Open Access Open Access  Restricted Access Subscription or Fee Access

Application of Chaotic Encryption to Secure the Fingerprint Data

Ahmed Sabri(1*), Mohamed Ouslim(2)

(1) LMSE Lab. Electronics dept. University USTO-MB, Algeria
(2) 1LMSE Lab. Electronics dept. University USTO-MB, Algeria
(*) Corresponding author



To secure biometric data transmission over a network of computers, the cryptography is used as it proves its efficiency and appears to be as an interesting solution. In this paper, we propose a new chaotic encryption system for the fingerprint image. A detailed description of encryption and decryption algorithms is given. Both permutation and diffusion operations employ the new multimodal Piece-Wise Linear Chaotic Map. The chaos-based method is analyzed using several tests on a standard fingerprint database. The obtained results are presented together with a deep analysis, to indicate that the proposed encryption system is extremely secure due to its large key’s value and the good performance of the permutation-diffusion processes. Furthermore, according to the conducted simulation tests, we showed that this algorithm has successfully passed the National Institute of Standards and Technology Special Publication 800-22a tests and security analyses, which confirms that the proposed scheme is a robust cryptographic system when applied to fingerprint images.
Copyright © 2016 Praise Worthy Prize - All rights reserved.


Biometric Data; Crypto-Biometric System; Chaotic System; Encryption; Fingerprint

Full Text:



H. Chen, A novel algorithm of fingerprint encryption using minutiae based transformation, Pattern Recognit. Lett, Vol. 32, no. 2, pp. 305-309, 2011.

T. Ahmad, J. Hu, and S. Wang, Pair-polar coordinate-based cancellable fingerprint templates, Pattern Recognit. Lett, Vol. 44, no. 10, pp. 2555-2564, 2011.

K. Jain, A. Ross, and S. Pankanti, Biometrics: A tool for informationsecurity, IEEE Trans. Inform. Forensics Sec., Vol. 1, pp. 125-143, 2006.

G. Bhatnagar, Q.M.J. Wu, B. Raman, A new fractional random wavelet transform for fingerprint security, IEEE Trans. SMC, Vol. 42, no. 1, pp. 262-275, 2012.

A. Kanso and M. Ghebleh, A novel image encryption algorithm based on a 3D chaotic map, Commun. Nonlinear Sci. Numer. Simul, Vol. 17, no. 7, PP. 2943-2959, 2012.

A.A. Abd El-Latif and X. Niu, A hybrid chaotic system and cyclic elliptic curve for image encryption, AEU-Int. J. Electron. Commun, Vol. 67, no. 2, pp. 136-143, 2013.

C. Fu, B.B. Lin, Y.S. Miao, X. Liu, J.J. Chen, A novel chaos-based bit level permutation scheme for digital image encryption, Opt. Commun, Vol. 284, no. 23, pp. 5415-5423, 2011.

A.A. Abd El-Latif, L .Li, N. Wang, Q. Han, X. Niu, A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces, Signal Process, Vol. 93, no. 11, pp. 2986-3000, 2013.

X. Wang and D. Luan, A novel image encryption algorithm using chaos and reversible cellular automata, Commun. Nonlinear Sci. Numer. Simul, Vol. 18, no. 11, pp. 3075-3085, 2013.

C. Soutar and G. J. Tomko, Secure private key Generation using a Fingerprint, Proc. CardTech/SecurTech Conf., Vol. 1, pp. 245-252, 1996.

C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. V. Kumar, Biometrics encryption using image processing, Proc. Of SPIE-Optical Security Counterfeit Deterrence Techniques II, San Jose, CA, Vol. 3341, pp. 178-188, 1998.

N. K. Ratha, J. Connell, and R. Bolle, Secure biometrics authentication, Proc. Workshop Autom. Identification Adv. Technol., Morristown, NJ, 1999.

U. Uludag, S. Pankanti, and S. Prabhakar, Biometrics cryptosystems: Issues and challenges, Proc. IEEE, Vol. 92, no. 6, pp. 948-960, Jun. 2004.

D. Moon, Y. Chung, S. B. Pan, K. Moon, and K. I. Chung, An efficient selective encryption of fingerprint images for embedded processors, ETRIJ. , Vol. 28, no. 4, pp. 444-452, Aug. 2006.

N. Balaji and N. Nagaraj, Cryptanalysis of a chaotic image encryption algorithm, National conference on nonlinear systems and dynamics, Vol. 1, pp. 1-14, 2008.

G. Bhatnagar, Q.M.J. Wu, Chaos-based security solution for fingerprint data during communication and transmission, IEEE Trans., Vol. 61, no. 4, pp. 876-887, 2012.

G. Bhatnagar and Q. M. Jonahtan Wu, A novel chaos-based secure transmission of biometric data, Neurocomputing, Vol. 147, no. 2, pp. 444-455, 2015.

H. -I. Hsiao and J. Lee, Fingerprint image cryptography based on multiple chaotic systems, Signal Process., Vol. 113, no. 4, pp. 169-181, 2015.

M.A. Murillo-Escobar, C. Cruz-Hernndez, F. Abundiz-Prez, R.M. Lpez-Gutirrez, A robust embedded biometric authentication system based on fingerprint and chaotic encryption, Expert Systems with Applications, Vol.42 , no. 3, pp. 8198-8211, 2015.

G. Bhatnagar, Q. M. J. Wu, Chaos-Based Security Solution for Fingerprint Data during Communication and Transmission, IEEE Trans. IM., Vol. 61, no. 4, APRIL 2012.

R. Matthews, On the derivation of a chaotic encryption algorithm, Cryptologia, Vol. 13, no. 1, pp. 29-42, 1989.

L. Kocarev, G. Jakimoski, T. Stojanovski, and U. Parlitz, From chaotic maps to encryption schemes, IEEE Proc. Int. Symp. Circuits Syst., Vol. 4, pp. 514-517, 1998.

G. Jakimoski and L. Kocarev, Chaos and cryptography: Block encryption ciphers based on chaotic maps, IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., Vol. 48, no. 2, pp. 163-169, Feb. 2001.

F. Sun, S. Liu, Z. Li, and Z. Lu, A novel image encryption scheme based on spatial chaos map, Chaos Solitons Fractals, Vol. 38, no. 3, pp. 631-640, 2008.

L. Zhang, X. Liao, and X. Wang, An image encryption approach based on chaotic maps, Chaos Solitons Fractals, Vol. 24, no. 3, pp. 759-765, 2005.

N. K. Pareek, V. Patidar, and K. K. Sud, Image encryption using chaotic logistic map, Image Vis. Comput., Vol. 24, no. 9, pp. 926-934, 2006.

Z. J. Fang, X. Lu, W. M. Wei, and S. Z. Wang, mage scrambling based on bit shuffling of pixels, J. Optoelectron. Laser, Vol. 18, no. 12, pp. 1486-1488, 2007.

T. G. Gao and Z. Q. Chen, Image encryption based on a new total shuffling algorithm, Chaos Solitons Fractals, Vol. 38, no. 1, pp. 213 220, 2008.

F. Han, J. Hu, X. Yu, and Y. Wang Fingerprint images encryption via multi-scroll chaotic attractors, Appl. Math. Comput. Vol. 185, no. 2, pp. 931-939, 2007.

S. Zhao, H. Li, and X. Yan, A secure and efficient fingerprint images encryption scheme, Proc. Int. Conf. Young Comput. Sci., pp. 2803-2808, 2008.

D. Cui, A novel fingerprint encryption algorithm based on chaotic system and fractional Fourier transform, Proc. Int. Conf. Mach. Vis. Human-Machine Interface, pp. 168-171, 2010.

Y. Ruisong, G. Weichuang, A Chaos-based Image Encryption Scheme Using Multimodal Skew Tent Maps, Journal of Emerging Trends in Computing and Information Sciences, Vol. 4, No. 10, pp. 800-810, October 2013.

H. Zhou, A design methodology of chaotic stream ciphers and the realization problems in finite precision, Ph.D. dissertation, Dept. Elect. Eng., Fudan Univ., Shanghai, China, 1996.

A. Sabri, Combinaison de la cryptographie et du watermarking pour renforcer la sécurité de la transmission des données biométriques dans un réseau informatique, thèse de magister, USTOMB-Alegria, 2013.

Recommendation for Key Management: Part1: General (Revision3), NIST SP800-57, 〈 tpubs/800-57/ sp800-57_part1_rev3_general.pdf〉, 2012.

H. Hsiao, J. Lee, Fingerprint image cryptography based on multiple chaotic systems, Signal Processing, Vol. 113, pp. 169–181, 2015.

X. Wang, H. Zhang, A color image encryption with heterogeneous bit-permutation and correlated chaos, Optics Communications, Vol. 342, pp. 51–60, 2015.

R. Liu, Chaos-based fingerprint images encryption using symmetric cryptography, Proceedings of IEEE International Conference on Fuzzy Systems and Knowledge Discovery, pp. 2153–2156, 2012.

Y. Zhou, L. Bao, C.L. Philip Chen, Image encryption using a new parametric switching chaotic system, Signal Process,Vol. 93, no. 11, pp. 3039–3052, 2013.

C. E. Shannon, Communication theory of secrecy system, Bell Syst. Tech. J, Vol. 28, pp. 656-715, 1949.

S.M. Seyedzadeh, S. Mirzakuchaki, A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map, Signal Process, Vol. 92, no. 5, pp. 1202-1215, 2012.

C. Fu, J. Chen, H. Zou, W. Meng, Y. Zhan, Y. Yu, A chaos-based digital image encryption scheme with an improved diffusion strategy, Opt. Express, Vol. 20, no. 3,pp. 2363–2378, 2012.

Y. Zhang, X. Wang, A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice, Inf.Sci. Vol. 273, pp. 329–351, 2014.

Y. Wu, G. Yang, H. Jin, J.P. Noonan, Image encryption using the two-dimensional logistic chaotic map, J. Electron. Imaging, Vol. 21, no. 1, 2012.

Y.Wu,Y.Zhou, G.Saveriades, S.Agaian, J.P.Noonan, P.Natarajan, Local Shannon entropy measure with statistical tests for image randomness, Inf.Sci. Vol. 222, pp. 323–342, 2013.

F. Pareschi, R. Rovatti, G. Setti, On statistical tests for randomness included in the NISTSP800-22 Test Suite and based on the binomial distribution, IEEE Trans. Inf. Forensics Secur. Vol. 7, no. 2, pp. 491–505, 2012.


Please send any question about this web site to
Copyright © 2005-2022 Praise Worthy Prize