odd (n−1).

4. Cancelable Face Recognition Based on Quantum Image Distortion

This section introduces the methodology to accomplish our proposed scheme to generate robust cancelable templates to achieve a high security level for the original biometric templates against thefts and attacks. The proposed scheme is illustrated in Figure 2, where the scrambling approach is performed on the raw images in the enrollment stage. The generated encrypted templates are stored in the database for further matching processes in the authentication phase. The generated cancelable templates are obtained through the Hilbert scrambling strategy with three basic steps: Initialization, Odd and Even modules. The cancelable templates are produced as follows:
Step 1: The procedure starts with PARTITION (0) to generate 2 × 2 sub-images in the form ( i i + 1 i + 2 i + 3 ) .
Step 2: Swapping operation is performed for the last two pixels of every sub-image by the C-Not gate.
Step 3: 4 × 4 sub-images are generated through PARTITION (1). Odd and Even modules are used to complete the scrambling process.
If a generated distorted template is compromised, the proposed CB recognition scheme can generate a new different distorted template that completely differs from the compromised one by adding a noise mask to the original biometric image according to an initial seed and a certain variance. The newly generated template will be totally different from the other stored templates in the database.

5. Performance Evaluation and Test Results

Quantitative and qualitative analysis are introduced in this work. The proposed facial recognition scheme is implemented using MATLAB running on Intel Core™ i5-4210U with 1.7 GHz CPU. The goal is to overcome illegal access and attacks. Therefore, we propose an efficient scheme based on QIP to be resistant to intrusion attacks. Samples of biometric face images used in this study are selected from the Mass Labeled Faces in the Wild (LFW) dataset [55], Olivetti and Oracle (ORL) dataset [56], and NiST Face Recognition Technology (FERET) dataset [57]. Different evaluation metrics are used for investigating the proposed scheme robustness. Furthermore, a comparison is introduced between the proposed scheme and other existing ones based on fuzzy domain and homomorphic domain to demonstrate and ensure the effectiveness of the proposed scheme.
We consider three different datasets to examine the encryption algorithm performance and enrich the validation scheme. The size of all templates is 128 × 128. The original samples of the three datasets are presented in Figure 3, with distorted versions shown in Figure 4. The distributions of histograms for the original samples and the encrypted samples illustrated in Figure 5 and Figure 6 prove that the scrambling process based on Swapping operation, Odd module and Even module permutes and shuffles sufficiently each pixel position to perform effectual distortion without changing pixel gray levels.
Another important metric used to evaluate the performance of the encryption algorithm is the correlation coefficient, which is used for measuring the correlation between distorted output templates in the enrollment phase and the new distorted facial images. The correlation coefficient can be evaluated as follows:
R x y = 1 N i = 1 N ( x i x ¯ ) ( y i y ¯ ) σ x σ y
where N, x and y are the number of pixels, the current stored distorted encrypted version, and the newly distorted template.
Figure 3. Samples of face images used as original biometrics [55,56,57]. (a) LFW dataset [55]. (b) FERET dataset [57]. (c) ORL dataset [56].
Figure 3. Samples of face images used as original biometrics [55,56,57]. (a) LFW dataset [55]. (b) FERET dataset [57]. (c) ORL dataset [56].
Electronics 11 01040 g003aElectronics 11 01040 g003b
Figure 4. Encrypted versions of biometric faces in Figure 3 based on QIP. (a) Samples of LFW encrypted templates. (b) Samples of FERET encrypted templates. (c) Samples of ORL encrypted templates.
Figure 4. Encrypted versions of biometric faces in Figure 3 based on QIP. (a) Samples of LFW encrypted templates. (b) Samples of FERET encrypted templates. (c) Samples of ORL encrypted templates.
Electronics 11 01040 g004aElectronics 11 01040 g004b
Figure 5. Histograms of facial image samples for (a) LFW dataset, (b) FERET dataset, (c) ORL dataset.
Figure 5. Histograms of facial image samples for (a) LFW dataset, (b) FERET dataset, (c) ORL dataset.
Electronics 11 01040 g005aElectronics 11 01040 g005b
Figure 6. Histograms of encrypted facial image samples based on QIP for (a) LFW dataset, (b) FERET dataset, (c) ORL dataset.
Figure 6. Histograms of encrypted facial image samples based on QIP for (a) LFW dataset, (b) FERET dataset, (c) ORL dataset.
Electronics 11 01040 g006aElectronics 11 01040 g006b
Figure 7 illustrates the correlation coefficient values evaluated among the authorized biometrics and their corresponding counterparts stored in the enrollment phase with noise for all encrypted templates. In addition, Figure 8 illustrates the calculated correlation coefficient scores for all impostor and unauthorized records. The output scores in both Figure 7 and Figure 8 demonstrate that all correlation values for authorized patterns are greater than 0.7, while those correlation values for unauthorized patterns are lower than 0.25. Hence, a threshold score may be adopted ranging from 0.25 to 0.7 to distinguish between authorized and unauthorized patterns. Using such a wide range for setting the threshold, the proposed scheme achieves a high security level.
The ROC curves are shown in Figure 9 for better grasping and understanding of the results. The True Positive Rate (TPR) versus the False Positive Rate (FPR) was studied in [58,59,60,61]. The TPR and the FPR are used to assess the authentication performance. The AROC is as high as possible, revealing more robustness and strength of the proposed scheme. The probability distributions of the correlation scores for both authorized and unauthorized tests are given in Figure 10.
The congruity evaluation metrics, such as Structural Similarity Index Metric (SSIM), are employed to measure the similarity between two templates. For example, an acceptable SSIM value to test the encryption quality between original and encrypted images should be close to zero. Mathematically, SSIM can be computed as in Equation (7) [62] to evaluate the distortion strength.
SSIM = ( 2 μ x μ y + S 1 ) ( 2 δ x y   + S 2 ) ( μ x   2 + μ y   2 + S 1 ) + ( δ x   2 + δ y   2 + S 2 )
where μ x and μ y are the means of the images x and y, respectively, δ x   2 , and δ y   2 denote the two images variances, δ x y is the cross-covariance between them, S 1 and S 2 are selected as small as possible according to [63].
Table 1 ensures the high performance and the robustness of the proposed CB recognition scheme by displaying the scores of evaluation metrics. These metrics include the AROC and SSIM scores among the stored and impostor patterns, and the correlation score distribution for authorized and unauthorized patterns. These presented metrics are used to demonstrate and prove the superiority of the proposed CB recognition scheme. The obtained results of high AROC values of 0.9951 on average for the three different datasets in addition to the low values of SSIM indicate the strength of the proposed scheme to be applied for authentication applications. Finally, Table 2 presents a comparison with state-of-the-art CB recognition schemes from the AROC perspective. The suggested CB recognition scheme is superior compared to the others.

6. Conclusions

This paper presented a cancelable biometric recognition scheme that depends on QIP concepts. A scrambling and permutation algorithm was proposed to generate the cancelable encrypted templates to be stored in the database for authentication. The proposed scheme allows securing of biometric templates from unauthorized access. In addition, it allows changing the biometric templates if compromised through the addition of a user-specific noise mask. The proposed scheme was evaluated and tested on three distinct datasets to take into consideration the anticipated variations in lighting conditions, and background. Simulation and comparison results revealed an average AROC of 0.9951 and an average SSIM of 0.051 for the proposed scheme. These findings reveal that the proposed scheme is a good candidate for biometric security in remote access systems. In future work, our research plan is to work on multiple biometrics to generate robust cancelable templates. In addition, deep learning will be considered for robust feature extraction in CB recognition systems.

Author Contributions

Conceptualization, H.A. and O.S.F.; methodology, G.M.E.-B.; software, G.M.E.-B.; validation, H.S.E.-S., H.A. and G.M.E.-B.; formal analysis, O.S.F.; investigation, F.E.A.E.-S.; resources, G.M.E.-B.; data curation, H.A.; writing—original draft preparation, H.S.E.-S.; writing—review and editing, O.S.F.; visualization, H.A.; supervision, F.E.A.E.-S.; project administration, O.S.F.; funding acquisition, H.A. All authors have read and agreed to the published version of the manuscript.

Funding

This study was funded by the Deanship of Scientific Research, Taif University Researchers Supporting Project number (TURSP-2020/216), Taif University, Taif, Saudi Arabia.

Data Availability Statement

The data presented in this study are openly available as follows: [LFW Database 2020] at http://vis-www.cs.umass.edu/lfw/ (accessed on 1 January 2022), [55], [ORL Database 2020] at https://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html (accessed on 1 January 2022), [56], and [FERET Database 2020] at https://www.nist.gov/itl/products-and-services/color-feret-database (accessed on 1 January 2022), [57].

Acknowledgments

The authors would like to thank the Deanship of Scientific Research, Taif University Researchers Supporting Project number (TURSP-2020/216), Taif University, Taif, Saudi Arabia for supporting this research work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ashbourn, J. Biometrics: Advanced Identity Verification, the Complete Guide; Springer: London, UK, 2000. [Google Scholar]
  2. Smith, R. Authentication: From Passwords to Public Keys; Addison and Wesley: Boston, MA, USA, 2002. [Google Scholar]
  3. Jain, A.; Ross, A.; Prabhakar, S. An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 2004, 14, 4–20. [Google Scholar] [CrossRef] [Green Version]
  4. Chen, X.; Flynn, P.J.; Bowyer, K.W. IR and visible light face recognition. Comput. Image Vis. Underst. 2005, 99, 332–358. [Google Scholar] [CrossRef]
  5. Zhou, S.K.; Chellappa, R.; Zhao, W. Unconstrained Face Recognition; Springer: Berlin/Heidelberg, Germany, 2006. [Google Scholar]
  6. Jain, A.; Bolle, R.; Pankanti, S. Biometrics: Personal Identification in Networked Society; Springer Science & Business Media: New York, NY, USA, 2006; p. 479. [Google Scholar]
  7. Delac, K.; Grgic, M. Face Recognition; I-Tech Education and Publishing: Vienna, Austria, 2007. [Google Scholar]
  8. Kim, Y.; Toh, K. A method to enhance face biometric security. In Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and Systems, Crystal City, VA, USA, 27–29 September 2007; pp. 1–6. [Google Scholar]
  9. Khan, M.; Zhang, J.; Wang, X. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 2008, 35, 519–524. [Google Scholar] [CrossRef]
  10. Delac, K.; Grgic, M.; Bartlett, M.S. Recent Advances in Face Recognition; IN-TECH: Vienna, Austria, 2008. [Google Scholar]
  11. Tistarelli, M.; Li, S.Z.; Chellappa, R. Handbook of Remote Biometrics for Surveillance and Security; Springer: Berlin/Heidelberg, Germany, 2009. [Google Scholar]
  12. Khan, M.; Xie, L.; Zhang, J. Chaos and NDFT-based spread spectrum concealing of fingerprint biometric data into audio signals. Digit. Signal Processing 2010, 20, 179–190. [Google Scholar] [CrossRef]
  13. Li, S.Z.; Jain, A.K. Handbook of Face Recognition; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
  14. Marsico, M.D.; Nappi, M.; Tistarelli, M. Face Recognition in Adverse Conditions; IGI-Global: Hershey, PA, USA, 2014. [Google Scholar]
  15. Das, R. Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture; CRC Press: Boca Raton, FL, USA, 2014. [Google Scholar]
  16. Masek, L. Recognition of Human Iris Patterns for Biometric Identification; The University of Western: Perth, Australia, 2003. [Google Scholar]
  17. Jain, A.K.; Ross, A.A.; Nandakumar, K. Introduction to Biometrics; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
  18. Bhartiya, N.; Jangid, N.; Jannu, S. Biometric Authentication systems: Security concerns and solutions. In Proceedings of the 3rd International Conference for Convergence in Technology (I2CT), Pune, India, 6–8 April 2018; pp. 4–11. [Google Scholar]
  19. Jagadiswarya, D.; Saraswadya, D. Biometric authentication using fused multimodal biometric. In Proceedings of the 2016 International Conference on Computational Modeling and Security (CMS 2016), Bengaluru, India, 11–13 February 2016; pp. 109–116. [Google Scholar]
  20. Patil, S.; Lokhande, S.; Dhumal, P.; Kamble, T. Design and implementation of secure biometric based authentication system using RFID and secret sharing. In Proceedings of the 2017 2nd International Conference for Convergence in Technology (I2CT), Mumbai, India, 7–9 April 2017; pp. 2–13. [Google Scholar]
  21. Huangac, Z.H.; Lia, W.J.; Shangab, J.; Wangb, J.; Zhangac, T. Non-uniform patch based face recognition via 2D-DWT. Image Vis. Comput. 2015, 37, 12–19. [Google Scholar] [CrossRef]
  22. Devi, D.V.R.; Rao, K.N. A multimodal biometric system using partition based DWT and rank level fusion. In Proceedings of the 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Chennai, India, 15–17 December 2016; pp. 10–17. [Google Scholar]
  23. Amritha, G.; Meethu, V. Biometric steganographic technique using DWT and encryption. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2013, 3, 566–572. [Google Scholar]
  24. Rathageb, C.; Hammerle-Uhl, A. A Survey on biometric cryptosystem and cancelable biometrics. EURASIP J. Inf. Secur. 2011, 18, 3. [Google Scholar]
  25. Choudhury, B.; Then, P.; Issac, B.; Raman, V.; Haldar, M.K. A Survey on biometrics and cancelable biometrics systems. Int. J. Image Graph. 2018, 18, 1850006. [Google Scholar] [CrossRef] [Green Version]
  26. Wang, S.; Hu, J. A blind system identification approach to cancelable fingerprint templates. Pattern Recognit. 2016, 54, 14–22. [Google Scholar] [CrossRef]
  27. Chaudhary, S.; Nath, R.; Kant, C.; Kant, S. Approach for protection of iris template using cancelable biometrics. Int. J. Sens. Wirel. Commun. Control 2019, 9, 12–22. [Google Scholar] [CrossRef]
  28. Choudhury, B.; Then, P.; Raman, V.; Issac, B.; Haldar, M.K. Cancelable iris biometrics based on data hiding schemes. In Proceedings of the IEEE Student Conference on Research and Developmen, Kuala Lumpur, Malaysia, 13–14 December 2016; pp. 26–34. [Google Scholar]
  29. Sandhya, M.; Prasad, M.V.N.K. Securing fingerprint templates using fused structures. IET Biom. 2017, 6, 173–182. [Google Scholar] [CrossRef]
  30. Kaur, H.; Khanna, P. Random distance method for generating unimodal and multimodal cancelable biometric features. IEEE Trans. Inf. Forensics Secur. 2019, 14, 709–719. [Google Scholar] [CrossRef]
  31. Soliman, N.F.; Algarni, A.D.; El-Shafai, W.; Ismail, S.; Abd El-Samie, F.E.; Elbanby, G. Discrete transforms and matrix rotation based cancelable face and fingerprint recognition for biometric security applications. Entropy 2020, 22, 1361. [Google Scholar]
  32. Abouelazm, L.A.; Ibrahim, S.; Egila, M.G.; Shawky, H.; Elsaid, M.K.H.; El-Shafai, W.; El-Samie, F.E.A. Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimed. Tools Appl. 2020, 79, 14053–14078. [Google Scholar] [CrossRef]
  33. Laia, Y.; Jina, Z.; Teohb, A.B.J.; Goia, B.; Yapa, W.; Chaia, T.; Rathgebc, C. Cancellable iris template generation based on indexing-first-one hashing. Pattern Recogn. 2017, 64, 105–117. [Google Scholar] [CrossRef]
  34. Akdogan, D.; Alto, D.K.; Eskandarian, L.; Levi, A. Secure key agreement protocols: Pure biometrics and cancelable biometrics. Comput. Netw. 2018, 142, 33–48. [Google Scholar] [CrossRef]
  35. Fijany, A.; Williams, C.P. Quantum wavelet transform: Fast algorithm and complete circuits. arXiv 1998, arXiv:quant-ph/9809004. [Google Scholar]
  36. Tseng, C.C.; Hwang, T.M. Quantum circuit design of 8 × 8 discrete cosine transforms using its fast computation flow graph. In Proceedings of the 2005 IEEE International Symposium on Circuits and Systems (ISCAS), Kobe, Japan, 23–26 May 2005; Volume l, pp. 828–831. [Google Scholar]
  37. Nielsen, M.; Chuang, I. Quantum Computation and Quantum Information; Cambridge University Press: New York, NY, USA, 2000. [Google Scholar]
  38. Venegas-Andraca, S.B.S. Storing, processing, and retrieving an image using quantum mechanics. In Proceedings of the SPIE Conference of Quantum Information and Computation 2003, Orlando, FL, USA, 21–25 April 2003; pp. 134–147. [Google Scholar]
  39. Venegas-Andraca, S.E.; Ball, J.L. Processing images in entangled quantum systems. Quantum Inf. Processing 2010, 9, 1–11. [Google Scholar] [CrossRef]
  40. Le, P.Q.; Dong, F.; Hirota, K. A flexible representation of quantum images for polynomial preparation, image compression, and processing operations. Quantum Inf. Processing 2011, 10, 63–84. [Google Scholar] [CrossRef]
  41. Sun, B.; Iliyasu, A.; Yan, F.; Dong, F.; Hirota, K. An RGB multi-channel representation for images on quantum computers. J. Adv. Comput. Intell. Intell. Inform. 2013, 17, 404–407. [Google Scholar] [CrossRef]
  42. Li, H.S.; Qingxin, Z.; Lan, S.; Shen, C.Y.; Zhou, R.; Mo, J. Image storage, retrieval, compression and segmentation in a quantum system. Quantum Inf. Processing 2013, 12, 2269–2290. [Google Scholar] [CrossRef]
  43. Zhang, Y.; Lu, K.; Gao, Y.; Wang, M. NEQR: A novel enhanced quantum representation of digital images. Quantum Inf. Processing 2013, 12, 2833–2860. [Google Scholar] [CrossRef]
  44. Yan, F.; Venegas-Andraca, S.E.; Hirota, K. Toward implementing efficient image processing algorithms on quantum computers. Soft Comput. 2022. [Google Scholar] [CrossRef]
  45. Hu, W.W.; Zhou, R.G.; Luo, J.; Jiang, S.X.; Luo, G.F. Quantum image encryption algorithm based on Arnold scrambling and wavelet transforms. Quantum Inf. Processing 2020, 19, 82. [Google Scholar] [CrossRef]
  46. Ye, H.; Zhou, N.; Gong, L. Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. Signal Processing 2020, 175, 107652. [Google Scholar] [CrossRef]
  47. Zhou, N.R.; Hua, T.X.; Gong, L.H.; Pei, D.J.; Liao, Q.H. Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf. Processing 2015, 14, 1193–1213. [Google Scholar] [CrossRef]
  48. Zhou, N.-R.; Huang, L.-X.; Gong, L.-H.; Zeng, Q.-W. Novel quantum image compression and encryption algorithm based on DQWT and 3D hyper-chaotic Henon map. Quantum Inf. Processing 2020, 19, 284. [Google Scholar] [CrossRef]
  49. Badr, I.S.; Radwan, A.G.; EL-Rabaie, E.S.M.; Said, L.A.; El Banby, G.M.; El-Shafai, W.; Abd El-Samie, F.E. Cancellable face recognition based on fractional-order Lorenz chaotic system and Haar wavelet fusion. Digit. Signal Processing 2021, 116, 103103. [Google Scholar] [CrossRef]
  50. Dong, X.; Wong, K.; Jin, Z.; Dugelay, J.L. A cancellable face template scheme based on nonlinear multi-dimension spectral hashing. In Proceedings of the 2019 7th International Workshop on Biometrics and Forensics (IWBF), Cancun, Mexico, 2–3 May 2019; pp. 1–6. [Google Scholar]
  51. Alwan, H.B.; Ku-Mahamud, K.R. Cancellable face template algorithm based on speeded-up robust features and winner-takes-all. Multimed. Tools Appl. 2020, 79, 28675–28693. [Google Scholar] [CrossRef]
  52. Ashiba, H.I. Proposed framework for cancelable face recognition system. Multimed. Tools Appl. 2021, 80, 13677–13705. [Google Scholar] [CrossRef]
  53. Li, H.; Chen, X.; Song, S.; Liao, Z.; Fang, J. A block-based quantum image scrambling for GNEQR. IEEE Access 2019, 7, 138233–138243. [Google Scholar] [CrossRef]
  54. Abd El-Latif, A.; Abd-El-Atty, B.; Talha, M. Robust encryption of quantum medical images. IEEE Access 2017, 6, 1073–1081. [Google Scholar] [CrossRef]
  55. LFW Database. 2020. Available online: http://vis-www.cs.umass.edu/lfw/ (accessed on 1 June 2020).
  56. ORL Database. 2020. Available online: https://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html (accessed on 1 June 2020).
  57. FERET Database. 2020. Available online: https://www.nist.gov/itl/products-and-services/color-feret-database (accessed on 1 June 2020).
  58. Benrhouma, O.; Hermassi, H.; El-Latif, A.A.; Belghith, S. Chaotic watermark for blind forgery detection in images. Multimed. Tools Appl. 2015, 75, 8695–8718. [Google Scholar] [CrossRef]
  59. Wang, N.; Li, Q.; El-Latif, A.A.; Peng, J.; Niu, X. An enhanced thermal face recognition method based on multiscale complex fusion for Gabor coefficients. Multimed. Tools Appl. 2013, 72, 2339–2358. [Google Scholar] [CrossRef]
  60. Soliman, R.F.; El Banby, G.M.; Algarni, A.D.; Elsheikh, M.; Soliman, N.F.; Amin, M.; El-Samie, F.E.A. Double random phase encoding for cancelable face and iris recognition. Appled Opt. 2018, 57, 10305–10316. [Google Scholar] [CrossRef]
  61. Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Processing 2004, 13, 600–612. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  62. Wang, Z.; Simoncelli, E.P.; Bovik, A.C. Multiscale structural similarity for image quality assessment. In Proceedings of the Thirty-Seventh Asilomar Conference on Signals, Systems & Computers, Pacific Grove, CA, USA, 9–12 November 2003; pp. 1398–1402. [Google Scholar] [CrossRef] [Green Version]
  63. Algarni, A.D.; El Banby, G.M.; Soliman, N.F.; El-Samie, F.E.A.; Iliyasu, A.M. Efficient implementation of homomorphic and fuzzy transforms in random-projection encryption frameworks for cancellable face recognition. Electronics 2020, 9, 1046. [Google Scholar] [CrossRef]
  64. Réfrégier, P.; Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995, 20, 767. [Google Scholar] [CrossRef]
  65. Sinha, A.; Singh, K. Image encryption by using fractional Fourier transform and jigsaw transform in image bit planes. Opt. Eng. 2005, 44, 057001. [Google Scholar] [CrossRef]
  66. Kumar, P.; Joseph, J.; Singh, K. Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. Appl. Opt. 2011, 50, 1805–1811. [Google Scholar] [CrossRef]
Figure 1. The general Hilbert scrambling quantum scheme.
Figure 1. The general Hilbert scrambling quantum scheme.
Electronics 11 01040 g001
Figure 2. The proposed QIP-based CB recognition scheme.
Figure 2. The proposed QIP-based CB recognition scheme.
Electronics 11 01040 g002
Figure 7. Correlation scores for authorized patterns based on QIP for (a) LFW dataset, (b) FERET dataset, (c) ORL dataset.
Figure 7. Correlation scores for authorized patterns based on QIP for (a) LFW dataset, (b) FERET dataset, (c) ORL dataset.
Electronics 11 01040 g007
Figure 8. Correlation scores for unauthorized impostor patterns based on QIP for (a) LFW dataset, (b) FERET dataset, (c) ORL dataset.
Figure 8. Correlation scores for unauthorized impostor patterns based on QIP for (a) LFW dataset, (b) FERET dataset, (c) ORL dataset.
Electronics 11 01040 g008
Figure 9. ROC curves for the proposed CB recognition scheme based on QIP for (a) LFW dataset, (b) FERET dataset, (c) ORL dataset.
Figure 9. ROC curves for the proposed CB recognition scheme based on QIP for (a) LFW dataset, (b) FERET dataset, (c) ORL dataset.
Electronics 11 01040 g009
Figure 10. Probability distributions for the proposed CB recognition scheme based on QIP for (a) LFW dataset, (b) FERET dataset, (c) ORL dataset.
Figure 10. Probability distributions for the proposed CB recognition scheme based on QIP for (a) LFW dataset, (b) FERET dataset, (c) ORL dataset.
Electronics 11 01040 g010
Table 1. Evaluation metrics of the QIP-based cancelable face recognition scheme on three different datasets.
Table 1. Evaluation metrics of the QIP-based cancelable face recognition scheme on three different datasets.
DatasetAROCSSIMAuthorized Mean CorrelationUnauthorized Mean Correlation
Quantum encryption for LFW0.99630.0210.90260.0522
Quantum encryption for FERET0.99920.1210.95690.0527
Quantum encryption for ORL0.98970.0110.88820.0414
Table 2. Comparison with state-of-the-art CB recognition schemes from the AROC perspective.
Table 2. Comparison with state-of-the-art CB recognition schemes from the AROC perspective.
MethodAROC
Quantum encryption scheme0.9951
IFL followed by Gaussian RP [64]0.9720
Homomorphic transform followed by Gaussian RP [63]0.9774
FRFT only [64,65]0.8837
Jigsaw only [66]0.8967
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Alhumyani, H.; El-Banby, G.M.; El-Sayed, H.S.; Abd El-Samie, F.E.; Faragallah, O.S. Efficient Generation of Cancelable Face Templates Based on Quantum Image Hilbert Permutation. Electronics 2022, 11, 1040. https://doi.org/10.3390/electronics11071040

AMA Style

Alhumyani H, El-Banby GM, El-Sayed HS, Abd El-Samie FE, Faragallah OS. Efficient Generation of Cancelable Face Templates Based on Quantum Image Hilbert Permutation. Electronics. 2022; 11(7):1040. https://doi.org/10.3390/electronics11071040

Chicago/Turabian Style

Alhumyani, Hesham, Ghada M. El-Banby, Hala S. El-Sayed, Fathi E. Abd El-Samie, and Osama S. Faragallah. 2022. "Efficient Generation of Cancelable Face Templates Based on Quantum Image Hilbert Permutation" Electronics 11, no. 7: 1040. https://doi.org/10.3390/electronics11071040

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop