Timing for securing the biometric template transformation based on supervised learning using Double Random Phase Encoding Method
DOI:
https://doi.org/10.4108/eetismla.8773Keywords:
Biometric Security, supervised learning, Double Random Phase Encoding, Biometric templatesAbstract
Background: Among optical encryption techniques, Double Random Phase Encoding (DRPE) is one of the most widely used. Individual identities and the process of recognition remain essential to ensuring proper data access security.
Aim: The study aims to optimize an approach that ensures the significant performance effectiveness of the cancelable biometric methods for different templates and the associated time taken to transform biometric data.
Problem: This study is majorly concerned about the performance effectiveness of cancelable biometric methods that measure the likelihood that an authorized effort may be mistakenly rejected as unauthorized. Also, when compromised, several non-renewability safety challenges arise, and insufficient matching performance templates are required to build a security protection method.
Method and material. The study uses supervised learning for the Double Random Phase Encoding Method (DRPE), a 4F optical encryption system, and 20 randomly chosen photos from the ORL database of faces.
Results. The result based on the supervised learning for the Double Random Phase Encoding Method revealed false positive rates for both the fingerprint and face templates.
Conclusion. The study concluded that the performance effectiveness of the cancelable biometric in this study has a false positive rate likelihood that an authorized effort may not be mistakenly rejected as an unauthorized one.
Downloads
References
[1] Basma Abd El-Rahiem, Fathi E Abd El Samie, and Mohamed Amin. Efficient cancellable multi-biometric recognition system based on deep learning and bio-hashing. Applied Intelligence, 53(2):1792–1806, 2023.
[2] Essam Abdellatef, Nabil A Ismail, Salah Eldin SE Abd Elrahman, Khalid N Ismail, Mohamed Rihan, and Fathi E Abd El-Samie. Cancelable multi-biometric recognition system based on deep learning. The Visual Computer, 36:1097–1109, 2020.
[3] Aysajan Abidin, Abdelrahaman Aly, Enrique Argones Rúa, and Aikaterini Mitrokotsa. Efficient verifiable computation of xor for biometric authentication. In Cryptology and Network Security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings 15, pages 284–298. Springer, 2016.
[4] Christopher Andrade and Sebastian H von Solms. Investigating and comparing multimodal biometric techniques. In Policies and Research in Identity Management: First IFIP WG11. 6 Working Conference on Policies and Research in Identity Management (IDMAN’07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007, pages 79–90. Springer, 2008.
[5] Robert J Baron. Mechanisms of human facial recognition. International Journal of Man-Machine Studies, 15(2):137–178, 1981.
[6] Jiazhen Cai, Xuan Chu, Kun Xu, Hongbo Li, and Jing Wei. Machine learning-driven new material discovery. Nanoscale Advances, 2(8):3115–3130, 2020.
[7] ZX Chu, Q Ma, YX Lin, XL Tang, YQ Zhou, SW Zhu, J Fan, and BJ Cheng. Genome-wide identification, classification, and analysis of two-component signal system genes in maize. Genet Mol Res, 10(4):3316–3330, 2011.
[8] Richard Clodfelter. Biometric technology in retailing: Will consumers accept fingerprint authentication? Journal of Retailing and Consumer Services, 17(3):181–188, 2010.
[9] Basma Abd El-Rahiem, Mohamed Amin, Ahmed Sedik, Fathi E Abd El Samie, and Abdullah M Iliyasu. An efficient multi-biometric cancellable biometric scheme based on deep fusion and deep dream. Journal of Ambient Intelligence and Humanized Computing, pages 1–13, 2022.
[10] Samer Eldesouky, Walid El-Shafai, Hossam El din H Ahmed, and Fathi E Abd El-Samie. Cancelable electrocardiogram biometric system based on chaotic encryption using three-dimensional logistic map for biometric-based cloud services. Security and Privacy, 5(2):e198, 2022.
[11] Yann Frauel, Albertina Castro, Thomas J Naughton, and Bahram Javidi. Resistance of the double random phase encryption against various attacks. Optics Express, 15(16):10253–10265, 2007.
[12] Pramod D Ganjewar, Sanjeev J Wagh, and Aarti L Gilbile. Privacy threat reduction using modified multi-line code generation algorithm (mmlcga) for cancelable biometric technique (cbt). In International Conference on Intelligent Cyber Physical Systems and Internet of Things, pages 275–289. Springer, 2022.
[13] D Harikrishnan, N Sunil Kumar, Shelbi Joseph, and Kishor Krishnan Nair. Towards a fast and secure fingerprint authentication system based on a novel encoding scheme. International Journal of Electrical Engineering & Education, 61(1):100–112, 2024.
[14] Sin-Ye Jhong, Po-Yen Tseng, Natnuntnita Siriphockpirom, Chih-Hsien Hsia, Ming-Shih Huang, Kai-Lung Hua, and Yung-Yao Chen. An automated biometric identification system using cnn-based palm vein recognition. In 2020 international conference on advanced robotics and intelligent systems (ARIS), pages 1–6. IEEE, 2020.
[15] Harkeerat Kaur and Pritee Khanna. Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimedia Tools and Applications, 75:16333–16361, 2016.
[16] Jihyeon Kim, Yoon Gyo Jung, and Andrew Beng Jin Teoh. Multimodal biometric template protection based on a cancelable softmaxout fusion network. Applied Sciences, 12(4):2023, 2022.
[17] Won Kim. Cloud computing: Today and tomorrow. J. Object Technol., 8(1):65–72, 2009.
[18] Ayoub Lahmidi, Chouaib Moujahdi, Khalid Minaoui, and Mohammed Rziza. On the methodology of fingerprint template protection schemes conception: meditations on the reliability. EURASIP Journal on Information Security, 2022(1):3, 2022.
[19] Mohammad Saeid Mahdavinejad, Mohammadreza Rezvan, Mohammadamin Barekatain, Peyman Adibi, Payam Barnaghi, and Amit P Sheth. Machine learning for internet of things data analysis: A survey. Digital Communications and Networks, 4(3):161–175, 2018.
[20] Davide Maltoni, Dario Maio, Anil K Jain, Salil Prabhakar, et al. Handbook of fingerprint recognition, volume 2. Springer, 2009.
[21] Kennedy Okokpujie, Etinosa Noma-Osaghae, Samuel John, and Rhema Oputa. Development of a facial recognition system with email identification message relay mechanism. In 2017 international conference on computing networking and informatics (ICCNI), pages 1–6. IEEE, 2017.
[22] Xiang Peng, Peng Zhang, Hengzheng Wei, and Bin Yu. Known-plaintext attack on optical encryption based on double random phase keys. optics letters, 31(8):1044–1046, 2006.
[23] Pablo Piccolotto and Patricio Maller. Biometrics from the user point of view: Deriving design principles from user perceptions and concerns about biometric systems. Intel Technology Journal, 18(4), 2014.
[24] NS Raghava et al. Iris recognition on hadoop: A biometrics system implementation on cloud computing. In 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pages 482–485. IEEE, 2011.
[25] Javier Ramirez De La Pinta, José María Maestre Torreblanca, Isabel Jurado, and Sergio Reyes De Cozar. Off the shelf cloud robotics for the smart home: Empowering a wireless robot through cloud computing. Sensors, 17(3):525, 2017.
[26] Nalini K Ratha, Sharat Chikkerur, Jonathan H Connell, and Ruud M Bolle. Generating cancelable fingerprint templates. IEEE Transactions on pattern analysis and machine intelligence, 29(4):561–572, 2007.
[27] Christian Rathgeb and Andreas Uhl. A survey on biometric cryptosystems and cancelable biometrics. EURASIP journal on information security, 2011:1–25, 2011.
[28] Philippe Refregier and Bahram Javidi. Optical image encryption based on input plane and fourier plane random encoding. Optics letters, 20(7):767–769, 1995.
[29] Mulagala Sandhya, Mahesh Kumar Morampudi, Indragante Pruthweraaj, and Pranay Sai Garepally. Multi-instance cancelable iris authentication system using triplet loss for deep learning models. The Visual Computer, 39(4):1571–1581, 2023.
[30] Avantika Singh, Gaurav Jaswal, and Aditya Nigam. Cancelable biometrics for template protection: future directives with deep learning. In AI and Deep Learning in Biometric Security, pages 23–49. CRC Press, 2021.
[31] Avantika Singh, Chirag Vashist, Pratyush Gaurav, and Aditya Nigam. A generic framework for deep incremental cancelable template generation. Neurocomputing, 467:83–98, 2022.
[32] Krishnaraj Madhavjee Sunjiv Soyjaudah, Gianeswar Ramsawock, and Muhammad Yaasir Khodabacchus. Cloud computing authentication using cancellable biometrics. In 2013 Africon, pages 1–4. IEEE, 2013.
[33] Tanuja Sudhakar and Marina Gavrilova. Cancelable biometrics using deep learning as a cloud service. IEEE Access, 8:112932–112943, 2020.
[34] Veeru Talreja, Matthew C Valenti, and Nasser M Nasrabadi. Multibiometric secure system based on deep learning. In 2017 IEEE Global conference on signal and information processing (globalSIP), pages 298–302. IEEE, 2017.
[35] Min Wang, Song Wang, and Jiankun Hu. Cancellable template design for privacy-preserving eeg biometric authentication systems. IEEE Transactions on Information Forensics and Security, 17:3350–3364, 2022.
[36] Sarah Webb et al. Deep learning for biology. Nature, 554(7693):555–557, 2018.
[37] Kaijun Yi, Qianzhong Deng, Baoguo Yuan, Xiuxia Qu, Junxiong Gao, and Tomas Fernandes. Iris recognition and data storage on cloud. In 2018 Asia-Pacific Magnetic Recording Conference (APMRC), pages 1–3. IEEE, 2018.
[38] Hua-Hong Zhu, Qian-Hua He, Hong Tang, and Wei-Hua Cao. Voiceprint-biometric template design and authentication based on cloud computing security. In 2011 International Conference on Cloud and Service Computing, pages 302–308. IEEE, 2011.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Mahmoud Nasr, Pascal Muam Mah

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.