Skip to main content

2015 | OriginalPaper | Buchkapitel

A Novel Biometric Fingerprint Template Based Method for Stream Cipher Design

verfasst von : Musheer Ahmad, Bashir Alam

Erschienen in: Information Systems Design and Intelligent Applications

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In biometric-based security systems, generation of random biometric keys is a significant means to realize secure, reliable and robust data confidentiality. Here, a novel method for stream cipher design is proposed using biometric fingerprint template. The biometric feature vector is extracted from user’s fingerprint in discrete wavelet transform domain. The feature vector is shuffled and inter-mixed with chaotic sequence to eliminate similar patterns, if any. The whole method of enciphering and deciphering is under the control of user’s secret key and fingerprint template. The method is apt enough to yield great encryption effect and can resist cryptographic attacks. The method is tested on digital images to investigate its encryption performance. The measures like histogram distribution, pixels auto-correlation, entropy, plain-image sensitivity are assessed and compared with recent proposals to demonstrate effectiveness, suitability and consistency of proposed method.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jagadeesan, A., Duraiswamy, K.: Secured cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris. Int. J. Comput. Sci. Inf. Secur. 7(2), 28–37 (2010) Jagadeesan, A., Duraiswamy, K.: Secured cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris. Int. J. Comput. Sci. Inf. Secur. 7(2), 28–37 (2010)
2.
Zurück zum Zitat Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenized random number. Pattern Recogn. 37(11), 2245–2255 (2004)CrossRef Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenized random number. Pattern Recogn. 37(11), 2245–2255 (2004)CrossRef
3.
Zurück zum Zitat Bhoi, N., Mohanty, M.N.: Template matching based eye detection in facial image. Int. J. Comput. Appl. 12(5), 15–18 (2010) Bhoi, N., Mohanty, M.N.: Template matching based eye detection in facial image. Int. J. Comput. Appl. 12(5), 15–18 (2010)
4.
Zurück zum Zitat Khan, K.M., Zhang, J., Tian, L.: Chaotic secure content-based hidden transmission of biometric templates. Chaos, Solitons Fractals 32(5), 1749–1759 (2007)CrossRef Khan, K.M., Zhang, J., Tian, L.: Chaotic secure content-based hidden transmission of biometric templates. Chaos, Solitons Fractals 32(5), 1749–1759 (2007)CrossRef
5.
Zurück zum Zitat Maiorana, E.: Biometric cryptosystem using function based on-line signature recognition. Expert Syst. Appl. 37(4), 3454–3461 (2010)CrossRef Maiorana, E.: Biometric cryptosystem using function based on-line signature recognition. Expert Syst. Appl. 37(4), 3454–3461 (2010)CrossRef
6.
Zurück zum Zitat Kocarev, L., Galias, Z., Lian, S.: Intelligent Computing Based on Chaos. Springer, Berlin (2009) Kocarev, L., Galias, Z., Lian, S.: Intelligent Computing Based on Chaos. Springer, Berlin (2009)
7.
Zurück zum Zitat Kocarev, L., Lian, S.: Chaos Based Cryptography: Theory, Algorithms and Applications. Springer, Berlin (2011)CrossRefMATH Kocarev, L., Lian, S.: Chaos Based Cryptography: Theory, Algorithms and Applications. Springer, Berlin (2011)CrossRefMATH
8.
Zurück zum Zitat Ahmad, M., Ahmad, T.: Securing multimedia color imagery using multiple high dimensional chaos based hybrid keys. Int. J. Commun. Netw. Distrib. Syst. 12(1), 113–128 (2014)CrossRef Ahmad, M., Ahmad, T.: Securing multimedia color imagery using multiple high dimensional chaos based hybrid keys. Int. J. Commun. Netw. Distrib. Syst. 12(1), 113–128 (2014)CrossRef
9.
Zurück zum Zitat Verma, O.P., Nizam, M., Ahmad, M.: Modified multi chaotic systems that are based on pixel shuffle for image encryption. J. Inf. Process. Syst. 9(2), 271–286 (2013)CrossRef Verma, O.P., Nizam, M., Ahmad, M.: Modified multi chaotic systems that are based on pixel shuffle for image encryption. J. Inf. Process. Syst. 9(2), 271–286 (2013)CrossRef
10.
Zurück zum Zitat Jain, A., Bolle, R., Pankanti, S.: Biometrics: Personal Identification in Networked Society. Kluwer Academic Publisher, Dordrecht (2002) Jain, A., Bolle, R., Pankanti, S.: Biometrics: Personal Identification in Networked Society. Kluwer Academic Publisher, Dordrecht (2002)
11.
Zurück zum Zitat Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurcat. Chaos 15(10), 3119–3151 (2005)MathSciNetCrossRefMATH Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurcat. Chaos 15(10), 3119–3151 (2005)MathSciNetCrossRefMATH
12.
Zurück zum Zitat Liu, Y., Tong, X.J.: A new pseudorandom number generator based on complex number chaotic equation. Chin. Phys. B 21(9), 090506–090508 (2012)CrossRef Liu, Y., Tong, X.J.: A new pseudorandom number generator based on complex number chaotic equation. Chin. Phys. B 21(9), 090506–090508 (2012)CrossRef
13.
Zurück zum Zitat Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129 (2006)MathSciNetCrossRefMATH Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129 (2006)MathSciNetCrossRefMATH
14.
Zurück zum Zitat Hermassi, H., Rhouma, R., Belghith, S.: Improvement of an image encryption algorithm based on hyper-chaos. Telecommun. Syst. 52(2), 539–549 (2013) Hermassi, H., Rhouma, R., Belghith, S.: Improvement of an image encryption algorithm based on hyper-chaos. Telecommun. Syst. 52(2), 539–549 (2013)
15.
16.
Zurück zum Zitat Wang, X.-Y., Chen, F., Wang, T.: A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2479–2485 (2010)MathSciNetCrossRefMATH Wang, X.-Y., Chen, F., Wang, T.: A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2479–2485 (2010)MathSciNetCrossRefMATH
17.
Zurück zum Zitat Fu, C., Lin, B., Miao, Y., Liu, X., Chen, J.: A novel chaos-based bit-level permutation scheme for digital image encryption. Opt. Commun. 284(23), 5415–5423 (2011)CrossRef Fu, C., Lin, B., Miao, Y., Liu, X., Chen, J.: A novel chaos-based bit-level permutation scheme for digital image encryption. Opt. Commun. 284(23), 5415–5423 (2011)CrossRef
18.
Zurück zum Zitat Anees, A., Siddiqui, A.M., Ahmed, F.: Chaotic substitution for highly auto-correlated data in encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 19(9), 3106–3118 (2014)MathSciNetCrossRef Anees, A., Siddiqui, A.M., Ahmed, F.: Chaotic substitution for highly auto-correlated data in encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 19(9), 3106–3118 (2014)MathSciNetCrossRef
19.
Zurück zum Zitat Luo, Y., Du, M., Liu, J.: A symmetrical image encryption scheme in wavelet and time domain. Commun. Nonlinear Sci. Numer. Simul. 20(2), 447–460 (2015)CrossRef Luo, Y., Du, M., Liu, J.: A symmetrical image encryption scheme in wavelet and time domain. Commun. Nonlinear Sci. Numer. Simul. 20(2), 447–460 (2015)CrossRef
20.
Zurück zum Zitat Sun, F., Lü, Z., Liu, S.: A new cryptosystem based on spatial chaotic system. Opt. Commun. 283(10), 2066–2073 (2010)CrossRef Sun, F., Lü, Z., Liu, S.: A new cryptosystem based on spatial chaotic system. Opt. Commun. 283(10), 2066–2073 (2010)CrossRef
Metadaten
Titel
A Novel Biometric Fingerprint Template Based Method for Stream Cipher Design
verfasst von
Musheer Ahmad
Bashir Alam
Copyright-Jahr
2015
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2247-7_43

Premium Partner