Generally, security is a must for all organizations and institutions. Traditional security tools comprise passwords and Personal Identification Numbers (PINs) [1]. Unfortunately, these tools require that the user must remember large numbers or text strings. The limitations of these traditional tools to information system security are as follows [2]:
They recognize some of the characters linked with the individual but cannot figure out who invented them.
They are prone to be misplaced or stolen.
They are easily evaded and hackable.
They are incorrect.
In such a case, the system's security is jeopardized. Biometrics are very suitable for scenarios requiring dependability. They always accompany the person and do not necessitate any intervention from him. By more closely tying identity to the individual, biometrics can be helpful. It is a technology that makes an effort to identify someone based on personal traits and offers a high level of accuracy in identifying a person. [2, 3].
The authors of [4] describe biometrics as the different physical or logical features or attributes of the human body that are measured. The authors of [5] describe biometrics such as the fingerprint, iris, face, and DNA as methods of identifying individuals. Biometrics provides a rapid, discrete, and unobtrusive option for access control and identity verification. The authors of [6] talk about traditional and conventional biometric identification approaches.
Physical and behavioral biometrics are the two most often-used types of biometrics [7, 8]. In contrast to physical biometrics, which is body components, behavioral biometrics are activities that a person conducts. A person's unique fragrance, the shape of their ear, and even the way they talk are all unusual biometrics that could be used in the future. The primary physical biometrics that is measured are fingerprints, retina, hand engineering, iris scan, facial position, or recognition. The most frequent behavioral biometrics researched are voice recognition, signature, typing style, and walking. However, different biometrics are required for different purposes, therefore there is no superior or worse biometric technology [9].
The process of biometric acquisition requires a sensing process, interfacing, and signal processing unit for enhancement and feature extraction. Moreover, a data storage unit is required to save the features of authorized users. Finally, an output interface should exist in the system [10]. A common biometric identification method collects samples of a certain biometric and extracts and records the unique properties directly in the database. During the verification step, a newly extracted biometric characteristic is compared to previously stored features to determine whether or not it matches one of the previously saved templates. Whereas biometric authentication refers to the process of determining whether or not a specific individual matches the stored template.
The conventional biometric identification and verification process includes several security and privacy issues [11]. Original biometric templates, unlike passwords or encryption keys, are easily stolen; as a result, these templates cannot be canceled or amended, rendering biometrics unsafe. The authors of [12] raised an additional risk that can be addressed in systems that use traditional identity or authentication. This is known as cross-matching (diversity) and cross-application invariance, and any apps and systems that rely on users' biometrics can be easily targeted if biometrics database templates are made public, allowing for easy user tracking. The authors of [13] illustrated the importance of introducing a security system to unprotected templates, which expose authenticated users' information to theft and dissemination, to protect the stored template from previous challenges.
Cancelable biometrics is known as the intentional and recurrent distortion of a biometric signal based on a chosen transform [14]. Before storage, the original biometric or extracted features are modified by a one-way function in these systems. According to the above explanation, cancelable biometrics approaches improve diversity and unlinkability challenges. Different transforms can be used for different applications to get rid of cross-matching. Furthermore, the revocable cancelable biometrics approaches can be changed or canceled with new templates based on these biometric data [14, 15].
Non-invertible transform [15, 16], invertible transform [17, 18], and biometric salting [19, 20] are all examples of cancelable methods. A user-specific key is utilized for the generation of the cancelable template [19]. Hybrid biometric cryptosystems [20], on the other hand, combine more than two template protection techniques into a single biometric cryptosystem.
The majority of chaos-based biometric template encryption techniques rely on concepts called diffusion and confusion in chaotic encryption systems. The original biometric template is aesthetically cluttered and unrecognizable as a result of the confusing approach's shifting of the pixel positions. A diffusion technique modifies the grayscale values of pixels to change the statistical characteristics of a biometric template. The performance, durability, and security of encryption are improved when the confusion and dispersion stages are combined.
A variety of chaotic-based encryption algorithms have recently been proposed for the development of successful cancelable biometrics. Chaotic signals are suitable for encryption due to their sensitivity to the initial state, noise-like behavior, and ergodicity. Because they provide a good balance of processing power, high security, complexity, speed, and all of the above, chaos-based encryption algorithms are ideal for use in cancelable biometrics.
Position permutation and value transformation are two types of cancelable biometric-based encryption techniques [17–20]. The pixel position of the biometric template is relocated to a different location without altering the pixel value of the original biometric template in position permutation approaches. Value transformation techniques swap out one-pixel value for another without affecting the location. The XOR operation is one of the most widely used methods for transforming values and is used to achieve linear independence between two or more variables. The theory underlying XOR encryption is that without knowing the initial values of one of the two parameters, it is impossible to reverse the operation. To improve the security performance of the cancelable biometric-based encryption technology, the concept of shuffling the positions of pixels in the plain-biometric template and then changing the grey values of the shuffled pixels is used.
As a result, this paper introduces a practical implementation of a hybrid encryption technique based on composition and the deep-dream algorithm for the development of a reliable and robust cancelable biometrics identification system (face, iris, palmprint, and fingerprint). By combining numerous rotations and operations to generate the key to the encrypted biometrics templates, the proposed security-based cancelable biometrics system improves the robustness of biometrics recognition systems.
The remainder of this work is organized as shown below. The second section contains the related work. The third section presented the proposed cancelable biometric recognition system. The fourth section explains the authentication quality evaluation measures and provides simulation results; both visual and statistical evaluations. The fifth section contains the conclusion.