Empowering Biometric Security: A Paradigm Shift in Remote Identification

Main Article Content

Yacine Belhocine
Abdallah Meraoumia
Hakim Bendjenna
Mohammed Saiga

Abstract

Context: In an increasingly digital world, the need for secure and reliable identity verification is more critical than ever. Biometric authentication stands out due to its inherent uniqueness and resistance to forgery, yet its performance is still affected by real-world challenges such as image noise and lighting inconsistencies. Objective: This paper aims to enhance the robustness and accuracy of biometric systems, specifically for remote authentication scenarios, by addressing the limitations posed by environmental variations. Method: The proposed solution is a novel FKP-based biometric authentication system that employs a Triple Texture Feature Extraction (TTFE) technique to capture detailed information from both spatial and frequency domains. To further improve recognition performance, Projective Dictionary Learning is used to refine the feature representation. For secure data handling, a fuzzy vault scheme is integrated to encrypt biometric templates using secret keys, allowing secure authentication over potentially untrusted networks. Results: Experiments conducted on standard benchmark datasets demonstrate significant improvements in both accuracy and resilience to challenging conditions such as noise and lighting variations. Conclusions: This integrated approach successfully enhances the reliability and security of biometric authentication systems, paving the way for more practical and scalable real-world deployments.

Article Details

Section

Research Articles

How to Cite

[1]
Y. Belhocine, A. . Meraoumia, H. . Bendjenna, and M. . Saiga, “Empowering Biometric Security: A Paradigm Shift in Remote Identification”, Systems and Computing, vol. 1, no. 1, Jul. 2025, doi: 10.64409/sycom.v1.i1.4.

References

[1] A. Ullah, M. Azeem, H. Ashraf, A. A. Alaboudi, M. Humayun, N. Jhanjhi, “Secure Healthcare Data Aggregation and Transmission in IoT, A Survey”. IEEE Access, 9, 16849–16865, 2021. https://doi.org/10.1109/access.2021.3052850

[2] A. Ezugwu, E. Ukwandu, C. Ugwu, M. Ezema, C. Olebara, J. Ndunagu, L. Ofusori, U. Ome, “Password-based authentication and the experiences of end users”. Scientific African, 21, e01743, 2023. https://doi.org/10.1016/j.sciaf.2023.e01743

[3] U. Sumalatha, K. Krishna Prakasha, S. Prabhu, V. C. Nayak, “A Comprehensive Review of Unimodal and Multimodal Fin-gerprint Biometric Authentication Systems: Fusion, Attacks, and Template Protection”. IEEE Access, 1–1, 2024. https://doi.org/10.1109/access.2024.3395417

[4] S. Ayeswarya, & K. John Singh. “A comprehensive review on secure biometric-based continuous authentication and user profiling”. IEEE Access, 12, 82996–83021, 2024. https://doi.org/10.1109/access.2024.3411783

[5] U Sumalatha, K. Krishna Prakasha, S. Prabhu, V. C. Nayak, “From Geometry to Deep Learning: An Overview of Finger Knuckle Biometrics Recognition Approaches”. IEEE Access, vol. 12, pp. 175414-175444, 2024. https://doi.org/10.1109/access.2024.3503685

[6] I. Riaz, Ahmad Nazri Ali, H. Ibrahim, “Circular shift combination local binary pattern (CSC-LBP) method for dorsal finger crease classification”. Journal of King Saud University. Computer and Information Sciences/Maǧalaẗ Ǧamʼaẗ Al-Malīk Saud : Ùlm Al-Ḥasib Wa Al-Maʼlumat, 35(8), 101667–101667, 2023. https://doi.org/10.1016/j.jksuci.2023.101667

[7] D. W. S. Alausa, E. Adetiba, J. A. Badejo, I. E. Davidson, O. Obiyemi, E. Buraimoh, A. Abayomi, O. Oshin, “Contactless Palmprint Recognition System: A Survey”. IEEE Access, 10, 132483–132505, 2022. https://doi.org/10.1109/ACCESS.2022.3193382

[8] R. Ameri, A. Alameer, S. Ferdowsi, K. Nazarpour, V. Abolghasemi, “Labeled projective dictionary pair learning: application to handwritten numbers recognition”. Information Sciences, 609, 489–506, 2022. https://doi.org/10.1016/j.ins.2022.07.070

[9] H. Javed, S. El-Sappagh, T. Abuhmed, “Robustness in deep learning models for medical diagnostics: security and adversarial challenges towards robust AI applications”. Artificial Intelligence Review, 58(1), 2024. https://doi.org/10.1007/s10462-024-11005-9

[10] M. Stippinger, D. Hanák, M. T. Kurbucz, G. Hanczár, O. M. Törteli, Z. Somogyvári, “BiometricBlender: Ultra-high dimen-sional, multi-class synthetic data generator to imitate biometric feature space”. SoftwareX, 22, 101366, 2023. https://doi.org/10.1016/j.softx.2023.101366

[11] X. Zhu, C. Cao, “Secure Online Examination with Biometric Authentication and Blockchain-Based Framework”. Mathematical Problems in Engineering, 2021, e5058780. https://doi.org/10.115 5/2021/5058780

[12] I. Singh, B. Singh, “Access management of IoT devices using access control mechanism and decentralized authentication: A review”. Measurement: Sensors, 25, 100591, 2023. https://doi.org/10.1016/j.m easen.2022.100591

[13] A. A. Al-Saggaf, “A Post-Quantum Fuzzy Commitment Scheme for Biometric Template Protection: An Experimental Study”. IEEE Access, 9, 110952–110961, 2021. https://doi.org/10.1109/access.2021.3100981

[14] M. I. M Yusop, N.H. Kamarudin, N. H. S. Suhaimi, M. K. Hasan, “Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity”. IEEE Access, 13, 13919–13943, 2025. https://doi.org/10.1109/access.2025.3528960

[15] S; Gu, L. Zhang, W. Zuo, X. Feng, “Projective dictionary pair learning for pattern classification”. In Z. Ghahramani, M. Welling, C. Cortes, N. Lawrence, & K. Q. Weinberger (Eds.), Advances in Neural Information Processing Systems (Vol. 27). Curran Associates, 2014, Inc. Retrieved from https://proceedings.neurips.cc/paper_files/paper/2014/file/7b744eaa9b5d7db1348bc0a89eef37f8-Paper.pdf

[16] Zhuolin Jiang, Zhe Lin, L. S Davis, “Label Consistent K-SVD: Learning a Discriminative Dictionary for Recognition”. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(11), 2651–2664, 2013. https://doi.org/10.1109/tpami.2013.88

[17] L. Zhang, M. Yang, X. Feng, Sparse representation or collaborative representation: Which helps face recognition? 2011 International Conference on Computer Vision, Barcelona, Spain, 2011, pp. 471-478. https://doi.org/10.1109/iccv.2011.6126277

[18] A. Das, P. Mondal, U. Pal, M. A. Ferrer, M. Blumenstein, “Fast and efficent multimodal eye biometrics using projective dictionary pair learning”. 2016 IEEE Congress on Evolutionary Computation (CEC), Vancouver, BC, Canada, pp. 1402-1408, https://doi.org/10.1109/cec.2016.7743953

[19] R. F. Olanrewaju, B. U. I. Khan, M. A. Morshidi, F. Anwar, M. L. B. M Kiah, “A Frictionless and Secure User Authentica-tion in Web-Based Premium Applications”. IEEE Access, 9, 129240–129255, 2021. https://doi.org/10.1109/access.2021.3110310

[20] PolyU-FKP, The Hong Kong polytechnic university (PolyU) FingerKnuckle-Print Database [Online], 2010. http://www.comp.polyu.edu.hk/biometrics/FKP.html

[21] T. Lindeberg, “Discrete Approximations of Gaussian Smoothing and Gaussian Derivatives”. Journal of Mathematical Imag-ing and Vision, 66(5), 759–800, 2024. https://doi.org/10.1007/s10851-024-01196-9

[22] D. Dhillon, R. Chouhan, “Enhanced Edge Detection Using SR-Guided Threshold Maneuvering and Window Mapping: Han-dling Broken Edges and Noisy Structures in Canny Edges”. IEEE Access, 10, 11191–11205, 2022. https://doi.org/10.1109/access.2022.3145428

[23] L. Wu, Y. Xu, Z. Cui, Y. Zuo, S. Zhao, L. Fei, “Triple-Type Feature Extraction for Palmprint Recognition”. Sensors, 21(14), 4896, 2021. https://doi.org/10.3390/s21144896

[24] C. Shah, J. King, R. W. Wies, “Distributed ADMM Using Private Blockchain for Power Flow Optimization in Distribution Network With Coupled and Mixed-Integer Constraints”. IEEE Access, 9, 46560–46572, 2022. https://doi.org/10.1109/access.2021.3066970

[25] Z. H. Goh, Y. Wang, L. Leng, S.-N. Liang, Z. Jin, Y.-L. Lai, X. Wang, “A Framework for Multimodal Biometric Authentica-tion Systems With Template Protection”. IEEE Access, 10, 96388–96402, 2022. https://doi.org/10.1109/access.2022.3205413

[26] Z. Zhang, Q. Wang, Z. Zhang, “Harmonic Vector Error Analysis Based on Lagrange Interpolation”. IEEE Access, 9, 57464–57474; 2021. https://doi.org/10.1109/access.2021.3072841

[27] J. Yang, S. Chen, Y. Cao, “A PUF-Based Key Storage Scheme Using Fuzzy Vault”. Sensors, 23(7), 3476–3476, 2023. https://doi.org/10.3390/s23073476

[28] V. S. Baghel, S. Prakash, I. Agrawal, “An enhanced fuzzy vault to secure the fingerprint templates”. Multimedia Tools and Applications, 80(21-23), 33055–33073, 2021. https://doi.org/10.1007/s11042-021-11325-w

[29] A. F. Ebihara, K. Sakurai, H. Imaoka, “Efficient Face Spoofing Detection with Flash“. In IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 3, no. 4, pp. 535-549, Oct. 2021. https://doi.org/10.1109/tbiom.2021.3076816

[30] S. Kwatra, V. Torra, “Data Reconstruction Attack Against Principal Component Analysis. In: Arief, B., Monreale, A., Sirivianos, M., Li, S. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2023. Lecture Notes in Computer Science, vol 14097. Springer, Singapore. . https://doi.org/10.1007/978-981-99-5177-2_5

[31] Zineb Maaref, Foudil Belhadj, A. Attia, Z. Akhtar, Muhammed Basheer Jasser, Athirah Mohd Ramly, Ali Wagdy Mohamed, “A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems”. Egyptian Informatics Journal, 27, 100511–100511, 2024. https://doi.org/10.1016/j.eij.2024.100511