Publication detail

An Efficient and Lossless Fingerprint Encryption Algorithm Using Henon Map & Arnold Transformation

MEHTA, G. DUTTA, M. KARÁSEK, J. KIM, P.

Original Title

An Efficient and Lossless Fingerprint Encryption Algorithm Using Henon Map & Arnold Transformation

English Title

An Efficient and Lossless Fingerprint Encryption Algorithm Using Henon Map & Arnold Transformation

Type

conference paper

Language

en

Original Abstract

In this paper two stage biometric data protection scheme is being proposed using permutation and substitution mechanism of the chaotic theory which is lossless in nature. Arnold transformation and Henon map is used to design an efficient encryption system. The encryption method is aimed at generating an encrypted image that will have statistical properties completely dissimilar from the original image analysis which will make it difficult for any intruder to find any predictable relationship between the original and its corresponding encrypted image. The performance of the method has been experimentally analyzed using statistical analysis and correlation based methods. Correlation coefficient analysis is done to evaluate the behavior of pixels in horizontal and vertical directions and the results are found to be encouraging. This protection scheme provides the ability to encrypt the data and secure it from unauthorized users. Upon decryption the data is completely recovered making this scheme a lossless and efficient method of biometric data security.

English abstract

In this paper two stage biometric data protection scheme is being proposed using permutation and substitution mechanism of the chaotic theory which is lossless in nature. Arnold transformation and Henon map is used to design an efficient encryption system. The encryption method is aimed at generating an encrypted image that will have statistical properties completely dissimilar from the original image analysis which will make it difficult for any intruder to find any predictable relationship between the original and its corresponding encrypted image. The performance of the method has been experimentally analyzed using statistical analysis and correlation based methods. Correlation coefficient analysis is done to evaluate the behavior of pixels in horizontal and vertical directions and the results are found to be encouraging. This protection scheme provides the ability to encrypt the data and secure it from unauthorized users. Upon decryption the data is completely recovered making this scheme a lossless and efficient method of biometric data security.

Keywords

Biometric Encryption, Henon Map, Arnold Map, Authentication, Minutiae point matching

RIV year

2013

Released

13.12.2013

Location

Thiruvananthapuram, Kerala, Republic of India

ISBN

978-1-4799-0573-7

Book

2013 International Conference on Control, Communication and Computing (ICCC 2013)

Pages from

485

Pages to

489

Pages count

5

Documents

BibTex


@inproceedings{BUT102103,
  author="Garima {Mehta} and Malay Kishore {Dutta} and Jan {Karásek} and Pyung Soo {Kim}",
  title="An Efficient and Lossless Fingerprint Encryption Algorithm Using Henon Map & Arnold Transformation",
  annote="In  this  paper  two  stage  biometric  data protection  scheme  is  being  proposed  using  permutation and substitution mechanism of the chaotic theory which is lossless in nature.  Arnold transformation and Henon map is  used  to  design  an  efficient  encryption  system.  The encryption  method  is  aimed  at  generating  an  encrypted image  that  will  have  statistical  properties  completely dissimilar  from  the  original  image  analysis  which  will make it difficult for any intruder to find any predictable relationship  between  the  original  and  its  corresponding encrypted  image.  The  performance  of  the  method  has been  experimentally  analyzed  using  statistical  analysis and  correlation  based  methods.  Correlation  coefficient analysis  is  done  to  evaluate  the  behavior  of  pixels  in horizontal  and  vertical  directions  and  the  results  are found  to be encouraging. This protection scheme provides the  ability  to  encrypt  the  data  and  secure  it  from unauthorized  users.  Upon  decryption  the  data  is completely  recovered  making  this  scheme  a  lossless  and efficient method of biometric data security.",
  booktitle="2013 International Conference on Control, Communication and Computing (ICCC 2013)",
  chapter="102103",
  howpublished="online",
  year="2013",
  month="december",
  pages="485--489",
  type="conference paper"
}