Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

An efficient security system based on cancelable face recognition with blockchain over cognitive IoT

Published: 02 May 2023 Publication History

Abstract

This paper presents a new authentication framework for cancelable face recognition biometrics. In recent years, biometric plays a pivotal role in Cognitive Internet of Things (C-IoT) security. The face trait solves a lot of security issues; it increases the resistance of these systems against severe authentication attacks especially in smart IoT-based applications. The proposed scheme runs in two phases; The first phase (enrollment), in which the face image of the person is hashed using SHA256, is passed to an algorithm to extract the main features. Then the image is decomposed using a wavelet transform algorithm. Wavelet transform is applied to hide the face details from the image. This step is done to protect the image against being stolen or modified by external hackers. The image, hash, and wavelet transform are passed through the raspberry Pi to be stored in a database. A block is added to the private blockchain with these files. In the second phase (authentication) the test image is hashed, passed to the system to extract the features, and compared with the stored images in the database. Then the decision is stored in a new block in the chain, whether the two images are identical or not. The simulation results based demonstrate that the proposed cancelable biometric system gives a very reliable and secure performance for securing the IoT applications.

References

[1]
Abdellatef E et al. Cancelable fusion-based face recognition Multimed Tools Appl 2019 78 22 31557-31580
[2]
Ashiba HI Proposed framework for cancelable face recognition system Multimed Tools Appl 2021 80 9 13677-13705
[3]
Ashiba HI and Abd El-Samie FE Implementation face based cancelable multi-biometric system Multimed Tools Appl 2020 79 41 30813-30838
[4]
Atlam HF et al. Internet of things forensics: a review Internet Things 2020 11 100220
[5]
Danko D, Mercan S, Cebe M, Akkaya K (2019) Assuring the integrity of videos from wireless-based IoT devices using blockchain. In: 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW), Nov, pp 48–52
[6]
Dirgantoro KP, Lee JM, Kim DS (2020) Generative adversarial networks based on edge computing with blockchain architecture for security system. In: 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). IEEE, pp 039–042‏
[7]
El-Din HE, Manjaiah DH (2017) Internet of things in cloud computing. Internet of things: novel advances and envisioned applications, pp 299–311
[8]
El-Din HE, Manjaiah DH (2017) Internet of nano things and industrial internet of things. Internet of things: novel advances and envisioned applications. Springer, Cham, pp 109–123
[9]
El-Shafai W, Hemdan EE-D (2021) Robust and efficient multi-level security framework for color medical images in telehealthcare services. J Ambient Intell Humaniz Comput:1–16
[10]
Gao J et al. A wavelet transform-based image segmentation method Optik 2020 208 164123
[11]
Hemdan EE-D, Manjaiah DH (2020) Digital investigation of cybercrimes based on big data analytics using deep learning. Deep learning and neural networks: concepts, methodologies, tools, and applications. IGI Global, pp 615–632
[12]
Hu J et al. Detecting compressed deepfake videos in social networks using frame-temporality two-stream convolutional network. IEEE Trans Circuits Syst Video Technol 2021 32 1089-1102
[13]
Ibrahim S et al (2020) Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimed Tools Appl:1–26
[14]
‏Kak SF, Mustafa FM (2019) Smart home management system based on face recognition index in real-time. In: 2019 International Conference on Advanced Science and Engineering (ICOASE). IEEE, pp 40–45‏
[15]
Kamal R, Hemdan EE-D, El-Fishway N (2021) Video integrity verification based on blockchain. 2021 International Conference on Electronic Engineering (ICEEM). IEEE
[16]
Khan PW, Byun Y-C, and Park N A data verification system for CCTV surveillance cameras using blockchain technology in smart cities Electronics 2020 9 3 484
[17]
Kortli Y, Jridi M, Al Falou A, and Atri M Face recognition systems: a survey Sensors 2020 20 2 342
[18]
Kumar N Cancelable biometrics: a comprehensive survey Artif Intell Rev 2020 53 5 3403-3446
[19]
Li X, Jiang P, Chen T, Luo X, and Wen Q A survey on the security of blockchain systems Futur Gener Comput Syst 2020 107 841-853
[20]
Liao X, Wen Q, and Zhang J A novel steganographic method with four-pixel differencing and exploiting modification direction IEICE Trans Fundam Electron Commun Comput Sci 2012 95 7 1189-1192
[21]
Liao X et al. Robust detection of image operator chain with two-stream convolutional neural network IEEE J Sel Top Signal Process 2020 14 5 955-968
[22]
Mercan Suat et al. Blockchain-based video forensics and integrity verification framework for wireless Internet-of-Things devices Secur Privacy 2021 4 2 e143
[23]
Michelin RA, Ahmed N, Kanhere SS, Seneviratne A, Jha S (2020) Leveraging lightweight blockchain to establish data integrity for surveillance cameras. In: 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, pp 1–3‏
[24]
Munir A, Ehsan SK, Raza SM, Mudassir M (2019) Face and speech recognition based smart home. In: 2019 International Conference on Engineering and Emerging Technologies (ICEET). IEEE, pp 1–5‏
[25]
Raspberry Pi Foundation (2020) Raspberry Pi 2. Available at https://www.raspberrypi.org/products/raspberry-pi-2-model-b/. Accessed July 2021
[26]
Shalaby AS et al (2021) An efficient CNN based encrypted Iris recognition approach in cognitive-IoT system. Multimed Tools Appl:1–24
[27]
Shankar S, Madarkar J, Sharma P (2020) Securing face recognition system using blockchain technology. In: International conference on machine learning, image processing, network security and data sciences. Springer, Singapore, pp 449–460
[28]
Shetty AB, Bhoomika D, Rebeiro J, and Ramyashree Facial recognition using Haar cascade and LBP classifiers Global Trans Proc 2021 2 330-335
[29]
Surve M, Joshi P, Jamadar S, and Vharkate M Automatic attendance system using face recognition technique Int J Recent Technol Eng (IJRTE) IEEE 2020 9 1 2134-2138
[30]
Tseng L, Yao X, Otoum S, Aloqaily M, and Jararweh Y Blockchain-based database in an IoT environment: challenges, opportunities, and analysis Clust Comput 2020 23 3 2151-2165
[31]
Wang S, Deng G, and Hu J A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations Proc Pattern Recognit 2017 61 447-458
[32]
Wang Q, Huang J, Wang S, Chen Y, Zhang P, He L (2020) A comparative study of blockchain consensus algorithms. In: Journal of physics: conference series, vol 1437, no 1. IOP Publishing, pp 012007‏
[33]
Yang W, Wang S, Hu J, Zheng G, and Valli C A fingerprint and finger-vein based cancelable multibiometric system Pattern Recognit 2018 78 242-251
[34]
Zakaria Y et al. Cancelable multi-biometric security system based on double random phase encoding and cepstral analysis Multimed Tools Appl 2019 78 22 32333-32355

Index Terms

  1. An efficient security system based on cancelable face recognition with blockchain over cognitive IoT
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Multimedia Tools and Applications
    Multimedia Tools and Applications  Volume 82, Issue 29
    Dec 2023
    1553 pages

    Publisher

    Kluwer Academic Publishers

    United States

    Publication History

    Published: 02 May 2023
    Accepted: 19 April 2023
    Revision received: 28 December 2021
    Received: 26 August 2021

    Author Tags

    1. Blockchain
    2. Cancelable biometrics
    3. Image authentication
    4. Machine learning
    5. Face recognition

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 26 Jan 2025

    Other Metrics

    Citations

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media