Skip to main content
Top

2018 | OriginalPaper | Chapter

Secure Biometric Authentication Scheme Based on Chaotic Map

Authors : Jiahao Liang, Lin You

Published in: Algorithms and Architectures for Parallel Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Biometric authentication system has been widely used because of its convenience. But the development of science and technology has brought new challenges to biological information in the authentication system. In this paper, a revocable biometric template authentication scheme based on chaotic map is proposed. The scheme uses a piecewise Logistic chaotic mapping system to generate key sequences to encrypt biometric data and changes the way of traditional biometric authentication system which directly stored biometric templates in plaintext. Our scheme enables the storage and matching of biometrics in the encryption domain and it has improved the security of the biometric identity authentication in open network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Deng, S.J., Li, C.D.: Chaos theory and its application in cryptography. J. Civil, Archit. Environ. Eng. 25(5), 123–127 (2003) Deng, S.J., Li, C.D.: Chaos theory and its application in cryptography. J. Civil, Archit. Environ. Eng. 25(5), 123–127 (2003)
2.
go back to reference Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Sig. Process. 2008(1), 1–17 (2008) Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Sig. Process. 2008(1), 1–17 (2008)
3.
go back to reference You, L., Yang, L., Yu, W., Wu, Z.: A cancelable fuzzy vault algorithm based on transformed fingerprint features. Chin. J. Electron. 26(2), 236–243 (2017)CrossRef You, L., Yang, L., Yu, W., Wu, Z.: A cancelable fuzzy vault algorithm based on transformed fingerprint features. Chin. J. Electron. 26(2), 236–243 (2017)CrossRef
4.
go back to reference Kaur, M., Sofat, S.: Fuzzy vault template protection for multimodal biometric system. In: International Conference on Computing, Communication and Automation, pp. 237–243. IEEE, Greater Noida (2011) Kaur, M., Sofat, S.: Fuzzy vault template protection for multimodal biometric system. In: International Conference on Computing, Communication and Automation, pp. 237–243. IEEE, Greater Noida (2011)
5.
go back to reference Lim, M.H., Teoh, A.B.J., Kim, J.: Biometric feature-type transformation: making templates compatible for secret protection. IEEE Signal Process. Mag. 32(5), 77–87 (2015)CrossRef Lim, M.H., Teoh, A.B.J., Kim, J.: Biometric feature-type transformation: making templates compatible for secret protection. IEEE Signal Process. Mag. 32(5), 77–87 (2015)CrossRef
6.
go back to reference Gomez-Barrero, M., Maiorana, E., Galbally, J., Campisi, P., Fierrez, J.: Multi-biometric template protection based on homomorphic encryption. Pattern Recognit. 67(C), 149–163 (2017)CrossRef Gomez-Barrero, M., Maiorana, E., Galbally, J., Campisi, P., Fierrez, J.: Multi-biometric template protection based on homomorphic encryption. Pattern Recognit. 67(C), 149–163 (2017)CrossRef
7.
go back to reference Teng, L., Wang, X., Meng, J.: A chaotic color image encryption using integrated bit-level permutation. Multimed. Tools Appl. 77(10), 1–14 (2017) Teng, L., Wang, X., Meng, J.: A chaotic color image encryption using integrated bit-level permutation. Multimed. Tools Appl. 77(10), 1–14 (2017)
8.
go back to reference Ahmad, M., Alam, M.Z., Umayya, Z., Khan, S., Ahmad, F.: An image encryption approach using particle swarm optimization and chaotic map. Int. J. Inf. Technol. 10(3), 247–255 (2018) Ahmad, M., Alam, M.Z., Umayya, Z., Khan, S., Ahmad, F.: An image encryption approach using particle swarm optimization and chaotic map. Int. J. Inf. Technol. 10(3), 247–255 (2018)
9.
go back to reference Liew, C.Z., Shaw, R., Li, L., Yang, Y.: Survey on biometric data security and chaotic encryption strategy with Bernoulli mapping. In: 2014 International Conference on Medical Biometrics, pp. 174–180. IEEE, Shenzhen (2014) Liew, C.Z., Shaw, R., Li, L., Yang, Y.: Survey on biometric data security and chaotic encryption strategy with Bernoulli mapping. In: 2014 International Conference on Medical Biometrics, pp. 174–180. IEEE, Shenzhen (2014)
10.
go back to reference Ghouzali, S., Abdul, W.: Private chaotic biometric template protection algorithm. In: Image Information Processing (ICIIP), pp. 655–659. IEEE, Shimla (2013) Ghouzali, S., Abdul, W.: Private chaotic biometric template protection algorithm. In: Image Information Processing (ICIIP), pp. 655–659. IEEE, Shimla (2013)
11.
go back to reference James, D., Philip, M.: A novel face template protection scheme based on chaos and visual cryptography. Int. J. Appl. Inf. Syst. 2(5), 31–35 (2012) James, D., Philip, M.: A novel face template protection scheme based on chaos and visual cryptography. Int. J. Appl. Inf. Syst. 2(5), 31–35 (2012)
12.
go back to reference Supriya, V.G., Manjunatha, R.: Logistic map for cancellable biometrics. In: ICAMT (2016) Supriya, V.G., Manjunatha, R.: Logistic map for cancellable biometrics. In: ICAMT (2016)
13.
go back to reference Bing, L.: A binary sequence scrambling encryption algorithm based on improved logistic mapping. J. China West Normal Univ. (Nat. Sci.) 38(3), 340–346 (2017) Bing, L.: A binary sequence scrambling encryption algorithm based on improved logistic mapping. J. China West Normal Univ. (Nat. Sci.) 38(3), 340–346 (2017)
14.
go back to reference You, L., Wang, J., Yan, B.: A secure finger vein recognition algorithm based on MB-GLBP and logistic mapping. J. Inf. Hiding Multimedia Sig. Process. 7(6), 1231–1242 (2016) You, L., Wang, J., Yan, B.: A secure finger vein recognition algorithm based on MB-GLBP and logistic mapping. J. Inf. Hiding Multimedia Sig. Process. 7(6), 1231–1242 (2016)
15.
go back to reference Cheng, W., An, G.: Face template protection using chaotic encryption. In: 5th IET International Conference on Wireless, Mobile and Multimedia Networks, pp. 245–248. IET, Beijing (2013) Cheng, W., An, G.: Face template protection using chaotic encryption. In: 5th IET International Conference on Wireless, Mobile and Multimedia Networks, pp. 245–248. IET, Beijing (2013)
16.
go back to reference Fu, C., Zhu, Z.: A chaotic image encryption scheme based on circular bit shift method. In: International Conference for Young Computer Scientists, pp. 3057–3061. IEEE, Zhang Jiajie (2008) Fu, C., Zhu, Z.: A chaotic image encryption scheme based on circular bit shift method. In: International Conference for Young Computer Scientists, pp. 3057–3061. IEEE, Zhang Jiajie (2008)
Metadata
Title
Secure Biometric Authentication Scheme Based on Chaotic Map
Authors
Jiahao Liang
Lin You
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-05063-4_50

Premium Partner