{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T01:40:46Z","timestamp":1768095646573,"version":"3.49.0"},"reference-count":38,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,2,18]],"date-time":"2023-02-18T00:00:00Z","timestamp":1676678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Chongqing University of Posts and Telecommunications","award":["BYJS202008"],"award-info":[{"award-number":["BYJS202008"]}]},{"name":"Chongqing University of Posts and Telecommunications","award":["HZ2021015"],"award-info":[{"award-number":["HZ2021015"]}]},{"name":"Chongqing University of Posts and Telecommunications","award":["2021AB026"],"award-info":[{"award-number":["2021AB026"]}]},{"name":"Cooperation project between Chongqing Municipal undergraduate universities and institutes affiliated to the Chinese Academy of Sciences","award":["BYJS202008"],"award-info":[{"award-number":["BYJS202008"]}]},{"name":"Cooperation project between Chongqing Municipal undergraduate universities and institutes affiliated to the Chinese Academy of Sciences","award":["HZ2021015"],"award-info":[{"award-number":["HZ2021015"]}]},{"name":"Cooperation project between Chongqing Municipal undergraduate universities and institutes affiliated to the Chinese Academy of Sciences","award":["2021AB026"],"award-info":[{"award-number":["2021AB026"]}]},{"name":"Bingtuan Science and Technology Program in China","award":["BYJS202008"],"award-info":[{"award-number":["BYJS202008"]}]},{"name":"Bingtuan Science and Technology Program in China","award":["HZ2021015"],"award-info":[{"award-number":["HZ2021015"]}]},{"name":"Bingtuan Science and Technology Program in China","award":["2021AB026"],"award-info":[{"award-number":["2021AB026"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Face recognition technology has developed rapidly in recent years, and a large number of applications based on face recognition have emerged. Because the template generated by the face recognition system stores the relevant information of facial biometrics, its security is attracting more and more attention. This paper proposes a secure template generation scheme based on a chaotic system. Firstly, the extracted face feature vector is permuted to eliminate the correlation within the vector. Then, the orthogonal matrix is used to transform the vector, and the state value of the vector is changed, while maintaining the original distance between the vectors. Finally, the cosine value of the included angle between the feature vector and different random vectors are calculated and converted into integers to generate the template. The chaotic system is used to drive the template generation process, which not only enhances the diversity of templates, but also has good revocability. In addition, the generated template is irreversible, and even if the template is leaked, it will not disclose the biometric information of users. Experimental results and theoretical analysis on the RaFD and Aberdeen datasets show that the proposed scheme has good verification performance and high security.<\/jats:p>","DOI":"10.3390\/e25020378","type":"journal-article","created":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T03:56:07Z","timestamp":1676865367000},"page":"378","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An Irreversible and Revocable Template Generation Scheme Based on Chaotic System"],"prefix":"10.3390","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5471-5621","authenticated-orcid":false,"given":"Jinyuan","family":"Liu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"},{"name":"School of Intelligent Technology and Engineering, Chongqing University of Science and Technology, Chongqing 401331, China"}]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"given":"Kun","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"given":"Zhuo","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Mathematics and Big Data, Guizhou Education University, Guiyang 550018, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,2,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"30813","DOI":"10.1007\/s11042-020-09529-7","article-title":"Implementation face based cancelable multi-biometric system","volume":"79","author":"Ashiba","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_2","unstructured":"Kolberg, J., Drozdowski, P., Gomez-Barrero, M., Rathgeb, C., and Busch, C. (2020, January 16\u201318). Efficiency analysis of post-quantum-secure face template protection schemes based on homomorphic encryption. Proceedings of the 2020 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3403","DOI":"10.1007\/s10462-019-09767-8","article-title":"Cancelable Biometrics: A comprehensive survey","volume":"53","author":"Manisha","year":"2020","journal-title":"Artif. Intell. Rev."},{"key":"ref_4","first-page":"1","article-title":"A survey on biometric cryptosystems and cancelable biometrics","volume":"2011","author":"Rathgeb","year":"2011","journal-title":"EURASIP J. Info. Secur."},{"key":"ref_5","first-page":"18","article-title":"Unlinkable and irreversible biometric template protection based on bloom filters","volume":"370\u2013371","author":"Rathgeb","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2869","DOI":"10.1109\/TIFS.2020.2977533","article-title":"Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing","volume":"15","author":"Ghammam","year":"2020","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Gomez-Barrero, M., Galbally, J., Fierrez, J., and Ortega-Garcia, J. (April, January 29). Face Verification Put to Test: A Hill-Climbing Attack Based on the Uphill-Simplex Algorithm. Proceedings of the 2012 5th IAPR International Conference on Biometrics (ICB), New Delhi, India.","DOI":"10.1109\/ICB.2012.6199756"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"221","DOI":"10.5755\/j01.itc.51.2.29411","article-title":"A Novel Approach for Synchronizing of Fractional Order Uncertain Chaotic Systems in the Presence of Unknown Time-Variant Delay and Disturbance","volume":"51","author":"Linli","year":"2022","journal-title":"Inf. Technol. Control."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"55","DOI":"10.5755\/j01.itc.50.1.28012","article-title":"A Symmetric Key Multiple Color Image Cipher Based on Cellular Automata, Chaos Theory and Image Mixing","volume":"50","author":"SundaraKrishnan","year":"2021","journal-title":"Inf. Technol. Control."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"656","DOI":"10.3390\/e21070656","article-title":"An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic\u2014Tent Map","volume":"21","author":"Ramasamy","year":"2019","journal-title":"Entropy"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.1007\/s00371-020-01873-x","article-title":"Novel approach for multimodal feature fusion to generate cancelable biometric","volume":"37","author":"Gupta","year":"2021","journal-title":"Vis. Comput."},{"key":"ref_12","unstructured":"Kaur, H., and Khanna, P. (2017, January 25\u201327). Non-invertible Biometric Encryption to Generate Cancelable Biometric Templates. Proceedings of the World Congress on Engineering and Computer Science, San Francisco, CA, USA."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"8573","DOI":"10.3390\/app11188573","article-title":"Cancelable Multimodal Biometrics Based on Chaotic Maps","volume":"11","author":"Ghouzali","year":"2021","journal-title":"Appl. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1109\/TIFS.2017.2753172","article-title":"Ranking Based Locality Sensitive Hashing Enabled Cancelable Biometrics: Index-of-Max Hashing","volume":"13","author":"Jin","year":"2017","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Dang, T.M., Tran, L., Nguyen, T.D., and Choi, D. (2020, January 14\u201319). FEHash: Full Entropy Hash for Face Template Protection. Proceedings of the Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Seattle, WA, USA.","DOI":"10.1109\/CVPRW50498.2020.00413"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"28675","DOI":"10.1007\/s11042-020-09319-1","article-title":"Cancellable face template algorithm based on speeded-up robust features and winner-takes-all","volume":"79","author":"Alwan","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2014.02.011","article-title":"Two-factor face authentication using matrix permutation transformation and a user password","volume":"269","author":"Kang","year":"2014","journal-title":"Inf. Sci."},{"key":"ref_18","unstructured":"Nakamura, I., Tonomura, Y., and Kiya, H. (September, January 31). Unitary transform-based template protection and its properties. Proceedings of the 23rd European Signal Processing Conference (EUSIPCO), Nice, France."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2363","DOI":"10.1007\/s11042-019-08228-2","article-title":"RP-LPP: A random permutation based locality preserving projection for cancelable biometric recognition","volume":"79","author":"Kumar","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"22027","DOI":"10.1007\/s11042-021-11284-2","article-title":"CBRC: A novel approach for cancelable biometric template generation using random permutation and Chinese Remainder Theorem","volume":"81","author":"Manisha","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Roh, J., Cho, S., and Jin, S. (2018, January 24\u201326). Learning based biometric key generation method using CNN and RNN. Proceedings of the 10th International Conference on Information Technology and Electrical Engineering (ICITEE), Bali, Indonesia.","DOI":"10.1109\/ICITEED.2018.8534873"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/JIOT.2018.2837751","article-title":"Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security","volume":"6","author":"Choi","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Faragallah, O.S., Naeem, E.A., El-Shafai, W., Ramadan, N., Ahmed, H.E.-D.H., Elnaby, M.M.A., Elashry, I., El-Khamy, S.E., and El-Samie, F.E.A. (2021). Efficient chaotic-Baker-map-based cancelable face recognition. J. Ambient Intell. Human Comput., published online.","DOI":"10.1007\/s12652-021-03398-0"},{"key":"ref_24","first-page":"1","article-title":"Secure chaff-less fuzzy vault for face identification systems. ACM Trans","volume":"17","author":"Dong","year":"2021","journal-title":"Multimed. Comput. Commun. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1016\/j.compeleceng.2018.01.029","article-title":"Securing templates in a face recognition system using Error-Correcting Output Code and chaos theory","volume":"72","author":"Nazari","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"14053","DOI":"10.1007\/s11042-019-08462-8","article-title":"Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption","volume":"79","author":"Ibrahim","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3019","DOI":"10.1016\/j.patcog.2014.03.003","article-title":"Masquerade attack on transform-based binary-template protection based on perceptron learning","volume":"47","author":"Feng","year":"2014","journal-title":"Pattern Recognit."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., and Liu, X. (2018, January 18\u201323). Learning deep models for face anti-spoofing: Binary or auxiliary supervision. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00048"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Mignon, A., and Jurie, F. (2013, January 9\u201313). Reconstructing faces from their signatures using RBF regression. Proceedings of the British Machine Vision Conference 2013, Bristol, UK.","DOI":"10.5244\/C.27.103"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"4615","DOI":"10.1007\/s11071-021-06576-z","article-title":"A chaotic image encryption algorithm based on coupled piecewise sine map and sensitive diffusion structure","volume":"104","author":"Liu","year":"2021","journal-title":"Nonlinear Dyn."},{"key":"ref_31","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"King","year":"2009","journal-title":"J. Mach. Learn. Res."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1377","DOI":"10.1080\/02699930903485076","article-title":"Presentation and validation of the Radboud Faces Database","volume":"24","author":"Langner","year":"2010","journal-title":"Cogn. Emot."},{"key":"ref_33","unstructured":"(2023, January 16). Aberdeen Face Dataset. Available online: http:\/\/pics.stir.ac.uk\/2D_face_sets.htm."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"14477","DOI":"10.1007\/s11042-020-10234-8","article-title":"Fusing structure and color features for cancelable face recognition","volume":"80","author":"Xu","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"107152","DOI":"10.1016\/j.asoc.2021.107152","article-title":"Multi-objective genetic programming for feature learning in face recognition","volume":"103","author":"Bi","year":"2021","journal-title":"Appl. Soft Comput."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Deng, H., Feng, Z., Liu, Y., Luo, D., Yang, X., and Li, H. (2020, January 5\u20136). Face Recognition Algorithm Based on Weighted Intensity PCNN. Proceedings of the 2020 Eighth International Conference on Advanced Cloud and Big Data (CBD), Taiyuan, China.","DOI":"10.1109\/CBD51900.2020.00045"},{"key":"ref_37","unstructured":"(2008). IEEE Standard for Floating-Point Arithmetic (Standard No. IEEE Std 754-2008)."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/TIFS.2014.2384735","article-title":"Hill-Climbing Attacks on Multi-Biometrics Recognition Systems","volume":"10","author":"Maiorana","year":"2015","journal-title":"IEEE Trans. Inf. Forensic Secur."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/2\/378\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:36:12Z","timestamp":1760121372000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/2\/378"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,18]]},"references-count":38,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["e25020378"],"URL":"https:\/\/doi.org\/10.3390\/e25020378","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,18]]}}}