An Irreversible and Revocable Template Generation Scheme Based on Chaotic System
Abstract
:1. Introduction
- Irreversibility: The original face feature information cannot be derived from templates, or it is very difficult to calculate, so as to ensure that templates cannot be used for any purpose other than the original expectation.
- Revocability: Once the template is leaked, it can easily generate a new protected template. The leaked template has no utility in the newly generated template.
- Diversity/Unlinkability: Different templates can be generated for different applications based on the same biometric data of user. These different templates are not allowed to cross match between applications.
- Performance preservation: By using the template protection scheme, the original biometric information may have some loss, which will affect the accuracy of recognition. The template protection scheme should ensure accuracy.
- The chaotic system is applied to the template protection, which enhances the revocability and diversity of the scheme.
- The orthogonal matrix is used to transform the feature vector, which minimizes the impact of the generation process on the performance of the template.
- Convert the cosine values of the feature vector and the random vectors into integers to generate template, making the scheme irreversible.
- Experiments on different datasets and theoretical analyses prove that the scheme is safe and efficient.
2. Related Work
3. Proposed Approach
3.1. Template Generation Scheme
- Step 1. Extract the feature vectors of the face image.
- Step 2. Generate chaotic sequences.
- Step 3. Permute the feature vector.
- Step 4. Generate random matrix.
- Step 5. Generate orthogonal matrix.
- Step 6. Transform the vector.
- Step 7. Generate random matrix.
- Step 8. Generate the template.
3.2. Some Advantages of the Scheme
- First, the chaotic system is used to drive the template generation process, which increases the revocable and diversity of the scheme. Taking advantage of the sensitivity of chaotic system to parameters, any slight modification of the key will produce completely different templates, making the templates generated by the scheme more diversified. When the template is leaked, different templates can be generated by changing the key, and the original template will be invalidated to ensure that the scheme has good revocability.
- Secondly, the orthogonal matrix is used to transform the vector value to ensure that the intermediate change process does not affect the verification performance. The orthogonal matrix is used for random projection of the feature vector, which can ensure that the transformed feature vectors have the distance preservation property, and the transformed feature vectors will not affect the verification performance. In addition, the orthogonal matrix is generated based on chaotic sequence, which not only has good generation efficiency, but also has good diversity.
- Finally, the cosine value of the included angle between the feature vector and the random vector is converted into integer data, which not only ensures the verification performance, but also makes the scheme irreversible. Calculating the cosine value of the angle between the feature vector and the column vector of the random matrix can accurately describe the relationship of the feature vector in the space formed by the random matrix. Although there is some information loss in converting the included angle cosine value into integer data, this defect can be remedied by combining the conversion of multiple included angle cosine values to ensure the verification performance. Moreover, the cosine value of the included angle does not have one-to-one correspondence with the integer data, which makes the scheme irreversible.
4. Experimental and Analysis
4.1. Experiment Setting
4.2. Performance Verification
4.3. Privacy Analysis
4.3.1. Irreversibility Analysis
4.3.2. Revocability Analysis
- Genuine: For the same person, use different image to query in the template database.
- Mated imposter: For the same person, calculate the difference between different template databases.
4.3.3. Unlinkability Analysis
4.4. Security Analysis
4.4.1. Key Space Analysis
4.4.2. Hill Climbing Attack Analysis
4.4.3. Lost Template and Lost Key Attack
4.4.4. Attacks via Record Multiplicity
4.5. Running Speed Analysis
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Statistical Test | p-Value | Proportion | Passed or Not |
---|---|---|---|
Frequency | 0.779188 | 49/50 | Yes |
Block Frequency | 0.816537 | 50/50 | Yes |
Runs | 0.419021 | 50/50 | Yes |
Longest Run | 0.616305 | 49/50 | Yes |
Rank | 0.983453 | 49/50 | Yes |
FFT | 0.739918 | 50/50 | Yes |
NonOverlapping Template | 0.883171 | 49/50 | Yes |
Overlapping Template | 0.816537 | 49/50 | Yes |
Universal | 0.455937 | 50/50 | Yes |
Linear Complexity | 0.383827 | 50/50 | Yes |
Serial | 0.383827 | 50/50 | Yes |
Approximate Entropy | 0.122325 | 49/50 | Yes |
Cumulative Sums | 0.779188 | 50/50 | Yes |
Random Excursions | 0.043745 | 30/30 | Yes |
Random Excursions Variant | 0.100508 | 30/30 | Yes |
References
- Ashiba, H.I.; Abd El-Samie, F.E. Implementation face based cancelable multi-biometric system. Multimed. Tools Appl. 2020, 79, 30813–30838. [Google Scholar]
- Kolberg, J.; Drozdowski, P.; Gomez-Barrero, M.; Rathgeb, C.; Busch, C. Efficiency analysis of post-quantum-secure face template protection schemes based on homomorphic encryption. In Proceedings of the 2020 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 16–18 September 2020; pp. 1–4. [Google Scholar]
- Manisha; Kumar, N. Cancelable Biometrics: A comprehensive survey. Artif. Intell. Rev. 2020, 53, 3403–3446. [Google Scholar]
- Rathgeb, C.; Uhl, A. A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Info. Secur. 2011, 2011, 1–25. [Google Scholar]
- Gomez-Barrero, M.; Rathgeb, C.; Galbally, J.; Busch, C.; Fierrez, J. Unlinkable and irreversible biometric template protection based on bloom filters. Inf. Sci. 2016, 370–371, 18–32. [Google Scholar]
- Ghammam, L.; Karabina, K.; Lacharme, P.; Thiry-Atighehchi, K.A. Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing. IEEE Trans. Inf. Forensic Secur. 2020, 15, 2869–2880. [Google Scholar]
- Gomez-Barrero, M.; Galbally, J.; Fierrez, J.; Ortega-Garcia, J. Face Verification Put to Test: A Hill-Climbing Attack Based on the Uphill-Simplex Algorithm. In Proceedings of the 2012 5th IAPR International Conference on Biometrics (ICB), New Delhi, India, 29 March–1 April 2012; pp. 40–45. [Google Scholar]
- Linli, W.; Fu, X. A Novel Approach for Synchronizing of Fractional Order Uncertain Chaotic Systems in the Presence of Unknown Time-Variant Delay and Disturbance. Inf. Technol. Control. 2022, 51, 221–234. [Google Scholar]
- SundaraKrishnan, K.; Jaison, B.; Raja, J.P. A Symmetric Key Multiple Color Image Cipher Based on Cellular Automata, Chaos Theory and Image Mixing. Inf. Technol. Control. 2021, 50, 55–75. [Google Scholar]
- Ramasamy, P.; Ranganathan, V.; Kadry, S.; Damaševičius, R.; Blažauskas, T. An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic—Tent Map. Entropy 2019, 21, 656. [Google Scholar]
- Gupta, K.; Walia, G.S.; Sharma, K. Novel approach for multimodal feature fusion to generate cancelable biometric. Vis. Comput. 2021, 37, 1401–1413. [Google Scholar]
- Kaur, H.; Khanna, P. Non-invertible Biometric Encryption to Generate Cancelable Biometric Templates. In Proceedings of the World Congress on Engineering and Computer Science, San Francisco, CA, USA, 25–27 October 2017; pp. 432–435. [Google Scholar]
- Ghouzali, S.; Nafea, O.; Wadood, A.; Hussain, M. Cancelable Multimodal Biometrics Based on Chaotic Maps. Appl. Sci. 2021, 11, 8573. [Google Scholar]
- Jin, Z.; Hwang, J.Y.; Lai, Y.-L.; Kim, S.; Teoh, A.B.J. Ranking Based Locality Sensitive Hashing Enabled Cancelable Biometrics: Index-of-Max Hashing. IEEE Trans. Inf. Forensic Secur. 2017, 13, 393–407. [Google Scholar]
- Dang, T.M.; Tran, L.; Nguyen, T.D.; Choi, D. FEHash: Full Entropy Hash for Face Template Protection. In Proceedings of the Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Seattle, WA, USA, 14–19 June 2020; pp. 3527–3536. [Google Scholar]
- Alwan, H.B.; Ku-Mahamud, K.R. Cancellable face template algorithm based on speeded-up robust features and winner-takes-all. Multimed. Tools Appl. 2020, 79, 28675–28693. [Google Scholar]
- Kang, J.; Nyang, D.; Lee, K. Two-factor face authentication using matrix permutation transformation and a user password. Inf. Sci. 2014, 269, 1–20. [Google Scholar]
- Nakamura, I.; Tonomura, Y.; Kiya, H. Unitary transform-based template protection and its properties. In Proceedings of the 23rd European Signal Processing Conference (EUSIPCO), Nice, France, 31 August–4 September 2015; pp. 2421–2425. [Google Scholar]
- Kumar, N.; Rawat, M. RP-LPP: A random permutation based locality preserving projection for cancelable biometric recognition. Multimed. Tools Appl. 2020, 79, 2363–2381. [Google Scholar]
- Manisha; Kumar, N. CBRC: A novel approach for cancelable biometric template generation using random permutation and Chinese Remainder Theorem. Multimed. Tools Appl. 2022, 81, 22027–22064. [Google Scholar]
- Roh, J.; Cho, S.; Jin, S. Learning based biometric key generation method using CNN and RNN. In Proceedings of the 10th International Conference on Information Technology and Electrical Engineering (ICITEE), Bali, Indonesia, 24–26 July 2018; pp. 136–139. [Google Scholar]
- Choi, D.; Seo, S.; Oh, Y.; Kang, Y. Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security. IEEE Internet Things J. 2019, 6, 335–348. [Google Scholar]
- Faragallah, O.S.; Naeem, E.A.; El-Shafai, W.; Ramadan, N.; Ahmed, H.E.-D.H.; Elnaby, M.M.A.; Elashry, I.; El-Khamy, S.E.; El-Samie, F.E.A. Efficient chaotic-Baker-map-based cancelable face recognition. J. Ambient Intell. Human Comput. 2021. published online. [Google Scholar] [CrossRef]
- Dong, X.; Kim, S.; Jin, Z.; Hwang, J.Y.; Cho, S.; Teoh, A.B.J. Secure chaff-less fuzzy vault for face identification systems. ACM Trans. Multimed. Comput. Commun. Appl. 2021, 17, 1–22. [Google Scholar]
- Nazari, S.; Moin, M.S.; Kanan, H.R. Securing templates in a face recognition system using Error-Correcting Output Code and chaos theory. Comput. Electr. Eng. 2018, 72, 644–659. [Google Scholar]
- Abou Elazm, L.A.; Ibrahim, S.; Egila, M.G.; Shawky, H.; Elsaid, M.K.; El-Shafai, W.; Abd El-Samie, F.E. Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimed. Tools Appl. 2020, 79, 14053–14078. [Google Scholar]
- Feng, Y.C.; Meng, H.; Yuen, P.C. Masquerade attack on transform-based binary-template protection based on perceptron learning. Pattern Recognit. 2014, 47, 3019–3033. [Google Scholar]
- Liu, Y.; Jourabloo, A.; Liu, X. Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Salt Lake City, UT, USA, 18–23 June 2018; pp. 389–398. [Google Scholar]
- Mignon, A.; Jurie, F. Reconstructing faces from their signatures using RBF regression. In Proceedings of the British Machine Vision Conference 2013, Bristol, UK, 9–13 September 2013; pp. 103.1–103.12. [Google Scholar]
- Liu, J.; Wang, Y.; Liu, Z.; Zhu, H. A chaotic image encryption algorithm based on coupled piecewise sine map and sensitive diffusion structure. Nonlinear Dyn. 2021, 104, 4615–4633. [Google Scholar]
- King, D.E. Dlib-ml: A machine learning toolkit. J. Mach. Learn. Res. 2009, 10, 1755–1758. [Google Scholar]
- Langner, O.; Dotsch, R.; Bijlstra, G.; Wigboldus, D.H.J.; Hawk, S.T.; van Knippenberg, A. Presentation and validation of the Radboud Faces Database. Cogn. Emot. 2010, 24, 1377–1388. [Google Scholar]
- Aberdeen Face Dataset. Available online: http://pics.stir.ac.uk/2D_face_sets.htm (accessed on 16 January 2023).
- Xu, Z.; Shao, Z.; Shang, Y.; Li, B.; Ding, H.; Liu, T. Fusing structure and color features for cancelable face recognition. Multimed. Tools Appl. 2021, 80, 14477–14494. [Google Scholar]
- Bi, Y.; Xue, B.; Zhang, M. Multi-objective genetic programming for feature learning in face recognition. Appl. Soft Comput. 2021, 103, 107152. [Google Scholar]
- Deng, H.; Feng, Z.; Liu, Y.; Luo, D.; Yang, X.; Li, H. Face Recognition Algorithm Based on Weighted Intensity PCNN. In Proceedings of the 2020 Eighth International Conference on Advanced Cloud and Big Data (CBD), Taiyuan, China, 5–6 December 2020; pp. 207–212. [Google Scholar]
- IEEE Std 754-2008; IEEE Standard for Floating-Point Arithmetic. IEEE: Washington, DC, USA, 2008; pp. 1–70.
- Maiorana, E.; Hine, G.E.; Campisi, P. Hill-Climbing Attacks on Multi-Biometrics Recognition Systems. IEEE Trans. Inf. Forensic Secur. 2015, 10, 900–915. [Google Scholar]
Performance Metric | Equation |
---|---|
Accuracy | |
Specificity | |
Precision | |
Recall | |
Fscore |
Dataset | Accuracy (%) | Specificity (%) | Precision (%) | Recall (%) | Fscore (%) |
---|---|---|---|---|---|
RaFD | 99.40 | 99.45 | 99.44 | 99.35 | 99.40 |
Aberdeen | 99.63 | 99.55 | 99.55 | 99.70 | 99.63 |
Method | Dataset | Accuracy (%) |
---|---|---|
Gradient RP-Q2DPCA [34] | Aberdeen | 97.70 |
SPGPFL [35] | Aberdeen | 97.30 |
Weighted Intensity PCNN [36] | Aberdeen | 96.00 |
Proposed | Aberdeen | 99.63 |
Feature Vector Extraction | Query Template Generation | Comparison |
---|---|---|
73.58 | 32.61 | 20.29 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Liu, J.; Wang, Y.; Wang, K.; Liu, Z. An Irreversible and Revocable Template Generation Scheme Based on Chaotic System. Entropy 2023, 25, 378. https://doi.org/10.3390/e25020378
Liu J, Wang Y, Wang K, Liu Z. An Irreversible and Revocable Template Generation Scheme Based on Chaotic System. Entropy. 2023; 25(2):378. https://doi.org/10.3390/e25020378
Chicago/Turabian StyleLiu, Jinyuan, Yong Wang, Kun Wang, and Zhuo Liu. 2023. "An Irreversible and Revocable Template Generation Scheme Based on Chaotic System" Entropy 25, no. 2: 378. https://doi.org/10.3390/e25020378