Skip to main content
Top

2019 | OriginalPaper | Chapter

Biometric Image Encryption Algorithm Based on Modified Rubik’s Cube Principle

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Multi-biometric systems are being mostly installed in many large-scale biometric applications most importantly UIDAI system in India. However, multi-biometric systems require storage of multiple biometric templates for each user that results in increased risk to user privacy and cybercrimes. Among all the biometrics, fingerprints are widely used in personal verification systems especially from small-scale to large-scale organization. Encryption of the biometric images is very important due to increasingly use of insecure systems and networks for storage, transmission, and verification. We proposed encryption algorithm based on modified Rubik’s cube principle for fingerprint biometric images in this paper. Secret key for the encryption is obtained from the same fingerprint biometric image that assists in key management and storage for further decryption and verification process. The principle of Rubik’s cube involves row and column rotation or changing of the pixels position. Further, bitwise XOR operation through modifications in secret key adds to security of the biometric images. Experimental simulations were performed to obtain the encryption parameters and validate the algorithm through common attacks such as noise and compression. Thus, the proposed encryption algorithm may be applied to fingerprint images used in attendance monitoring systems since it provides key management and does not involve complex calculations.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Murugan B, Gounder AGN (2016) Image encryption scheme based on blockbased confusion and multiple levels of diffusion. IET Comput Vision 10(6):593–602CrossRef Murugan B, Gounder AGN (2016) Image encryption scheme based on blockbased confusion and multiple levels of diffusion. IET Comput Vision 10(6):593–602CrossRef
2.
go back to reference Bringer J, Chabanne H, Patey A (2013) Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends. Sig Process Mag 30(2):42–52CrossRef Bringer J, Chabanne H, Patey A (2013) Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends. Sig Process Mag 30(2):42–52CrossRef
3.
go back to reference Bhatnagar G, Wu QJ, Raman B (2012) A new fractional random wavelet transform for fingerprint security. IEEE Trans Syst Man Cybern Part A Syst Hum 42(1):262–275CrossRef Bhatnagar G, Wu QJ, Raman B (2012) A new fractional random wavelet transform for fingerprint security. IEEE Trans Syst Man Cybern Part A Syst Hum 42(1):262–275CrossRef
4.
go back to reference Bhatnagar G, Wu QJ (2012) Chaos-based security solution for fingerprint data during communication and transmission. IEEE Trans Instrum Meas 61(4):876–887CrossRef Bhatnagar G, Wu QJ (2012) Chaos-based security solution for fingerprint data during communication and transmission. IEEE Trans Instrum Meas 61(4):876–887CrossRef
5.
go back to reference Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos,” Springer Multimedia Tools and Applications, pp 1–31 Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos,” Springer Multimedia Tools and Applications, pp 1–31
6.
go back to reference Nagar A, Nandakumar K, Jain AK (2012) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forensics Secur 7(1):255–268CrossRef Nagar A, Nandakumar K, Jain AK (2012) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forensics Secur 7(1):255–268CrossRef
7.
go back to reference Hongjuna L, Xingyuana W (2010) Color image encryption based on one-time keys and robust chaotic maps. Elsevier J Comput Math Appl 5:3320–3327 Hongjuna L, Xingyuana W (2010) Color image encryption based on one-time keys and robust chaotic maps. Elsevier J Comput Math Appl 5:3320–3327
8.
go back to reference Philip Chen CL, Zhang T, Zhou Y (2012) Image encryption algorithm based on a new combined chaotic system. In: IEEE International conference on systems, man, and cybernetics Philip Chen CL, Zhang T, Zhou Y (2012) Image encryption algorithm based on a new combined chaotic system. In: IEEE International conference on systems, man, and cybernetics
9.
go back to reference Wang Y et al (2011) A new chaos-based fast image encryption algorithm. Elsevier J Appl Soft Comput 11:514–522 Wang Y et al (2011) A new chaos-based fast image encryption algorithm. Elsevier J Appl Soft Comput 11:514–522
10.
go back to reference Wu X, Wang Z (2015) A new DWT-based lossless chaotic encryption scheme for color images. In: IEEE international conference on computer and computational sciences Wu X, Wang Z (2015) A new DWT-based lossless chaotic encryption scheme for color images. In: IEEE international conference on computer and computational sciences
11.
go back to reference Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761MathSciNetCrossRefMATH Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761MathSciNetCrossRefMATH
Metadata
Title
Biometric Image Encryption Algorithm Based on Modified Rubik’s Cube Principle
Authors
Mahendra V. Patil
Avinash D. Gawande
Dilendra
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-00665-5_171