Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission
- 4 January 2012
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Instrumentation and Measurement
- Vol. 61 (4), 876-887
- https://doi.org/10.1109/tim.2011.2179330
Abstract
In this paper, a security solution during communication and transmission of fingerprint data is proposed in the form of a novel encryption technique based on reversible hidden transform (RHT) and fractional wavelet packet transform (FrWPT). The core idea of the proposed technique is to change the gray values in the spatial domain using RHT followed by the deformation of FrWPT coefficients by singular value decomposition and chaotic map. Hence, security solution relies on both spatial and frequency domains. Finally, a reliable decryption scheme is also presented to reconstruct the original fingerprint image from the encrypted image. Experimental results and security analysis demonstrate the efficiency and robustness of the proposed scheme.Keywords
This publication has 28 references indexed in Scilit:
- Fractional dual tree complex wavelet transform and its application to biometric security during communication and transmissionFuture Generation Computer Systems, 2012
- A novel image encryption scheme based on spatial chaos mapChaos, Solitons, and Fractals, 2008
- Image encryption based on a new total shuffling algorithmChaos, Solitons, and Fractals, 2008
- An Efficient Selective Encryption of Fingerprint Images for Embedded ProcessorsETRI Journal, 2006
- Image encryption using chaotic logistic mapImage and Vision Computing, 2006
- Quality Assessment of Biometric Systems: A Comprehensive Perspective Based on Accuracy and Performance MeasurementIEEE Transactions on Instrumentation and Measurement, 2005
- An image encryption approach based on chaotic mapsChaos, Solitons, and Fractals, 2004
- Chaos and cryptography: block encryption ciphers based on chaotic mapsIEEE Transactions on Circuits and Systems I: Regular Papers, 2001
- An identity-authentication system using fingerprintsProceedings of the IEEE, 1997
- ON THE DERIVATION OF A “CHAOTIC” ENCRYPTION ALGORITHMCryptologia, 1989