Introduction

With developments in electronic device capabilities and communication technologies, biometrics has become a pivotal tool to authenticate and identify individuals1. Biometric characteristics can be classified into physical qualities, such as fingerprints, palm prints, facial features, or behavioral patterns, including voice and stride. These particular biometric traits are unique to individuals, facilitating reliable differentiation between users2. As a result, biometrics has emerged as a very efficient substitute for conventional password-based authentication solutions. Integrating biometric technologies with IoT systems is a possible answer to security challenges in IoT contexts3,4.

Biometric authentication systems have two fundamental phases: enrollment and evaluation. Biometric data are collected and preserved during enrollment for subsequent comparisons with future biometric samples5,6,7. In contrast to conventional passwords, biometric data cannot be substituted if compromised. To mitigate this issue, it is essential to protect biometric data or replace them with cancelable templates produced via non-reversible methods7. New methodologies are utilized to protect biometrics: biometric cryptography and cancelable biometrics. In biometric cryptography, biometric information is preserved in an encrypted form. During authentication, the encrypted data is decrypted for comparison with the decoded query sample; nevertheless, this procedure creates possible weaknesses during the decryption phase. Alternatively, cancelable biometrics allows authentication directly on altered, non-reversible templates, reducing security risks8.

While creating secure biometric templates, four fundamental requirements must be evaluated: non-inevitability, diversity, reusability, and high performance. The principle of non-inevitability guarantees that safeguarded templates may be rescinded and substituted with newly modified versions following a security violation. Diversity requires that templates are distinct across various applications to avoid redundancy. In addition, protected templates must provide sufficient security to prevent reconstruction of original biometric data, while maintaining high recognition accuracy to facilitate successful biometric authentication9.

Various techniques for safeguarding biometric templates have been suggested. Specific methodologies depend on a singular biometric modality for the verification process, with the so-called unimodal biometrics. Fingerprint, iris, and facial recognition are among unimodal verification systems9. However, unimodal biometrics frequently demonstrate constrained dependability. Various biometric modalities for a single individual can be integrated to improve verification accuracy and system resilience, creating multimodal biometric systems10. Multimodal biometrics substantially diminish the probability of unauthorized access, thereby enhancing security. Frequent combinations in multimodal systems consist of fingerprints with iris patterns, facial images with fingerprints, and more pairings5.

In the light of the security issues posed by password-based identity systems, our research demonstrates biometric recognition as a formidable option. We deploy the cancelable biometric generation method to preserve original biometric data from potential database breaches. This study introduces an innovative approach for producing cancelable biometric templates employing EMD in conjunction with quaternion mathematics. This technology improves security by converting biometric data into irreversible templates appropriate for real-time IoT applications. The verification technique employs template correlation and thresholding to provide precise identification without reconstructing the original biometrics.

The fundamental contribution of this research work is developing a face-based biometric verification framework tailored for IoT systems. The key characteristics of the suggested methodology are as follows:

  • The algorithm solely uses facial images to create secure biometric templates, concentrating on a singular biometric modality. The EMD is utilized to deconstruct the facial image into its fundamental components, facilitating improved feature extraction.

  • Quaternion mathematics is utilized to encrypt the decomposed facial data, offering a solid technique for template protection.

  • The encrypted biometric template is safely maintained in the database, obviating the necessity to preserve the original facial image, substantially augmenting both privacy and security.

This framework protects biometric data, while preserving its verification functionality, making it ideal for IoT-based real-time applications.

The simulation outcomes indicate that the suggested system satisfactorily fulfills the requirements of non-invertibility, diversity, reusability, and high performance. The effectiveness of the system is confirmed by evaluation using the Olivetti Research Laboratory (ORL) face images and Labeled Faces in the Wild (LFW), a database for studying face recognition in unconstrained environments 11,12.

Related work

Cancelable biometric systems depend on intentionally altering biometric data using techniques like biometric salting or non-invertible transformations. These systems maintain databases that contain only altered versions of biometric data, as opposed to the original biometric information. The verification method depends on these altered templates, safeguarding the original biometric data from recovery, thus augmenting security and privacy.

Cancelable biometric templates are altered or distorted forms of biometric data intended to facilitate elimination or replacement of utilized templates instead of changing the biometric data itself. These modified templates preserve the effectiveness of identification systems, reconciling the need for security with enhanced identification precision. This equilibrium requires a meticulous management of trade-offs1. Diverse algorithms have been formulated to tackle these issues, including encryption, transformations, compression, and data-hiding strategies, which are frequently utilized to create cancelable templates. Certain algorithms employ a singular biometric modality, whereas others use many biometric modalities to generate the secure templates13,14.

Fingerprints are extensively utilized in identification systems owing to their distinctive minutiae features. Jing et al.15 devised a cancelable biometric blueprint based on these minutiae, combining numerous single-line codes with fingerprint characteristics to generate multi-line codes. These codes represent the modified templates, tackling the problem of layout invariance between molds. The algorithm exhibited an Equal Error Rate (EER) of 4.69%. In another technique, Jin et al.16 leveraged Minutiae Proximity Decomposition (MVD) to construct a cancelable fingerprint identification system, attaining a considerably low EER of 1.77%.

Gowthami et al.13 utilized zone-based linear binary patterns for fingerprint recognition, segmenting each fingerprint image into nine uniformly sized sectors, with each sector designating its own linear pattern for identification. This technique achieved an average recognition accuracy of 94.28%. Likewise, Sandhaya and Parased17 created a cancelable fingerprint recognition method using spiral patterns and fuzzy logic processing. The fuzzy commitment method was used to encrypt minutiae features, yielding an EER of 1.17%.

Qiu et al. 18 devised a cancelable template generation method employing Gabor filters and a look-up table for palmprint recognition. The Gabor filter extracts features from palmprint images, which are then encoded using a lookup table. This system exhibited an exceptional detection rate of 99.92%, while efficiently protecting palmprint templates from cracker attempts.

Another method for cancelable biometric identity recognition systems involves employing features derived from the iris region of ocular images for personal identification. This procedure begins with the localization and normalization of the iris region, followed by feature extraction. Cancelable iris recognition primarily emphasizes the concealment of iris features by encryption or irreversible modifications before storage or verification. Ali and Tahir19 proposed a cancelable iris identification technique that successfully combines encryption with non-reversible changes to conceal iris characteristics. This technique achieved an identification rate of 99.9%.

Although unimodal biometric templates perform satisfactorily, they have distinct limits in particular contexts. For example, in fingerprint identification, difficulties, such as the scanner failure to obtain correct fingerprints, may lead to erroneous acceptances or rejections. Factors such as fingerprint degradation impede the capturing of precise images. Likewise, poor conditions during data acquisition might alter biometric characteristics in facial recognition. Fluctuations in illumination and facial emotions influence the quality and dependability of facial data. Multimodal biometrics offer a comprehensive method to eliminate these constraints by merging different biometric modalities, thus increasing recognition accuracy and system dependability20.

The amalgamation of many biometric modalities into a singular template for an individual is a burgeoning concept that improves verification reliability, while streamlining storage needs. This multi-biometric recognition method enables the generation of templates that can be easily revoked and substituted if necessary5. Sree and Radha developed a multimodal biometric system that integrates facial and fingerprint data. Their system utilizes the number of crossings concept to derive minutiae characteristics from fingerprints and the Local Binary Pattern (LBP) algorithm to obtain facial features. The features are integrated at the feature level, and a fuzzy vault technique is utilized to augment the security of the created templates14.

Tarek et al. introduced a multimodal biometric recognition algorithm incorporating encryption to boost security21. This algorithm depends on the Double Random Phase Encoding (DRPE) technology to encrypt fingerprint images, using the palmprint image as a secret key in the enrolment phase. Successful decryption during authentication is contingent upon providing the correct palmprint of the same user to confirm the individual identification. The decrypted fingerprint image is then compared against a newly obtained fingerprint image for validation.

Likewise, Soliman et al.22 presented an alternative encryption-based approach using DRPE for multimodal biometric recognition that incorporates iris and facial features. This approach involves extracting face features with the Scale-Invariant Feature Transform (SIFT) algorithm, and subsequently encrypting them using DRPE. Features are retrieved from two iris images of the same person for iris recognition. One iris image is encrypted using DRPE, while the other is used to create the second phase mask necessary for DRPE decryption.

Tarif et al.23 presented a multimodal cancelable biometric recognition system utilizing digital encryption and concealment methods. The technology seeks to guarantee the secure transmission of multimodal biometric data in identification systems. It integrates fingerprint, facial, and iris modalities, with fingerprint and iris images processed independently before embedding into a host facial image utilizing the Slantlet Transform with Singular Values (SLT-SVs).

Yang et al.24 devised a biometric access control system for critical infrastructures, employing fingerprint and facial recognition technologies. Their solution includes a cascaded encryption system containing core and disposable encryption layers. Furthermore, a fuzzy commitment strategy is employed to amalgamate the irreversible transformation key with the retrieved facial feature set, hence augmenting the system security and resilience.

Nasr et al.25 introduced an innovative method for enhancing the security of biometric systems via quaternion DRPE. The biometric data, including facial images, is first converted into quaternion representation. The data is expanded into four-dimensional space using quaternion mathematics, thereby substantially augmenting its complexity and security. The subsequent stage entails the implementation of DRPE on the quaternion-based data. DRPE depends on random phase masks to conceal biometric traits, enhancing data security. The result is a revocable biometric template that can substitute the original data if compromised, safeguarding sensitive biometric information. This procedure enables the system to modify the stored template without altering the user intrinsic biometric characteristics. The presented method exhibits exceptional accuracy and efficiency, as robust performance metrics indicate, including the area under the ROC curve and the EER. This method provides a robust and efficient solution for preserving privacy in biometric identification systems, tackling common security issues through quaternion mathematics26.

Khalaf et al.27 offered two sophisticated cancellable biometric recognition techniques that utilize quaternion mathematics to enhance security. The initial technique combines quaternion mathematics with the Fractional Fourier Transform (FRFT), deliberately adding distortions to biometric data to thwart unauthorized access. The second technique depends on quaternion rotation to create comparable distortions, hence enhancing the protection of biometric templates. Encoding biometric templates in quaternion form expands the data into four-dimensional space, hence augmenting its complexity and resistance against attacks. The performance assessment through metrics like EER and AROC underscores the efficacy of these techniques. Both of them exhibit remarkable reliability, attaining EER values around zero and AROC levels close to one. This study presents a comprehensive framework for privacy-preserving biometric authentication, delivering an effective solution to significant security concerns in biometric systems.

Andrew et al. introduced a two-factor authentication technique that integrates fingerprint biometrics with tokenized random integers to provide each user with a distinctive, concise code. The BioHashing approach improves security by necessitating both the token and the fingerprint for authentication, rendering it very resistant to biometric forgery and spoofing. This approach provides substantial benefits compared to conventional biometric systems, including a 0% EER and distinct differentiation between authentic and fraudulent populations, thus enhancing biometric authentication systems’ overall security and dependability28.

Dong et al. introduced an IoT-compatible biometric hashing network named PalmCohashNet. This network utilises palm print and palm vein data to produce distinctive, compact hash codes for each user. The technique enhances security by integrating two cooperatively-taught hashing sub-networks, ensuring that hash codes from the same identity are consistent and proximate. This technique markedly enhances authentication precision and security in IoT applications, rendering it exceptionally resilient to biometric spoofing and fabrication. PalmCohashNet versatility enables deployment in multiple operational modes, guaranteeing strong and dependable biometric authentication for IoT devices29.

Basic concepts

Empirical mode decomposition

A non-stationary signal is defined by its time-varying mean and variance, complicating analysis with traditional methods. EMD is an efficient technique for partitioning signals into a collection IMFs and a residual component (\(r_n\)). In contrast to conventional methods, EMD functions directly inside the time domain, maintaining the essential characteristics of the original signal, while decomposing it into significant components30. The first IMF encompasses the signal highest frequencies and energy levels, whereas the following IMFs denote progressively lower frequencies and energies, until they are reduced in the residual. A one-dimensional signal s(t) is decomposed into n IMFs and a residual, enabling the reconstruction of the signal through the summation of these components as shown in Fig. 1. This decomposition can be mathematically represented as follows31:

$$\begin{aligned} s(t) = \sum _{i=1}^{n} IMF_i + r_n \end{aligned}$$
(1)

EMD can be an effective tool for extracting unique features from facial images in facial image processing to create cancelable biometric templates. Utilizing the adaptive and data-driven characteristics of EMD, the derived components can be modified to guarantee privacy and security, rendering the resultant templates both non-invertible and efficient for biometric identification.

Fig. 1
Fig. 1
Full size image

An illustration of EMD decomposition for an input biometric.

The sifting process is an essential phase in EMD. It is employed to derive IMFs and a residual component from a signal. To qualify as an IMF, a component must meet two fundamental criteria: (1) the numbers of zero crossings and extrema must be either identical or different by no more than one, (2) the average of the upper and lower envelopes must equal zero.

In the sifting process, the envelope mean, denoted as m(t), is computed as follows:

$$\begin{aligned} m(t) = \frac{u(t) + l(t)}{2}, \end{aligned}$$
(2)

where u(t) and l(t) represent the upper and lower envelopes, respectively. The initial IMF, denoted as h(t), is then formulated as:

$$\begin{aligned} h(t) = s(t) - m(t), \end{aligned}$$
(3)

where s(t) denotes the original signal. The two IMF criteria are subsequently evaluated for h(t). If the conditions are unmet, the sifting process is reiterated, considering h(t) as the new signal. This iterative process persists until a component meets the IMF criteria. Upon extraction of all IMFs, the original signal, s(t), can be rebuilt as follows:

$$\begin{aligned} s(t) = \sum _{i=1}^{n} IMF_i + r_n, \end{aligned}$$
(4)

where \(r_n\) is the ultimate residual. The sifting procedure is thereafter done recursively to the residual, r(t), until it comprises solely a single extremum.

Quaternion mathematics

Quaternions are a numerical system that expands complex numbers into four dimensions. Quaternions, first introduced by Sir William Rowan Hamilton in 1843, are essential in various domains, including 3D computer graphics, robotics, and physics, owing to their efficient representation of rotations and orientations32,33.

A quaternion is generally represented in the following format33:

$$\begin{aligned} q = w + x_i + y_j + z_k \end{aligned}$$
(5)

where \(w, x, y,\) and \(z\) are real numbers, and \(i, j,\) and \(k\) represent the fundamental quaternion units. The units \(i, j,\) and \(k\) adhere to defined multiplication rules33.

$$\begin{aligned} i^2 = j^2 = k^2 = ijk = -1 \end{aligned}$$
(6)

These laws indicate that quaternion multiplication is non-commutative; thus, the multiplication sequence is significant. For example33:

$$\begin{aligned} ij = k \quad \text {but} \quad ji = -k \end{aligned}$$
(7)

Basic operations with quaternions

Let \(q_1\) and \(q_2\) be two quaternions expressed as33:

$$\begin{aligned} q_1 = w_1 + x_1i + y_1j + z_1k \end{aligned}$$
(8)

and

$$\begin{aligned} q_2 = w_2 + x_2i + y_2j + z_2k \end{aligned}$$
(9)

where \(w_1, w_2, x_1, x_2, y_1, y_2, z_1, z_2\) are real numbers, and \(i\), \(j\), and \(k\) are the fundamental quaternion units.

Addition and Subtraction: Quaternions can be added and subtracted component-wise33:

$$\begin{aligned} q_1 + q_2 = (w_1 + w_2) + (x_1 + x_2)i + (y_1 + y_2)j + (z_1 + z_2)k \end{aligned}$$
(10)
$$\begin{aligned} q_1 - q_2 = (w_1 - w_2) + (x_1 - x_2)i + (y_1 - y_2)j + (z_1 - z_2)k \end{aligned}$$
(11)

Multiplication: The product of two quaternions is given by33:

$$\begin{aligned} \begin{aligned} q_1 q_2 =&\, (w_1w_2 - x_1x_2 - y_1y_2 - z_1z_2) \\ &+ (w_1x_2 + x_1w_2 + y_1z_2 - z_1y_2)i \\ &+ (w_1y_2 - x_1z_2 + y_1w_2 + z_1x_2)j \\ &+ (w_1z_2 + x_1y_2 - y_1x_2 + z_1w_2)k \end{aligned} \end{aligned}$$
(12)

Conjugation: The conjugate of a quaternion \(q = w + xi + yj + zk\) is defined as33:

$$\begin{aligned} q^* = w - xi - yj - zk \end{aligned}$$
(13)

Norm: The norm of a quaternion \(q = w + xi + yj + zk\) is given by33:

$$\begin{aligned} |q| = \sqrt{w^2 + x^2 + y^2 + z^2} \end{aligned}$$
(14)

Inverse: The inverse of a non-zero quaternion \(q = w + xi + yj + zk\) is calculated as33:

$$\begin{aligned} q^{-1} = \frac{q^*}{|q|^2} = \frac{w - xi - yj - zk}{w^2 + x^2 + y^2 + z^2} \end{aligned}$$
(15)

Unit quaternions and rotations

Unit quaternions, or normalized quaternions, have a norm equal to one and are essential in representing rotations in a three-dimensional space. A unit quaternion \(q = w + xi + yj + zk\) satisfies the condition33:

$$\begin{aligned} |q| = 1 \end{aligned}$$
(16)

To depict rotation utilizing a quaternion, the quaternion must be a unit quaternion. Rotations can be readily combined by multiplying the respective unit quaternions. This attribute renders quaternions exceptionally efficient and stable for computations related to 3D rotations, circumventing the issues of gimbal lock linked to Euler angles and facilitating smooth interpolations25,34,35.

The proposed cancelable biometric system

Methodology

The suggested system is an unimodal identification system that depends solely on one biometric modality: face images. The system depends on the EMD to analyze input images by breaking them down into a sequence of IMFs. The initial IMF encapsulates the high-frequency and high-energy content of the original image, while the following IMFs denote lower-frequency components with diminishing energy levels as in Fig. 1.

The biometric system functions in two separate stages: the enrolment stage and the verification stage. The user biometric data is collected during the enrolment step to create a cancelable template. A query biometric is obtained during the verification step, and an identical procedure is employed to generate a cancelable template for matching. User verification is accomplished by comparing the enrolled template with the query template. The procedures for enrollment and verification are depicted in Fig. 2.

Fig. 2
Fig. 2
Full size image

Enrollment and the verification phases of the biometric identification system.

The suggested method begins with the acquisition of facial biometric data, which is then processed by EMD to produce a sequence of IMFs. The IMFs are expressed in quaternion form, as depicted in Fig. 3 for explaining the proposed method for generating the cancelable template. The non-commutative multiplication property of quaternion mathematics is then applied. The output is normalized to yield a unit value retained as a cancelable template in the application database.

The quaternions are represented as follows:

$$\begin{aligned} q_1&= 0 + \text {IMF}_1 i + \text {IMF}_2 j + \text {IMF}_3 k, \end{aligned}$$
(17)
$$\begin{aligned} q_2&= 0 + \text {IMF}_4 i + \text {IMF}_5 j + \text {IMF}_6 k, \end{aligned}$$
(18)
$$\begin{aligned} q_3&= 0 + \text {IMF}_7 i + \text {IMF}_8 j + \text {IMF}_9 k. \end{aligned}$$
(19)

The utilization of quaternions for generating cancelable biometric templates is represented in 3 steps as follows:

Step 1: Compute \(q_1 \cdot q_2\)

Using quaternion multiplication, the result is:

$$\begin{aligned} q_1 \cdot q_2&= -( \text {IMF}_1 \text {IMF}_4 + \text {IMF}_2 \text {IMF}_5 + \text {IMF}_3 \text {IMF}_6) \\&\quad + (\text {IMF}_2 \text {IMF}_6 - \text {IMF}_3 \text {IMF}_5)i \\&\quad + (\text {IMF}_3 \text {IMF}_4 - \text {IMF}_1 \text {IMF}_6)j \\&\quad + (\text {IMF}_1 \text {IMF}_5 - \text {IMF}_2 \text {IMF}_4)k. \end{aligned}$$

Let this result be denoted as \(q_{12}\).

Step 2: Multiply \(q_{12}\) by \(q_3\)

Let \(q_{12} = a + bi + cj + dk\), where:

$$a = -( \text {IMF}_1 \text {IMF}_4 + \text {IMF}_2 \text {IMF}_5 + \text {IMF}_3 \text {IMF}_6),$$
$$b = \text {IMF}_2 \text {IMF}_6 - \text {IMF}_3 \text {IMF}_5,$$
$$c = \text {IMF}_3 \text {IMF}_4 - \text {IMF}_1 \text {IMF}_6,$$
$$d = \text {IMF}_1 \text {IMF}_5 - \text {IMF}_2 \text {IMF}_4.$$

Now, compute \(q_{12} \cdot q_3\):

$$\begin{aligned} q_{12} \cdot q_3&= a(0) - (b \cdot \text {IMF}_7 + c \cdot \text {IMF}_8 + d \cdot \text {IMF}_9) \\&\quad + (a \cdot \text {IMF}_7 + c \cdot \text {IMF}_9 - d \cdot \text {IMF}_8)i \\&\quad + (a \cdot \text {IMF}_8 + d \cdot \text {IMF}_7 - b \cdot \text {IMF}_9)j \\&\quad + (a \cdot \text {IMF}_9 + b \cdot \text {IMF}_8 - c \cdot \text {IMF}_7)k. \end{aligned}$$

Let the result of this multiplication be denoted as \(q_{123}\), where:

$$q_{123} = A + Bi + Cj + Dk.$$

Step 3: Compute the unit quaternion. The unit quaternion is obtained by normalizing \(q_{123}\). The norm of \(q_{123}\) is given by:

$$\Vert q_{123}\Vert = \sqrt{A^2 + B^2 + C^2 + D^2}.$$

The unit quaternion is then calculated as:

$$q_{\text {unit}} = \frac{q_{123}}{\Vert q_{123}\Vert } = \frac{A}{\Vert q_{123}\Vert } + \frac{B}{\Vert q_{123}\Vert }i + \frac{C}{\Vert q_{123}\Vert }j + \frac{D}{\Vert q_{123}\Vert }k.$$

Ultimately, the \(q_{\text {unit}}\) is preserved as the produced biometric template, as depicted in Fig. 3.

Fig. 3
Fig. 3
Full size image

Illustration of the proposed biometric template generation process.

Template revocation and replacement mechanism

The suggested method depends on the intrinsic characteristics of quaternion mathematics and the biometric data transformation process for template revocation and replacement. The essential steps are as follows:

Template Revocation: Each biometric input is subjected to EMD to derive IMFs, which are subsequently encoded using quaternion transformations. Should a template be compromised, its security can be nullified by eliminating the pertinent transformation parameters and quaternion mappings linked to it. Without specific criteria, the compromised template becomes inoperative, safeguarding system security.

Template Replacement: A novel template can be produced by utilizing an alternative set of transformation parameters on the original biometric data. The quaternion mappings and transformation rules are contingent on the key. They are not reliant on the compromised template, ensuring that the new template remains unlinkable to the previous one. This attribute maintains the biometric system cancelability and reusability without compromising its recognition efficacy.

Utilization of quaternion mathematics guarantees that the changed templates are not directly reversible, obstructing unauthorized access or reconstruction of the original biometric information. The system depends on this technique to preserve template diversity and avert cross-matching between revoked and substituted templates.

Simulation results

The suggested method employs data-hiding techniques to safeguard biometric templates. EMD initially decomposes the biometric input, yielding a sequence of IMFs. Quaternion mathematics is subsequently employed on these IMFs, converting them into a secure template. This procedure guarantees the security of biometric data by integrating it within a non-commutative mathematical structure.

This section delineates the outcomes of the suggested method. The simulation studies depend on a MacBook with 32 GB of memory, using MATLAB 2023b. The datasets utilized in the experiments comprise the Olivetti Research Laboratory (ORL) for facial images and Labeled Faces in the Wild (LFW): a database for studying face recognition in unconstrained environments11,12. All cancelable templates have dimensions of 128 \(\times\) 128, with face images resized to this resolution. The average processing time of the enrollment and verification process is 0.7035 s.

The proposed method depends on EMD and quaternion mathematical methods to generate cancelable biometric templates. To evaluate the relationship between the original and the cancelable biometric templates, the correlation coefficient \(c_r\) is used. A diminished value of \(c_r\) signifies an elevated degree of robustness of the cancelable template.

The verification procedure is assessed using two metrics: EER and AROC36. The EER functions as a metric of system precision, where diminished values signify enhanced accuracy. Conversely, the AROC is used to assess system efficiency, with a value approaching one signifying enhanced efficiency. The authentic and fraudulent score distributions, together with the ROC curve, are obtained using simulation studies.

Figures 4 and 6 display representative images from the ORL and LFW face datasets alongside their histograms. Figures 5 and 7 illustrate cancelable templates and their corresponding histograms using the proposed encryption-like methodology. The correlation coefficient (\(c_r\)) between the original and cancelable templates approaches zero, signifying the robustness and great efficacy of the template generation process.

Fig. 4
Fig. 4
Full size image

Samples from ORL dataset (a) original face images and (b) image histograms.

Fig. 5
Fig. 5
Full size image

Cancelable templates based on EMD and quaternion mathematics for ORL dataset (a) cancelable templates and (b) histograms of cancelable templates.

Fig. 6
Fig. 6
Full size image

Samples from LFW dataset (a) original face images and (b) image histograms.

Fig. 7
Fig. 7
Full size image

Cancelable templates based on EMD and quaternion mathematics for LFW dataset (a) cancelable templates and (b) histograms of cancelable templates.

Figures 8 and 9 represent the distributions of authentic and fraudulent scores, as well as the ROC curves in different cases. Table 1 presents the numerical values of EER and AROC. The data in the table indicates that the proposed cancelable biometric recognition algorithm exhibits high performance in the verification process, as reflected by AROC values approaching 1. Furthermore, the EER approaches 0, signifying the system great accuracy.

Table 1 Performance metrics of the proposed cancelable biometric recognition system using different datasets.
Fig. 8
Fig. 8
Full size image

Simulation results for ORL dataset (a) Verification results of genuine and impostor distribution curves. (b) Verification results of AROC curve.

Fig. 9
Fig. 9
Full size image

Simulation results for LFW dataset (a) Verification results of genuine and impostor distribution curves. (b) Verification results of AROC curve.

The little discrepancy between the EER of 0.00 and the AROC of 0.9997 might be ascribed to the granularity and distribution of the underlying data. The EER metric denotes the precise juncture at which the False Accept Rate (FAR) matches the False Reject Rate (FRR), with a value of approximately 0.00, signifying an impeccably distinguishing system for the assessed dataset. Nonetheless, the AROC is a comprehensive metric derived from the integral of the ROC curve over all threshold values, offering an overarching perspective on system performance. The result of 0.9997 indicates an almost perfect separation of templates, although it may slightly differ from 1 due to the aggregate effect of thresholds. Hence, the system performance is virtually flawless but not entirely absolute. This disparity frequently arises in practical systems as a result of interpolation techniques or minor flaws in the dataset.

The simulation results indicate that the suggested cancelable biometric recognition algorithm successfully reconciles the four essential criteria of cancelable biometric systems. By integrating EMD and randomly produced quaternions, the approach guarantees the generation of a unique cancelable template for each user. This method facilitates the creation of several cancelable templates from identical facial images without undermining the system efficiency or performance. Simulation outcomes across multiple areas validate the superior efficacy of the suggested system. Table 2 demonstrates that the system surpasses current state-of-the-art techniques15,22,23,26,27. The analysis of the EER and FAR underscores the enhanced efficacy of the proposed system.

Table 2 Comparison of the proposed EMD-Quaternion cancelable biometric system with other methods.

Conclusion

This research work introduced an innovative method for constructing a cancelable biometric recognition system for IoT applications by integrating EMD and quaternion mathematics. The suggested method creates cancelable biometric templates by converting deconstructed biometric features into a quaternion format. This transformation expands the data into four-dimensional space, augmenting complexity and security.

In contrast to conventional methods, this method does not depend directly on the user’s initial biometric data, facilitating template updates, while preserving user privacy. The proposed system effectiveness was confirmed by simulations and comparison trials, revealing low EER values and high AROC scores, underscoring its high performance. An extensive complexity analysis encompassing computational time assessment validated its feasibility for real-time applications.

This system depends on developing techniques like EMD and quaternion mathematics to substantially improve the security and adaptability of access control in IoT systems, rendering it a good solution for privacy-preserving biometric authentication in contemporary cyber-physical contexts.