OSA's Digital Library

Applied Optics

Applied Optics


  • Editor: Joseph N. Mait
  • Vol. 52, Iss. 33 — Nov. 20, 2013
  • pp: 8161–8168

Secure biometric image sensor and authentication scheme based on compressed sensing

Hiroyuki Suzuki, Masamichi Suzuki, Takuya Urabe, Takashi Obi, Masahiro Yamaguchi, and Nagaaki Ohyama  »View Author Affiliations

Applied Optics, Vol. 52, Issue 33, pp. 8161-8168 (2013)

View Full Text Article

Enhanced HTML    Acrobat PDF (1315 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



It is important to ensure the security of biometric authentication information, because its leakage causes serious risks, such as replay attacks using the stolen biometric data, and also because it is almost impossible to replace raw biometric information. In this paper, we propose a secure biometric authentication scheme that protects such information by employing an optical data ciphering technique based on compressed sensing. The proposed scheme is based on two-factor authentication, the biometric information being supplemented by secret information that is used as a random seed for a cipher key. In this scheme, a biometric image is optically encrypted at the time of image capture, and a pair of restored biometric images for enrollment and verification are verified in the authentication server. If any of the biometric information is exposed to risk, it can be reenrolled by changing the secret information. Through numerical experiments, we confirm that finger vein images can be restored from the compressed sensing measurement data. We also present results that verify the accuracy of the scheme.

© 2013 Optical Society of America

OCIS Codes
(100.0100) Image processing : Image processing
(200.0200) Optics in computing : Optics in computing
(200.4560) Optics in computing : Optical data processing
(100.4998) Image processing : Pattern recognition, optical security and encryption

ToC Category:
Imaging Systems

Original Manuscript: August 20, 2013
Manuscript Accepted: October 8, 2013
Published: November 20, 2013

Virtual Issues
Vol. 9, Iss. 1 Virtual Journal for Biomedical Optics

Hiroyuki Suzuki, Masamichi Suzuki, Takuya Urabe, Takashi Obi, Masahiro Yamaguchi, and Nagaaki Ohyama, "Secure biometric image sensor and authentication scheme based on compressed sensing," Appl. Opt. 52, 8161-8168 (2013)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems,” IBM Syst. J. 40, 614–634 (2001). [CrossRef]
  2. S. Hirata and K. Takahashi, “Cancelable biometrics with perfect secrecy for correlation-based matching,” ICB ’09 Proceedings of the Third International Conference on Advances in Biometrics, LNCS 5558 (2009), pp. 868–878.
  3. A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in Proceedings of the ACM Conference on Computer and Communications Security (1999), pp. 28–36.
  4. A. Juels and M. Sudan, “A fuzzy vault scheme,” in IEEE International Symposium on Information Theory (2002).
  5. H. Suzuki, M. Yamaguchi, M. Yachida, N. Ohyama, H. Tashima, and T. Obi, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14, 1755–1766 (2006). [CrossRef]
  6. J. K. Pillai, V. Patel, R. Chellappa, and N. Ratha, “Secure and robust iris recognition using random projections and sparse representations,” IEEE Trans. Pattern Anal. Mach. Intell. 33, 1877–1893 (2011). [CrossRef]
  7. E. J. Candès and M. B. Wakin, “Introduction to compressive sampling,” IEEE Signal Process. Mag. 25(2), 21–30 (2008). [CrossRef]
  8. M. B. Wakin, J. N. Laska, M. F. Duarte, D. Baron, S. Sarvotham, D. Takhar, K. F. Kelly, and R. G. Baraniuk, “An architecture for compressive imaging,” Proceedings of the International Conference on Image Processing (ICIP) (2006).
  9. Y. Rachlin and D. Baron, “The secrecy of compressed sensing measurements,” in IEEE 46th Annual Allerton Conference on Communication, Control, and Computing (2008), pp. 813–817.
  10. L. Sirovich and M. Kirby, “Low-dimensional procedure for the characterization of human faces,” J. Opt. Soc. Am. A 4, 519–524 (1987). [CrossRef]
  11. R. C. Gonzalez and R. E. Woods, Digital Image Processing, 3rd ed. (Addison-Wesley, 1992).
  12. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  13. P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010). [CrossRef]
  14. J. Breebaart, B. Yang, I. Buhan-Dulman, and C. Busch, “Biometric template protection: the need for open standards,” Datenschutz Datensicherheit 33, 299–304 (2009). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited