scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission

04 Jan 2012-IEEE Transactions on Instrumentation and Measurement (IEEE)-Vol. 61, Iss: 4, pp 876-887
TL;DR: A novel encryption technique based on reversible hidden transform (RHT) and fractional wavelet packet transform (FrWPT) to change the gray values in the spatial domain using RHT followed by the deformation of FrWPT coefficients by singular value decomposition and chaotic map.
Abstract: In this paper, a security solution during communication and transmission of fingerprint data is proposed in the form of a novel encryption technique based on reversible hidden transform (RHT) and fractional wavelet packet transform (FrWPT). The core idea of the proposed technique is to change the gray values in the spatial domain using RHT followed by the deformation of FrWPT coefficients by singular value decomposition and chaotic map. Hence, security solution relies on both spatial and frequency domains. Finally, a reliable decryption scheme is also presented to reconstruct the original fingerprint image from the encrypted image. Experimental results and security analysis demonstrate the efficiency and robustness of the proposed scheme.
Citations
More filters
Journal ArticleDOI

[...]

TL;DR: In the proposed image encryption, this spatiotemporal chaotic system has more outstanding cryptography features in dynamics than the logistic map or the system of coupled map lattices does, and the strategy of bit-level pixel permutation is employed.
Abstract: We propose a new image encryption algorithm based on the spatiotemporal chaos of the mixed linear–nonlinear coupled map lattices. This spatiotemporal chaotic system has more outstanding cryptography features in dynamics than the logistic map or the system of coupled map lattices does. In the proposed image encryption, we employ the strategy of bit-level pixel permutation which enables the lower bit planes and higher bit planes of pixels permute mutually without any extra storage space. Simulations have been carried out and the results demonstrate the superior security and high efficiency of the proposed algorithm.

430 citations

Journal ArticleDOI

[...]

TL;DR: Experimental results and performance analysis demonstrate the proposed lightweight image encryption strategy based on chaos is an efficient, secure and robust encryption mechanism and it realizes effective coding compression to satisfy desirable storage.
Abstract: There has been an increasing concern for effective storages and secure transactions of multimedia information over the Internet. Then a great variety of encryption schemes have been proposed to ensure the information security while transmitting, but most of current approaches are designed to diffuse the data only in spatial domain which result in reducing storage efficiency. A lightweight image encryption strategy based on chaos is proposed in this paper. The encryption process is designed in transform domain. The original image is decomposed into approximation and detail components using integer wavelet transform (IWT); then as the more important component of the image, the approximation coefficients are diffused by secret keys generated from a spatiotemporal chaotic system followed by inverse IWT to construct the diffused image; finally a plain permutation is performed for diffusion image by the Logistic mapping in order to reduce the correlation between adjacent pixels further. Experimental results and performance analysis demonstrate the proposed scheme is an efficient, secure and robust encryption mechanism and it realizes effective coding compression to satisfy desirable storage.

110 citations

Journal ArticleDOI

[...]

TL;DR: A new and efficient pixel-level image encryption algorithm that enhances the connection between position shuffling for pixels and value changing for grayness and shows increased faster speed and satisfies the performance requirements of real-time communication.
Abstract: In this paper, a new and efficient pixel-level image encryption algorithm is presented. In contrast to the traditional permutation–diffusion architecture, the proposed method enhances the connection between position shuffling for pixels and value changing for grayness. As a result, the separate attack becomes more difficult when attacking our structure of permutation–rewriting–diffusion (PRD). Before the diffusion operation, a rewriting function is applied to the permuted image in a simple way, which can be seen as a remedy for permutation’s inability to change the frequency of pixels. Moreover, the keystream is designed dependent upon the plain-image. Therefore, the proposed method can disturb the chosen plain-image and known plain-image attacks. Experimental results together with security analysis also show good efficiency of the PRD mechanism. Compared to some bit-level-based image encryption algorithms, our method shows increased faster speed and satisfies the performance requirements of real-time communication.

88 citations

Journal ArticleDOI

[...]

TL;DR: A novel fingerprint template protection scheme based on chaotic encryption by using the logistic map and Murillo-Escobar's algorithm and a novel implementation in a 32 bit microcontroller for secure authentication systems to show its application on embedded expert systems.
Abstract: Chaos and fingerprint data are combined for a highly secure authentication system.Embedded system in a 32-bit microcontroller with high performance at low cost.Murillo-Escobar's algorithm is implemented to protect template and avoid identity theft.Security analysis of encryption verifies the secrecy of the personal data.Performance and resources analysis justify the implementation of the system. Fingerprint recognition is a reliable solution in user authentication systems. Nevertheless, the security and secrecy of the users data are a concern in today's biometric systems and most of the security attention is focused in biometric template protection to avoid identity theft. In recent years, several approaches have been presented where the main objective is to have the biometric revocable, but almost all them have failed in verify their security and robustness. In last years, chaotic systems have been proposed in cryptography due they have several properties related with cryptography properties such as extreme sensibility on initial conditions with confusion and ergodicity with diffusion. In this paper, we present a novel fingerprint template protection scheme based on chaotic encryption by using the logistic map and Murillo-Escobar's algorithm (Murillo-Escobar et al., 2014). In addition, we present a novel implementation of our scheme in a 32 bit microcontroller for secure authentication systems to show its application on embedded expert systems. In contrast with recent approaches presented in literature, we present a complete security analysis in both statistical and implementation level, to justify the proposed scheme in a real application. Based in the results, the proposed embedded authentication system is secure, effective and at low cost, and it could be implemented on real secure access control systems.

67 citations

Journal ArticleDOI

[...]

TL;DR: An edge-based lightweight image encryption scheme using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform that can resist noise attack to some extent is proposed.
Abstract: In some special multimedia applications, only the regions with semantic information should be provided better protection whereas the other smooth regions can be free of encryption. However, most of the existing multimedia security schemes only consider bits and pixels rather than semantic information during their encryption. Motivated by this, we propose an edge-based lightweight image encryption scheme using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform. An image is first carried out by the edge detection based on advanced CNN structure with adaptive thresholds to assess data significance in the image. The detection output is a binary image, in which a “1” reflects the detected pixel whereas a “0” is opposite. Both the detected image and the original image are divided into non-overlapping pixel blocks in the same way, respectively. Whether each block is encrypted or not depends on the significance judged by the corresponding detected block. The significant block is performed by reversible hidden transform followed by multiple-order discrete fractional cosine transform parameters and orders of these two transforms are determined by a two dimensional cross chaotic map. Experiment results show the significant contour features of an image that have been largely hidden only by encrypting about half pixels in the average sense. The keys are extremely sensitive and the proposed scheme can resist noise attack to some extent.

48 citations

References
More filters
Journal ArticleDOI

[...]

TL;DR: In this paper, the problem of approximating one matrix by another of lower rank is formulated as a least-squares problem, and the normal equations cannot be immediately written down, since the elements of the approximate matrix are not independent of one another.
Abstract: The mathematical problem of approximating one matrix by another of lower rank is closely related to the fundamental postulate of factor-theory. When formulated as a least-squares problem, the normal equations cannot be immediately written down, since the elements of the approximate matrix are not independent of one another. The solution of the problem is simplified by first expressing the matrices in a canonic form. It is found that the problem always has a solution which is usually unique. Several conclusions can be drawn from the form of this solution. A hypothetical interpretation of the canonic components of a score matrix is discussed.

3,152 citations


"Chaos-Based Security Solution for F..." refers background in this paper

  • [...]

  • [...]

  • [...]

  • [...]

  • [...]

Journal ArticleDOI

[...]

TL;DR: The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
Abstract: Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such as e-commerce. In this paper we outline the inherent strengths of biometrics-based authentication, identify the weak links in systems employing biometrics-based authentication, and present new solutions for eliminating some of these weak links. Although, for illustration purposes, fingerprint authentication is used throughout, our analysis extends to other biometrics-based methods.

1,601 citations

Journal ArticleDOI

[...]

TL;DR: The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.
Abstract: In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this communication, we propose a new approach for image encryption based on chaotic logistic maps in order to meet the requirements of the secure image transfer. In the proposed image encryption scheme, an external secret key of 80-bit and two chaotic logistic maps are employed. The initial conditions for the both logistic maps are derived using the external secret key by providing different weightage to all its bits. Further, in the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and which one of them will be used for a particular pixel is decided by the outcome of the logistic map. To make the cipher more robust against any attack, the secret key is modified after encrypting each block of sixteen pixels of the image. The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.

995 citations

Journal ArticleDOI

[...]

01 Sep 1997
TL;DR: The design and implementation of a prototype automatic identity-authentication system that uses fingerprints to authenticate the identity of an individual is described and an improved minutiae-extraction algorithm is developed that is faster and more accurate than the earlier algorithm.
Abstract: Fingerprint verification is an important biometric technique for personal identification. We describe the design and implementation of a prototype automatic identity-authentication system that uses fingerprints to authenticate the identity of an individual. We have developed an improved minutiae-extraction algorithm that is faster and more accurate than our earlier algorithm (1995). An alignment-based minutiae-matching algorithm has been proposed. This algorithm is capable of finding the correspondences between input minutiae and the stored template without resorting to exhaustive search and has the ability to compensate adaptively for the nonlinear deformations and inexact transformations between an input and a template. To establish an objective assessment of our system, both the Michigan State University and the National Institute of Standards and Technology NIST 9 fingerprint data bases have been used to estimate the performance numbers. The experimental results reveal that our system can achieve a good performance on these data bases. We also have demonstrated that our system satisfies the response-time requirement. A complete authentication procedure, on average, takes about 1.4 seconds on a Sun ULTRA I workstation (it is expected to run as fast or faster on a 200 HMz Pentium).

954 citations


"Chaos-Based Security Solution for F..." refers background or methods in this paper

  • [...]

  • [...]

Journal ArticleDOI

[...]

18 May 2004
TL;DR: This work presents various methods that monolithically bind a cryptographic key with the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication.
Abstract: In traditional cryptosystems, user authentication is based on possession of secret keys; the method falls apart if the keys are not kept secret (i.e., shared with non-legitimate users). Further, keys can be forgotten, lost, or stolen and, thus, cannot provide non-repudiation. Current authentication systems based on physiological and behavioral characteristics of persons (known as biometrics), such as fingerprints, inherently provide solutions to many of these problems and may replace the authentication component of traditional cryptosystems. We present various methods that monolithically bind a cryptographic key with the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication. We assess the performance of one of these biometric key binding/generation algorithms using the fingerprint biometric. We illustrate the challenges involved in biometric key generation primarily due to drastic acquisition variations in the representation of a biometric identifier and the imperfect nature of biometric feature extraction and matching algorithms. We elaborate on the suitability of these algorithms for digital rights management systems.

906 citations