Skip to main content

2019 | OriginalPaper | Buchkapitel

Biometric Image Encryption Algorithm Based on Modified Rubik’s Cube Principle

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Multi-biometric systems are being mostly installed in many large-scale biometric applications most importantly UIDAI system in India. However, multi-biometric systems require storage of multiple biometric templates for each user that results in increased risk to user privacy and cybercrimes. Among all the biometrics, fingerprints are widely used in personal verification systems especially from small-scale to large-scale organization. Encryption of the biometric images is very important due to increasingly use of insecure systems and networks for storage, transmission, and verification. We proposed encryption algorithm based on modified Rubik’s cube principle for fingerprint biometric images in this paper. Secret key for the encryption is obtained from the same fingerprint biometric image that assists in key management and storage for further decryption and verification process. The principle of Rubik’s cube involves row and column rotation or changing of the pixels position. Further, bitwise XOR operation through modifications in secret key adds to security of the biometric images. Experimental simulations were performed to obtain the encryption parameters and validate the algorithm through common attacks such as noise and compression. Thus, the proposed encryption algorithm may be applied to fingerprint images used in attendance monitoring systems since it provides key management and does not involve complex calculations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Murugan B, Gounder AGN (2016) Image encryption scheme based on blockbased confusion and multiple levels of diffusion. IET Comput Vision 10(6):593–602CrossRef Murugan B, Gounder AGN (2016) Image encryption scheme based on blockbased confusion and multiple levels of diffusion. IET Comput Vision 10(6):593–602CrossRef
2.
Zurück zum Zitat Bringer J, Chabanne H, Patey A (2013) Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends. Sig Process Mag 30(2):42–52CrossRef Bringer J, Chabanne H, Patey A (2013) Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends. Sig Process Mag 30(2):42–52CrossRef
3.
Zurück zum Zitat Bhatnagar G, Wu QJ, Raman B (2012) A new fractional random wavelet transform for fingerprint security. IEEE Trans Syst Man Cybern Part A Syst Hum 42(1):262–275CrossRef Bhatnagar G, Wu QJ, Raman B (2012) A new fractional random wavelet transform for fingerprint security. IEEE Trans Syst Man Cybern Part A Syst Hum 42(1):262–275CrossRef
4.
Zurück zum Zitat Bhatnagar G, Wu QJ (2012) Chaos-based security solution for fingerprint data during communication and transmission. IEEE Trans Instrum Meas 61(4):876–887CrossRef Bhatnagar G, Wu QJ (2012) Chaos-based security solution for fingerprint data during communication and transmission. IEEE Trans Instrum Meas 61(4):876–887CrossRef
5.
Zurück zum Zitat Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos,” Springer Multimedia Tools and Applications, pp 1–31 Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos,” Springer Multimedia Tools and Applications, pp 1–31
6.
Zurück zum Zitat Nagar A, Nandakumar K, Jain AK (2012) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forensics Secur 7(1):255–268CrossRef Nagar A, Nandakumar K, Jain AK (2012) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forensics Secur 7(1):255–268CrossRef
7.
Zurück zum Zitat Hongjuna L, Xingyuana W (2010) Color image encryption based on one-time keys and robust chaotic maps. Elsevier J Comput Math Appl 5:3320–3327 Hongjuna L, Xingyuana W (2010) Color image encryption based on one-time keys and robust chaotic maps. Elsevier J Comput Math Appl 5:3320–3327
8.
Zurück zum Zitat Philip Chen CL, Zhang T, Zhou Y (2012) Image encryption algorithm based on a new combined chaotic system. In: IEEE International conference on systems, man, and cybernetics Philip Chen CL, Zhang T, Zhou Y (2012) Image encryption algorithm based on a new combined chaotic system. In: IEEE International conference on systems, man, and cybernetics
9.
Zurück zum Zitat Wang Y et al (2011) A new chaos-based fast image encryption algorithm. Elsevier J Appl Soft Comput 11:514–522 Wang Y et al (2011) A new chaos-based fast image encryption algorithm. Elsevier J Appl Soft Comput 11:514–522
10.
Zurück zum Zitat Wu X, Wang Z (2015) A new DWT-based lossless chaotic encryption scheme for color images. In: IEEE international conference on computer and computational sciences Wu X, Wang Z (2015) A new DWT-based lossless chaotic encryption scheme for color images. In: IEEE international conference on computer and computational sciences
11.
Zurück zum Zitat Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761MathSciNetCrossRefMATH Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761MathSciNetCrossRefMATH
Metadaten
Titel
Biometric Image Encryption Algorithm Based on Modified Rubik’s Cube Principle
verfasst von
Mahendra V. Patil
Avinash D. Gawande
Dilendra
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-00665-5_171

Neuer Inhalt