Biometric Image Security Using Chaos Algorithm

Biometric Image Security Using Chaos Algorithm

Sugandha Agarwal, O.P. Singh, Deepak Nagaria
DOI: 10.4018/IJICTHD.2017040103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this world of Advanced Technology, the Biometrics are proved to be a significant method for user identification. However, the use of biometric is not new, but these days, with the increase in multimedia applications, it has gained its popularity in analysing human characteristics for security purposes. Biometric Encryption using Chaos Algorithm is a technique used to make it more convenient to the user and to provide high level security. The most prominent physical biometric patterns investigated for security purposes are the fingerprint, hand, eye, face, and voice. In the proposed image encryption scheme, an external secret key of 160-bit is used. The initial conditions for the logistic map are derived using the external secret key. The results obtained through experimental analysis provide an efficient and secure way for real-time image encryption and transmission.
Article Preview
Top

Literature Review

Several encryption algorithms (Maniccam & Bourbakis, 2001; Jiun-In & Cheng, n.d.; Gu & Han, 2006; Seyedzade et al., 2010; Zhou et al., 2014; Younes & Jantan, 2008; Sinha & Singh, 2003; Zeghid et al., 2007; Xiao & Zhang, 2006; Alsafasfeh & Arfoa, 2011) have been proposed including Lossless image compression and encryption using SCAN by S.S.Maniccam, N.G. Bourbakis (Maniccam & Bourbakis, 2001), Mirror-like image encryption algorithm by Jiun-In Guo, Jui-Cheng Yen (Jiun-In & Cheng, n.d), Image encryption based on hash function by Seyed Mohammad Seyedzade, Reza Ebrahimi Atani and Sattar Mirzakuchak (Seyedzade et al., 2010) and Image encryption using Block-Based Transformation Algorithm by Mohammad Ali, Bani Younes and Aman Jantan (Younes & Jantan, 2008), but Chaos-based encryption techniques (Gu & Han, 2006; Zhou et al., 2014; Alsafasfeh & Arfoa, 2011) are considered good for practical use as these techniques provide a good combination of speed, high security, complexity and computational power etc. Consequently, the traditional ciphers like AES, DES, and RSA etc. are not suitable for real time image encryption as these ciphers require a large computational time and high computing power. For real time image encryption, only those ciphers are preferable which take lesser amount of time and at the same time without compromising security.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing