Advertisement

Biometric Image Encryption Algorithm Based on Modified Rubik’s Cube Principle

  • Mahendra V. PatilEmail author
  • Avinash D. Gawande
  • Dilendra
Conference paper
Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB, volume 30)

Abstract

Multi-biometric systems are being mostly installed in many large-scale biometric applications most importantly UIDAI system in India. However, multi-biometric systems require storage of multiple biometric templates for each user that results in increased risk to user privacy and cybercrimes. Among all the biometrics, fingerprints are widely used in personal verification systems especially from small-scale to large-scale organization. Encryption of the biometric images is very important due to increasingly use of insecure systems and networks for storage, transmission, and verification. We proposed encryption algorithm based on modified Rubik’s cube principle for fingerprint biometric images in this paper. Secret key for the encryption is obtained from the same fingerprint biometric image that assists in key management and storage for further decryption and verification process. The principle of Rubik’s cube involves row and column rotation or changing of the pixels position. Further, bitwise XOR operation through modifications in secret key adds to security of the biometric images. Experimental simulations were performed to obtain the encryption parameters and validate the algorithm through common attacks such as noise and compression. Thus, the proposed encryption algorithm may be applied to fingerprint images used in attendance monitoring systems since it provides key management and does not involve complex calculations.

Keywords

Encryption algorithm Biometric images Key management Attacks 

Notes

Acknowledgements

Fingerprint images are used the author and co-authors. The Consent of all participants was taken.

References

  1. 1.
    Murugan B, Gounder AGN (2016) Image encryption scheme based on blockbased confusion and multiple levels of diffusion. IET Comput Vision 10(6):593–602CrossRefGoogle Scholar
  2. 2.
    Bringer J, Chabanne H, Patey A (2013) Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends. Sig Process Mag 30(2):42–52CrossRefGoogle Scholar
  3. 3.
    Bhatnagar G, Wu QJ, Raman B (2012) A new fractional random wavelet transform for fingerprint security. IEEE Trans Syst Man Cybern Part A Syst Hum 42(1):262–275CrossRefGoogle Scholar
  4. 4.
    Bhatnagar G, Wu QJ (2012) Chaos-based security solution for fingerprint data during communication and transmission. IEEE Trans Instrum Meas 61(4):876–887CrossRefGoogle Scholar
  5. 5.
    Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos,” Springer Multimedia Tools and Applications, pp 1–31Google Scholar
  6. 6.
    Nagar A, Nandakumar K, Jain AK (2012) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forensics Secur 7(1):255–268CrossRefGoogle Scholar
  7. 7.
    Hongjuna L, Xingyuana W (2010) Color image encryption based on one-time keys and robust chaotic maps. Elsevier J Comput Math Appl 5:3320–3327Google Scholar
  8. 8.
    Philip Chen CL, Zhang T, Zhou Y (2012) Image encryption algorithm based on a new combined chaotic system. In: IEEE International conference on systems, man, and cyberneticsGoogle Scholar
  9. 9.
    Wang Y et al (2011) A new chaos-based fast image encryption algorithm. Elsevier J Appl Soft Comput 11:514–522CrossRefGoogle Scholar
  10. 10.
    Wu X, Wang Z (2015) A new DWT-based lossless chaotic encryption scheme for color images. In: IEEE international conference on computer and computational sciencesGoogle Scholar
  11. 11.
    Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Mahendra V. Patil
    • 1
    Email author
  • Avinash D. Gawande
    • 2
  • Dilendra
    • 1
  1. 1.Faculty of EngineeringPacific Academy of Higher Education and Research UniversityUdaipurIndia
  2. 2.Department of Computer Science and EngineeringSipna College of Engineering and TechnologyAmravatiIndia

Personalised recommendations