Open Access Open Access  Restricted Access Subscription or Fee Access

Application of Chaotic Encryption to Secure the Fingerprint Data


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v11i9.10190

Abstract


To secure biometric data transmission over a network of computers, the cryptography is used as it proves its efficiency and appears to be as an interesting solution. In this paper, we propose a new chaotic encryption system for the fingerprint image. A detailed description of encryption and decryption algorithms is given. Both permutation and diffusion operations employ the new multimodal Piece-Wise Linear Chaotic Map. The chaos-based method is analyzed using several tests on a standard fingerprint database. The obtained results are presented together with a deep analysis, to indicate that the proposed encryption system is extremely secure due to its large key’s value and the good performance of the permutation-diffusion processes. Furthermore, according to the conducted simulation tests, we showed that this algorithm has successfully passed the National Institute of Standards and Technology Special Publication 800-22a tests and security analyses, which confirms that the proposed scheme is a robust cryptographic system when applied to fingerprint images.
Copyright © 2016 Praise Worthy Prize - All rights reserved.

Keywords


Biometric Data; Crypto-Biometric System; Chaotic System; Encryption; Fingerprint

Full Text:

PDF


References


H. Chen, A novel algorithm of fingerprint encryption using minutiae based transformation, Pattern Recognit. Lett, Vol. 32, no. 2, pp. 305-309, 2011.
http://dx.doi.org/10.1016/j.patrec.2010.09.007

T. Ahmad, J. Hu, and S. Wang, Pair-polar coordinate-based cancellable fingerprint templates, Pattern Recognit. Lett, Vol. 44, no. 10, pp. 2555-2564, 2011.
http://dx.doi.org/10.1016/j.patcog.2011.03.015

K. Jain, A. Ross, and S. Pankanti, Biometrics: A tool for informationsecurity, IEEE Trans. Inform. Forensics Sec., Vol. 1, pp. 125-143, 2006.
http://dx.doi.org/10.1109/tifs.2006.873653

G. Bhatnagar, Q.M.J. Wu, B. Raman, A new fractional random wavelet transform for fingerprint security, IEEE Trans. SMC, Vol. 42, no. 1, pp. 262-275, 2012.
http://dx.doi.org/10.1109/tsmca.2011.2147307

A. Kanso and M. Ghebleh, A novel image encryption algorithm based on a 3D chaotic map, Commun. Nonlinear Sci. Numer. Simul, Vol. 17, no. 7, PP. 2943-2959, 2012.
http://dx.doi.org/10.1016/j.cnsns.2011.11.030

A.A. Abd El-Latif and X. Niu, A hybrid chaotic system and cyclic elliptic curve for image encryption, AEU-Int. J. Electron. Commun, Vol. 67, no. 2, pp. 136-143, 2013.
http://dx.doi.org/10.1016/j.aeue.2012.07.004

C. Fu, B.B. Lin, Y.S. Miao, X. Liu, J.J. Chen, A novel chaos-based bit level permutation scheme for digital image encryption, Opt. Commun, Vol. 284, no. 23, pp. 5415-5423, 2011.
http://dx.doi.org/10.1016/j.optcom.2011.08.013

A.A. Abd El-Latif, L .Li, N. Wang, Q. Han, X. Niu, A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces, Signal Process, Vol. 93, no. 11, pp. 2986-3000, 2013.
http://dx.doi.org/10.1016/j.sigpro.2013.03.031

X. Wang and D. Luan, A novel image encryption algorithm using chaos and reversible cellular automata, Commun. Nonlinear Sci. Numer. Simul, Vol. 18, no. 11, pp. 3075-3085, 2013.
http://dx.doi.org/10.1016/j.cnsns.2013.04.008

C. Soutar and G. J. Tomko, Secure private key Generation using a Fingerprint, Proc. CardTech/SecurTech Conf., Vol. 1, pp. 245-252, 1996.
http://dx.doi.org/10.1109/34084poweri.2014.7117755

C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. V. Kumar, Biometrics encryption using image processing, Proc. Of SPIE-Optical Security Counterfeit Deterrence Techniques II, San Jose, CA, Vol. 3341, pp. 178-188, 1998.
http://dx.doi.org/10.1117/12.304705

N. K. Ratha, J. Connell, and R. Bolle, Secure biometrics authentication, Proc. Workshop Autom. Identification Adv. Technol., Morristown, NJ, 1999.
http://dx.doi.org/10.1007/978-1-4615-1053-6_11

U. Uludag, S. Pankanti, and S. Prabhakar, Biometrics cryptosystems: Issues and challenges, Proc. IEEE, Vol. 92, no. 6, pp. 948-960, Jun. 2004.
http://dx.doi.org/10.1109/jproc.2004.827372

D. Moon, Y. Chung, S. B. Pan, K. Moon, and K. I. Chung, An efficient selective encryption of fingerprint images for embedded processors, ETRIJ. , Vol. 28, no. 4, pp. 444-452, Aug. 2006.
http://dx.doi.org/10.4218/etrij.06.0106.0013

N. Balaji and N. Nagaraj, Cryptanalysis of a chaotic image encryption algorithm, National conference on nonlinear systems and dynamics, Vol. 1, pp. 1-14, 2008.
http://dx.doi.org/10.1007/s11071-011-0155-7

G. Bhatnagar, Q.M.J. Wu, Chaos-based security solution for fingerprint data during communication and transmission, IEEE Trans., Vol. 61, no. 4, pp. 876-887, 2012.
http://dx.doi.org/10.1109/tim.2011.2179330

G. Bhatnagar and Q. M. Jonahtan Wu, A novel chaos-based secure transmission of biometric data, Neurocomputing, Vol. 147, no. 2, pp. 444-455, 2015.
http://dx.doi.org/10.1016/j.neucom.2014.06.040

H. -I. Hsiao and J. Lee, Fingerprint image cryptography based on multiple chaotic systems, Signal Process., Vol. 113, no. 4, pp. 169-181, 2015.
http://dx.doi.org/10.1016/j.sigpro.2015.01.024

M.A. Murillo-Escobar, C. Cruz-Hernndez, F. Abundiz-Prez, R.M. Lpez-Gutirrez, A robust embedded biometric authentication system based on fingerprint and chaotic encryption, Expert Systems with Applications, Vol.42 , no. 3, pp. 8198-8211, 2015.
http://dx.doi.org/10.1016/j.eswa.2015.06.035

G. Bhatnagar, Q. M. J. Wu, Chaos-Based Security Solution for Fingerprint Data during Communication and Transmission, IEEE Trans. IM., Vol. 61, no. 4, APRIL 2012.
http://dx.doi.org/10.1109/tim.2011.2179330

R. Matthews, On the derivation of a chaotic encryption algorithm, Cryptologia, Vol. 13, no. 1, pp. 29-42, 1989.
http://dx.doi.org/10.1080/0161-118991863745

L. Kocarev, G. Jakimoski, T. Stojanovski, and U. Parlitz, From chaotic maps to encryption schemes, IEEE Proc. Int. Symp. Circuits Syst., Vol. 4, pp. 514-517, 1998.
http://dx.doi.org/10.1109/iscas.1998.698968

G. Jakimoski and L. Kocarev, Chaos and cryptography: Block encryption ciphers based on chaotic maps, IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., Vol. 48, no. 2, pp. 163-169, Feb. 2001.
http://dx.doi.org/10.1109/81.904880

F. Sun, S. Liu, Z. Li, and Z. Lu, A novel image encryption scheme based on spatial chaos map, Chaos Solitons Fractals, Vol. 38, no. 3, pp. 631-640, 2008.
http://dx.doi.org/10.1016/j.chaos.2008.01.028

L. Zhang, X. Liao, and X. Wang, An image encryption approach based on chaotic maps, Chaos Solitons Fractals, Vol. 24, no. 3, pp. 759-765, 2005.
http://dx.doi.org/10.1016/j.chaos.2004.09.035

N. K. Pareek, V. Patidar, and K. K. Sud, Image encryption using chaotic logistic map, Image Vis. Comput., Vol. 24, no. 9, pp. 926-934, 2006.
http://dx.doi.org/10.1016/j.imavis.2006.02.021

Z. J. Fang, X. Lu, W. M. Wei, and S. Z. Wang, mage scrambling based on bit shuffling of pixels, J. Optoelectron. Laser, Vol. 18, no. 12, pp. 1486-1488, 2007.
http://dx.doi.org/10.1007/s11801-011-9001-x

T. G. Gao and Z. Q. Chen, Image encryption based on a new total shuffling algorithm, Chaos Solitons Fractals, Vol. 38, no. 1, pp. 213 220, 2008.
http://dx.doi.org/10.1016/j.chaos.2006.11.009

F. Han, J. Hu, X. Yu, and Y. Wang Fingerprint images encryption via multi-scroll chaotic attractors, Appl. Math. Comput. Vol. 185, no. 2, pp. 931-939, 2007.
http://dx.doi.org/10.1016/j.amc.2006.07.030

S. Zhao, H. Li, and X. Yan, A secure and efficient fingerprint images encryption scheme, Proc. Int. Conf. Young Comput. Sci., pp. 2803-2808, 2008.
http://dx.doi.org/10.1109/icycs.2008.49

D. Cui, A novel fingerprint encryption algorithm based on chaotic system and fractional Fourier transform, Proc. Int. Conf. Mach. Vis. Human-Machine Interface, pp. 168-171, 2010.
http://dx.doi.org/10.1109/mvhi.2010.38

Y. Ruisong, G. Weichuang, A Chaos-based Image Encryption Scheme Using Multimodal Skew Tent Maps, Journal of Emerging Trends in Computing and Information Sciences, Vol. 4, No. 10, pp. 800-810, October 2013.
http://dx.doi.org/10.5815/ijcnis.2012.01.05

H. Zhou, A design methodology of chaotic stream ciphers and the realization problems in finite precision, Ph.D. dissertation, Dept. Elect. Eng., Fudan Univ., Shanghai, China, 1996.
http://dx.doi.org/10.1007/978-3-642-82865-2_2

http://en.pudn.com/downloads72/sourcecode/others/detail26410_en.html

A. Sabri, Combinaison de la cryptographie et du watermarking pour renforcer la sécurité de la transmission des données biométriques dans un réseau informatique, thèse de magister, USTOMB-Alegria, 2013.
http://dx.doi.org/10.1016/j.respe.2016.01.049

Recommendation for Key Management: Part1: General (Revision3), NIST SP800-57, 〈http://csrc.nist.gov/publications/nis tpubs/800-57/ sp800-57_part1_rev3_general.pdf〉, 2012.
http://dx.doi.org/10.1109/ecctd.2007.4529674

H. Hsiao, J. Lee, Fingerprint image cryptography based on multiple chaotic systems, Signal Processing, Vol. 113, pp. 169–181, 2015.
http://dx.doi.org/10.1016/j.sigpro.2015.01.024

X. Wang, H. Zhang, A color image encryption with heterogeneous bit-permutation and correlated chaos, Optics Communications, Vol. 342, pp. 51–60, 2015.
http://dx.doi.org/10.1016/j.optcom.2014.12.043

R. Liu, Chaos-based fingerprint images encryption using symmetric cryptography, Proceedings of IEEE International Conference on Fuzzy Systems and Knowledge Discovery, pp. 2153–2156, 2012.
http://dx.doi.org/10.1109/fskd.2012.6234120

Y. Zhou, L. Bao, C.L. Philip Chen, Image encryption using a new parametric switching chaotic system, Signal Process,Vol. 93, no. 11, pp. 3039–3052, 2013.
http://dx.doi.org/10.1016/j.sigpro.2013.04.021

C. E. Shannon, Communication theory of secrecy system, Bell Syst. Tech. J, Vol. 28, pp. 656-715, 1949.
http://dx.doi.org/10.1002/j.1538-7305.1949.tb00928.x

S.M. Seyedzadeh, S. Mirzakuchaki, A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map, Signal Process, Vol. 92, no. 5, pp. 1202-1215, 2012.
http://dx.doi.org/10.1016/j.sigpro.2011.11.004

C. Fu, J. Chen, H. Zou, W. Meng, Y. Zhan, Y. Yu, A chaos-based digital image encryption scheme with an improved diffusion strategy, Opt. Express, Vol. 20, no. 3,pp. 2363–2378, 2012.
http://dx.doi.org/10.1364/oe.20.002363

Y. Zhang, X. Wang, A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice, Inf.Sci. Vol. 273, pp. 329–351, 2014.
http://dx.doi.org/10.1016/j.ins.2014.02.156

Y. Wu, G. Yang, H. Jin, J.P. Noonan, Image encryption using the two-dimensional logistic chaotic map, J. Electron. Imaging, Vol. 21, no. 1, 2012.
http://dx.doi.org/10.1117/1.jei.21.1.013014

Y.Wu,Y.Zhou, G.Saveriades, S.Agaian, J.P.Noonan, P.Natarajan, Local Shannon entropy measure with statistical tests for image randomness, Inf.Sci. Vol. 222, pp. 323–342, 2013.
http://dx.doi.org/10.1016/j.ins.2012.07.049

F. Pareschi, R. Rovatti, G. Setti, On statistical tests for randomness included in the NISTSP800-22 Test Suite and based on the binomial distribution, IEEE Trans. Inf. Forensics Secur. Vol. 7, no. 2, pp. 491–505, 2012.
http://dx.doi.org/10.1109/tifs.2012.2185227


Refbacks




Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize