Skip to main content

A Novel Security Architecture for Biometric Templates Using Visual Cryptography and Chaotic Image Encryption

  • Conference paper
Eco-friendly Computing and Communication Systems (ICECCS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 305))

Abstract

Protection of biometric data and templatesis a crucial issue for the security of biometric systems This paper proposes new security architecture for biometric templates using visual cryptography and chaotic image encryption. The use of visual cryptography is explored to preserve the privacy of biometric image by decomposing the original image into two images (known as sheets) such that the original image can be revealed only when both images are simultaneously available; the individual sheet images do not reveal the identity of the original image. The algorithm ensures protection as well as privacy for image using a fast encryption algorithm based on chaotic encryption. Chaos based cryptography is applied on to individual shares. Using this one can cross verify his identity along with the protection and privacy of the image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jain, A., Uludag, U.: Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25(11), 1494–1498 (2003)

    Article  Google Scholar 

  2. Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  3. Shamir, A.: How to Share a Secret. ACM Communication 22, 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  4. Blakley, G.R.: Safeguarding Cryptographic Keys. In: Proceedings of AFIPS Conference, vol. 48, pp. 313–317 (1970)

    Google Scholar 

  5. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  6. Borchert, B.: Segment Based Visual Cryptography. WSI Press, Germany (2007)

    Google Scholar 

  7. Yan, W.-Q., Jin, D., Kanakanahalli, M.S.: Visual Cryptography for Print and Scan Applications, pp. 572–575. IEEE (2004)

    Google Scholar 

  8. Monoth, T., Babu, A.P.: Recursive Visual Cryptography Using Random Basis Column Pixel Expansion. In: Proceedings of IEEE International Conference on Information Technology, pp. 41–43 (2007)

    Google Scholar 

  9. Kim, H.J., Sachnev, V., Choi, S.J., Xiang, S.: An Innocuous Visual Cryptography Scheme. In: Proceedings of IEEE-8th International Workshop on Image Analysis for Multimedia Interactive Services (2007)

    Google Scholar 

  10. Blundo, C., De Santis, A.: On the contrast in Visual Cryptography Schemes. Journal on Cryptography 12, 261–289 (1999)

    MATH  Google Scholar 

  11. Eisen, P.A., Stinson, D.R.: Threshold Visual Cryptography with speci_ed Whiteness Levels of Reconstructed Pixels. Designs, Codes, Cryptography 25(1), 15–61 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  12. Verheul, E.R., Van Tilborg, H.C.A.: Constructions and Properties of k out of n Visual Secret Sharing Schemes. Designs, Codes, Cryptography 11(2), 179–196 (1997)

    Article  MATH  Google Scholar 

  13. Yan, H., Gan, Z., Chen, K.: A Cheater Detectable Visual Cryptography Scheme. Journal of Shanghai Jiaotong University 38(1) (2004)

    Google Scholar 

  14. Horng, G.B., Chen, T.G., Tsai, D.S.: Cheating in Visua Cryptography. Designs, Codes, Cryptography 38(2), 219–236 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  15. Hu, C.M., Tzeng, W.G.: Cheating Prevention in Visual Cryptography. IEEE Transaction on Image Processing 16(1), 36–45 (2007)

    Article  MathSciNet  Google Scholar 

  16. Fridrich, J.: Symmetric Ciphers Based on Two-dimensional Chaotic Maps. Int. J. Bifurcat. Chaos 8(6), 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  17. Chen, G., Mao, Y.B., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals 12, 749–761 (2004)

    Article  MathSciNet  Google Scholar 

  18. Mao, Y.B., Chen, G., Lian, S.G.: A novel fast image encryption scheme based on the 3D chaotic baker map. Int. J. Bifurcat. Chaos 14(10), 3613–3624 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  19. Guan, Z.H., Huang, F.J., Guan, W.: Chaos-based image encryption algorithm. Phys. Lett. A 346, 153–157 (2005)

    Article  MATH  Google Scholar 

  20. Lian, S.G., Sun, J., Wang, Z.: A block cipher based on a suitable use of chaotic standard map. Chaos, Solitons and Fractals 26(1), 117–129 (2005)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

James, D., Philip, M. (2012). A Novel Security Architecture for Biometric Templates Using Visual Cryptography and Chaotic Image Encryption. In: Mathew, J., Patra, P., Pradhan, D.K., Kuttyamma, A.J. (eds) Eco-friendly Computing and Communication Systems. ICECCS 2012. Communications in Computer and Information Science, vol 305. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32112-2_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32112-2_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32111-5

  • Online ISBN: 978-3-642-32112-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics