Design of a High Secure Authentication System Based on Fuzzy Fusion of Iris and Face and Incorporating 2D Baker and Henon Maps

Authors

  • Marwa M. Eid Assistant Professor at ECE-Department Delta Higher Institution for Engineering and Technology Mansoura University, Egypt
  • Mohamed A. Mohamed

Keywords:

Crypto-biometrics, Iris Recognition, Face Recognition, Chaotic Encryption, and Fuzzy Logic Fusion

Abstract

The emergent concerns of identity theft problems and terrorism make the design of applicable accurate verification systems more crucial. No single biometric identifier could perfectly own all desired security properties. Moreover, the transmitted or stored biometric templates raise the opportunity of compromising user's privacy and identity breaching. This paper offers new scheme based on score level fuzzy fusion at decision level fusion to effectively combine face and iris identifiers. The proposed system allows an efficient identification procedure and introduces a new template locking approach based on chaos cryptography to protect the biometric data. In this study, CASIA and Faces94 databases are used to examine and appraise the robustness of the proposed schemes. The proposed template protection scheme offers new different uncorrelated secure forms of the base original templates in imperative and much speedy ciphering methodology. Furthermore, it could be rescinded at different points of probable attacks from sensed level to the final code and the matcher. It presents remarkably good key sensitivity and more robustness against different malicious attacks compared to classical encryption techniques. Furthermore, being noninvasive to the recognition process, simulation results on authentication rates introduces FAR and FRR of 0.0345%, and 0.001% respectively which illustrated a significant enhancement of the proposed fuzzy fusion over each unimodal system and existing multimodal fusion methods.

References

D. T. Meva, “Comparative Study of Different Fusion Techniques in Multimodal Biometric Authentication,†vol. 66, no. 19, pp. 16–19, 2013.

A. Ross and R. Govindarajan, “Feature level fusion using hand and face biometrics,†Proc. SPIE - Int. Soc. Opt. Eng., vol. 5779, no. March, pp. 196–204, 2005.

J. Bigün, G. Chollet, and G. Borgefors, Eds., Audio- and Video-based Biometric Person Authentication, vol. 1206. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997.

H. Benaliouche and M. Touahria, “Comparative study of multimodal biometric recognition by fusion of iris and fingerprint,†Sci. World J., vol. 2014, 2014.

J. I. A. N. Q. Gao, L. I. Y. A. Fan, L. I. Li, and L. I. Z. Xu, “A PRACTICAL APPLICATION OF KERNEL – BASED FUZZY DISCRIMINANT ANALYSIS,†vol. 23, no. 4, pp. 887–903, 2013.

O. Sharifi and M. Eskandari, “Optimal Face-Iris Multimodal Fusion Scheme,†Symmetry (Basel)., vol. 8, no. 6, p. 48, 2016.

H. Y. liu Yang, yue Xue Dong, Liu Ying Fei, “Iris Recognition System Based on Chaos Encryption,†2010 Int. Conf. Comput. Des. Appliations (ICCDA 2010), vol. 1, no. Iccda, pp. 537–539, 2010.

A. K. Jain, K. Nandakumar, and A. Nagar, “Biometric Template Security,†EURASIP J. Adv. Signal Process, vol. 2008, no. January, p. 113:1--113:17, 2008.

F. Hao, R. Anderson, and J. Daugman, “Combining crypto with biometrics effectively,†IEEE Trans. Comput., vol. 55, no. 9, pp. 1081–1088, 2006.

M. A. M. Abdullah, S. Dlay, W. Woo, and J. Chambers, “A Framework for Iris Biometrics Protection: A Marriage between Watermarking and Visual Cryptography,†IEEE Access, vol. 3536, no. c, pp. 1–1, 2016.

C. A. of S. Institute of Automation, “CASIA iris image database,†2004. [Online]. Available: http://biometrics.idealtest.org/dbDetailForUser.do?id=1. [Accessed: 25-Jan-2017].

M. M. Eid, M. A. Mohamed, and M. A. Abou-El-Soud, “Development of Iris Security System Using Adaptive Quality-Based Template Fusion,†in Intelligent Data Analysis and Applications: Proceedings of the Second Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2015, A. Abraham, X. H. Jiang, V. Snášel, and J.-S. Pan, Eds. Cham: Springer International Publishing, 2015, pp. 265–278.

“Face Recognition Data.†[Online]. Available: http://cswww.essex.ac.uk/mv/allfaces/faces94.html. [Accessed: 03-May-2017].

M. A. Mohamed, M. E. Abou-Elsoud, and M. M. Eid, “Automated face recogntion system: Multi-input databases,†in The 2011 International Conference on Computer Engineering & Systems, 2011, pp. 273–280.

S. Viriri and J. R. Tapamo, “Integrating iris and signature traits for personal authentication using user-specificweighting,†Sensors, vol. 12, no. 4, pp. 4324–4338, 2012.

H. G. Schuster, Deterministic Chaos. 2005.

G. Ye and X. Huang, “A secure image encryption algorithm based on chaotic maps and SHA-3,†Secur. Commun. Networks, vol. 9, no. 13, p. n/a-n/a, 2016.

H. B. Kekre, V. A. Bharadi, V. I. Singh, V. Kaul, and B. Nemade, “Hybrid Multimodal Biometric Recognition using Kekre ’ s Wavelets , 1D Transforms & Kekre ’ s Vector Quantization Algorithms Based Feature Extraction of Face & Iris,†pp. 29–34, 2011.

A. Aboshosha and K. A. El Dahshan, “Score Level Fusion for Fingerprint , Iris and Face Biometrics,†vol. 111, no. 4, pp. 47–55, 2015.

Downloads

Published

2017-08-28

Issue

Section

Articles

How to Cite

Design of a High Secure Authentication System Based on Fuzzy Fusion of Iris and Face and Incorporating 2D Baker and Henon Maps. (2017). Asian Journal of Applied Sciences, 5(4). https://ajouronline.com/index.php/AJAS/article/view/4904

Similar Articles

1-10 of 90

You may also start an advanced similarity search for this article.