Figure - available from: The Journal of Supercomputing
This content is subject to copyright. Terms and conditions apply.
An example of the minutiae pair

An example of the minutiae pair

Source publication
Article
Full-text available
Physical access control is an indispensable component of a critical infrastructure. Traditional password-based methods for access control used in the critical infrastructure security systems have limitations. With the advance of new biometric recognition technologies, security control for critical infrastructures can be improved by the use of biome...

Similar publications

Article
Full-text available
Given the current confirmed permafrost degradation and its considerable impacts on ecosystems, water resources, infrastructure and climate, there is great interest in understanding the causes of permafrost degradation. Using the surface frost index (SFI) model and multimodel data from the fifth phase of the Coupled Model intercomparison Project (CM...

Citations

... An important parameter in analyzing ciphered biometrics is visual inspection in which hidden features represent high cancelability benefits and good ciphering performance. Therefore, the strength of the cancellable biometric system is evaluated with different metrics such as Receiver Operating Characteristic (ROC), False Positive Fraction (FPF), True Positive Fraction (TPF), Probability of False Distribution (PFD), and Probability of True Distribution (PTD) [52][53][54][55][56][57][58][59][60][61][62]. In addition, the correlation scores between biometric templates are also employed. ...
... These achieved scores prove that the suggested ciphering scheme can secure the stored speech signal compared to other related ciphering schemes [44]. Encryption stage output using DRPE scheme [44] Encryption stage output using FrFT + Jigsaw scheme (Proposed) [34,44,51,[57][58][59][60][61][62], as shown in Tab. 3. These acquired outcomes prove the cancelability efficiency and high ciphering performance of the proposed scheme compared to other conventional schemes. ...
... These acquired outcomes prove the cancelability efficiency and high ciphering performance of the proposed scheme compared to other conventional schemes. [51] 0.0224 0.0607 0.0447 0.9744 [34] 0.0215 0.0305 0.0424 0.9864 [57] 0.0219 0.0946 0.2983 0.8920 [58] 0.0862 0.0359 0.0129 0.9274 [59] 0.0622 0.0741 0.0667 0.9343 [60] 0.0436 0.0632 0.0279 0.9592 [61] 0.0351 0.0497 0.2836 0.9583 [62] 0.0096 0.0263 0.0192 0.9673 ...
Article
Full-text available
Most current security and authentication systems are based on personal biometrics. The security problem is a major issue in the field of biometric systems. This is due to the use in databases of the original biometrics. Then biometrics will forever be lost if these databases are attacked. Protecting privacy is the most important goal of cancelable biometrics. In order to protect privacy, therefore, cancelable biometrics should be non-invertible in such a way that no information can be inverted from the cancelable biometric templates stored in personal identification/verification databases. One methodology to achieve non-invertibility is the employment of non-invertible transforms. This work suggests an encryption process for cancellable speaker identification using a hybrid encryption system. This system includes the 3D Jigsaw transforms and Fractional Fourier Transform (FrFT). The proposed scheme is compared with the optical Double Random Phase Encoding (DRPE) encryption process. The evaluation of simulation results of cancellable biometrics shows that the algorithm proposed is secure, authoritative, and feasible. The encryption and cancelability effects are good and reveal good performance. Also, it introduces recommended security and robustness levels for its utilization for achieving efficient cancellable biometrics systems.
... In Ref. [27], slantlet transform singular values (SLT-SVs) were used to conceal the features extracted from the fingerprint and iris images into the host image, which is the face image. Fingerprint with face images were used in Ref. [28] to generate the cancelable templates. Cascaded biometric encryption was first introduced with its core and disposable layers. ...
... According to Table 4, the proposed sys- Table 4 Evaluation metric values in the time domain for the proposed system and different cancelable biometric systems in Refs. [18-21, 23, 26, 28] Cancelable biometric system EER FAR Ref. [28] 0.1157 tem outperforms the state-of-the-art algorithms [18-21, 23, 26, 28]. ...
Article
Full-text available
Due to the development of hacking programs, it has become easy to penetrate systems. Hence, there is a need for strong security mechanisms. The use of traditional passwords has become insufficient to secure systems. Biometric authentication is now widely used for security applications, and it has proven to be superior compared to traditional authentication methods. However, two issues need to be considered in biometric systems. The first is not to keep biometric data in its original form in the database. If biometric traits are hacked, they will no longer be of use. Biometric data should be kept in cancelable forms for reuse. The second issue is the reliance on a single biometric, which limits the verification accuracy. This can be solved by using a multimodal biometric system. Using steganography and cryptography, this paper introduces a cancelable multimodal biometric system. As voiceprints, facial images, and fingerprint images are used. In this paper, the verification is performed through the Mel frequency cepstral coefficients (MFCCs) of the voiceprints. Steganography is used as a tool to secure features extracted from voiceprints by embedding them into the facial image using block-based singular value decomposition (BSVD). Double random phase encoding (DRPE) is utilized as an encryption algorithm to generate the final cancelable templates. To increase the level of system security, fingerprint images are used as random phase masks (RPMs). Verification is performed by estimating the correlation between registered and test MFCCs. The correlation value is then compared with a threshold value, which is calculated using the distribution curves for the genuine and imposter correlations. Equal error rate (EER) values close to zero and an area under the receiver operator characteristic curve (AROC) that is close to one are obtained from the simulation results, demonstrating the outstanding performance of the suggested system. The proposed system achieves good performance in different domains.
... The fingerprint and iris images are analyzed independently before embedding them in the host face image using Slantlet Transform with Singular Values (SLT-SVs). Yang et al. [25] worked on the critical infrastructure access control system. The biometrics used include fingerprints and face images. ...
... x 25 x 17 ...
Article
Full-text available
The security issue is essential in the Internet-of-Things (IoT) environment. Biometrics play an important role in securing the emerging IoT devices, especially IoT robots. Biometric identification is an interesting candidate to improve IoT usability and security. To access and control sensitive environments like IoT, passwords are not recommended for high security levels. Biometrics can be used instead, but more protection is needed to store original biometrics away from invaders. This paper presents a cancelable multimodal biometric recognition system based on encryption algorithms and watermarking. Both voice-print and facial images are used as individual biometrics. Double Random Phase Encoding (DRPE) and chaotic Baker map are utilized as encryption algorithms. Verification is performed by estimating the correlation between registered and tested models in their cancelable format. Simulation results give Equal Error Rate (EER) values close to zero and Area under the Receiver Operator Characteristic Curve (AROC) equal to one, which indicates the high performance of the proposed system in addition to the difficulty to invert cancelable templates. Moreover, reusability and diversity of biometric templates is guaranteed.
... Yang et al. [10] worked on an access control system for a critical infrastructure. Fingerprint and face images are the considered biometrics. ...
... Tab. 2 gives the average EER values for the proposed algorithm compared to those of the algorithms given in Refs. [8,10,11,16,19]. It is clear from the table that the proposed algorithm gives low EER values, which means a good performance. ...
Article
Full-text available
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades. It achieves safe access to systems using biometrics instead of the traditional passwords. The utilization of a biometric in its original format makes it usable only once. Therefore, a cancelable biometric template should be used, so that it can be replaced when it is attacked. Cancelable biometrics aims to enhance the security and privacy of biometric authentication. Digital encryption is an efficient technique to be used in order to generate cancelable biometric templates. In this paper, a highly-secure encryption algorithm is proposed to ensure secure biometric data in verification systems. The considered biometric in this paper is the speech signal. The speech signal is transformed into its spectrogram. Then, the spectrogram is encrypted using two cascaded optical encryption algorithms. The first algorithm is the Optical Scanning Holography (OSH) for its efficiency as an encryption tool. The OSH encrypted spectrogram is encrypted using Double Random Phase Encoding (DRPE) by implementing two Random Phase Masks (RPMs). After the two cascaded optical encryption algorithms, the cancelable template is obtained. The verification is implemented through correlation estimation between enrolled and test templates in their encrypted format. If the correlation value is larger than a threshold value, the user is authorized. The threshold value can be determined from the genuine and imposter correlation distribution curves as the midpoint between the two curves. The implementation of optical encryption is adopted using its software rather than the optical setup. The efficiency of the proposed cancelable biometric algorithm is illustrated by the simulation results. It can improve the biometric data security without deteriorating the recognition accuracy. Simulation results give close-to-zero values for the Equal Error Rate (EER) and close-to-one values for the Area under Receiver Operator Characteristic (AROC) curve.
... The security mechanism of this scheme is realized using the ROM and is shown to be able to defeat various known attacks. 4) Biometric-based Authentication: Biometrics [38] are biological measurements related to physiological and behavioral characteristics (e.g., face [39], fingerprint [40] and iris [41]), which can be used in access control and identity management. ...
Article
Full-text available
The Internet of Drones (IoD) has attracted increasing attention in recent years because of its portability and automation, and is being deployed in a wide range of fields (e.g., military, rescue and entertainment). Nevertheless, as a result of the inherently open nature of radio transmission paths in the IoD, data collected, generated or handled by drones is plagued by many security concerns. Since security and privacy are among the foremost challenges for the IoD, in this paper we conduct a comprehensive review on security issues and solutions for IoD security, discussing IoD-related security requirements and identifying the latest advancement in IoD security research. This review analyzes a host of important security technologies with emphases on authentication techniques and blockchain-powered schemes. Based on a detailed analysis, we present the challenges faced by current methodologies and recommend future IoD security research directions. This review shows that appropriate security measures are needed to address IoD security issues, and that newly designed security solutions should particularly consider the balance between the level of security and cost efficiency.
... Biometric multimedia data are collected from an individual's physical or behavioural traits in biometric applications such as face and/or fingerprint recognition (Yang et al., 2018a). While biometrics has innate strengths compared to traditional personal recognition technologies (e.g., passwords), it is vital to ensure the security and integrity of biometric multimedia data. ...
... Biometric multimedia data are collected from an individual's physical or behavioural traits in biometric applications such as face and/or fingerprint recognition (Yang et al., 2018a). While biometrics has innate strengths compared to traditional personal recognition technologies (e.g., passwords), it is vital to ensure the security and integrity of biometric multimedia data. ...
... Minutiae-Pair (MP): MP is a stable local structure proposed in our previous work Wang and Hu, (2012) , Yang et al. (2018c) . Here, a brief introduction to the minutiae-pair structure is given in the following and readers can refer to Wang and Hu, (2012) and Yang et al. (2018c) for details. ...
... Minutiae-Pair (MP): MP is a stable local structure proposed in our previous work Wang and Hu, (2012) , Yang et al. (2018c) . Here, a brief introduction to the minutiae-pair structure is given in the following and readers can refer to Wang and Hu, (2012) and Yang et al. (2018c) for details. ...
... Each of the C 2 n binary feature vectors is converted into its corresponding integer value, e.g., I i j , which is in the range from 0 to 2 n P − 1 . By performing a modulo operation same as that in Yang et al. (2018c) , this integer value, e.g., I i j , is mapped to one cell in a zero vector b mp with l b cells. If the index of a cell is equal to the integer value I i j , the value of that cell of b mp is changed from 0 to 1. ...
Article
Authentication is a critical requirement of many systems, in domains such as law enforcement, financial services and consumer devices. Due to poor user practices, especially regarding passwords, biometric technologies have been presented as a viable solution, and have been constantly evolving to meet this requirement. It is important to consider the security aspects of any proposed biometric authentication system, as threats targeting biometric template data are serious. Given that the original biometric data are not revocable, if compromised, they are lost (or tainted) forever. To prevent biometric template data from being compromised by attackers, we propose a new linear convolution-based cancelable fingerprint authentication system. In the proposed system, instead of using the original feature data themselves as the inputs to the linear convolution function, the second input is replaced by a help vector, which guarantees that errors from one part of the template data do not impact other parts. Moreover, to ensure the safety of the help vector chosen from a help vector pool in the lost-key scenario, a feature-guided index generation algorithm is developed. The experimental results show that the proposed system achieves satisfactory recognition accuracy, while providing strong protection to fingerprint template data.
... Unlike traditional password-and token-based authentication, biometric authentication uses features from human biometric traits (e.g., fingerprint, face, and iris) for authentication purposes. A biometric trait is unique to its owner; thus, it cannot be shared or stolen, an attribute passwords and tokens do not have [73]. Moreover, biometrics have the property of nonrepudiation. ...
Article
Full-text available
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
... Various transformation schemes could be employed on the identical biometric pattern for various functions and applications to counteract the cross-correlation along with accumulated templates in several biometric databases. More transformations and mathematical operations can be utilized for the cancelable biometric applications [14][15][16][17][18][19][20][21]. Some of them are employed to combine two or more template protection techniques to build a single biometric cryptosystem. ...
... The suggested biometric cryptography technique incorporates the benefits of fuzzy commitment, dynamic key generation, and fuzzy vault schemes in its operation. The authors in [21] suggested an improved CBRS for fingerprint biometrics, which comprises two different layers: an expendable layer and a core layer; to achieve consistent enrolment for crucial access control infrastructures. In the core layer, a non-invertible mathematical operation based random projection process is carried out to the feature set of fingerprint biometrics; to accomplish biometric template revocability and protection. ...
... For additional verification for the competence of the suggested algorithm for consistent cancelable recognition model, further comparisons are carried out for contrasting the outcomes of the suggested cancelable system with the recent literature CBRSs in [12,13,15,16,17,21,24,32,33,35,49]. We contrasted the average numerical security assessment of the FAR, EER, AROC, and FRR findings of the suggested CBRS with the previous recent CBRSs in [12,13,15,16,17,21,24,32,33,35,49] as summarized in Table 13. ...
Article
Full-text available
Recently, biometric systems are extensively and commonly utilized for authentication and verification applications. The security issue and the dependence on a specific biometric for the biometric verification process are the main challenges confronted in biometric systems. The security issue comes due to the exploitation of the original biometrics in stored servers. Therefore, if any attacks have been introduced to the stored biometrics, they will be missed indefinitely. Consequently, the stored original biometrics must be secured through maintaining and storing these templates away from exploitation in their servers. So, there is a need for designing a cancelable biometric recognition system (CBRS) that is a promising protection trend in biometric verification and authentication fields. The CBRS is based on the conversion of biometric data or its features to a different arrangement. In this article, a novel CBRS based on the suggested optical PTFT (Phase Truncated Fourier Transform) asymmetric encryption algorithm is introduced. In the proposed algorithm, two different distributions of phases in the output and Fourier planes are maintained as deciphering keys, and thus, the encryption keys will not be utilized for the decryption process. This leads to the advantage that the two ciphering keys may be utilized as public secret keys to encrypt distinct biometric images. Consequently, the suggested PTFT cryptosystem is an asymmetric encryption/decryption technique compared to the preceding related optical encryption techniques that are symmetric techniques such as Optical Scanning Holography (OSH) and Double Random Phase Encoding (DRPE). The suggested PTFT asymmetric encryption algorithm also has a wonderful practical performance in security applications. One of the main contributions of the proposed optical PTFT asymmetric encryption algorithm is that it removes the linearity features of the optical OSH and DRPE symmetric encryption algorithms through its great features of the phase truncation nonlinear operation. Subsequently, this produces an encrypted biometric template with two public keys, and the authenticated user can retrieve the original biometric template utilizing two private keys with achieving a high security and cancelability performance for the stored biometrics. To confirm the efficacy of the suggested optical encryption algorithm for developing a secure CBRS, various biometric datasets of face, ear, palmprint, fingerprint, and iris images are examined and analyzed. Extensive comparative analyses are performed amongst the suggested algorithm and the optical OSH and DRPE encryption algorithms. The experimental outcomes achieved for performance quality assessment assure that the suggested CBRS is reliable, robust, and realistic. It has great security and cancelability proficiency that expose excellent cancelable biometric recognition performance even in the existence of noise. Moreover, the performed experiments declare that the suggested CBRS guarantee an average FRR (False Reject Rate) of 0.0012, EER (Equal Error Rate) of 0.0019, and FAR (False Accept Rate) of 0.0030, and an average AROC (Areas under the Receiver Operating Characteristic) of 0.9996.