Biometric Image Encryption Algorithm Based on Modified Rubik’s Cube Principle
Multi-biometric systems are being mostly installed in many large-scale biometric applications most importantly UIDAI system in India. However, multi-biometric systems require storage of multiple biometric templates for each user that results in increased risk to user privacy and cybercrimes. Among all the biometrics, fingerprints are widely used in personal verification systems especially from small-scale to large-scale organization. Encryption of the biometric images is very important due to increasingly use of insecure systems and networks for storage, transmission, and verification. We proposed encryption algorithm based on modified Rubik’s cube principle for fingerprint biometric images in this paper. Secret key for the encryption is obtained from the same fingerprint biometric image that assists in key management and storage for further decryption and verification process. The principle of Rubik’s cube involves row and column rotation or changing of the pixels position. Further, bitwise XOR operation through modifications in secret key adds to security of the biometric images. Experimental simulations were performed to obtain the encryption parameters and validate the algorithm through common attacks such as noise and compression. Thus, the proposed encryption algorithm may be applied to fingerprint images used in attendance monitoring systems since it provides key management and does not involve complex calculations.
KeywordsEncryption algorithm Biometric images Key management Attacks
Fingerprint images are used the author and co-authors. The Consent of all participants was taken.
- 5.Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos,” Springer Multimedia Tools and Applications, pp 1–31Google Scholar
- 7.Hongjuna L, Xingyuana W (2010) Color image encryption based on one-time keys and robust chaotic maps. Elsevier J Comput Math Appl 5:3320–3327Google Scholar
- 8.Philip Chen CL, Zhang T, Zhou Y (2012) Image encryption algorithm based on a new combined chaotic system. In: IEEE International conference on systems, man, and cyberneticsGoogle Scholar
- 10.Wu X, Wang Z (2015) A new DWT-based lossless chaotic encryption scheme for color images. In: IEEE international conference on computer and computational sciencesGoogle Scholar