Skip to main content

A Novel Biometric Fingerprint Template Based Method for Stream Cipher Design

  • Conference paper
  • First Online:
Information Systems Design and Intelligent Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 340))

Abstract

In biometric-based security systems, generation of random biometric keys is a significant means to realize secure, reliable and robust data confidentiality. Here, a novel method for stream cipher design is proposed using biometric fingerprint template. The biometric feature vector is extracted from user’s fingerprint in discrete wavelet transform domain. The feature vector is shuffled and inter-mixed with chaotic sequence to eliminate similar patterns, if any. The whole method of enciphering and deciphering is under the control of user’s secret key and fingerprint template. The method is apt enough to yield great encryption effect and can resist cryptographic attacks. The method is tested on digital images to investigate its encryption performance. The measures like histogram distribution, pixels auto-correlation, entropy, plain-image sensitivity are assessed and compared with recent proposals to demonstrate effectiveness, suitability and consistency of proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jagadeesan, A., Duraiswamy, K.: Secured cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris. Int. J. Comput. Sci. Inf. Secur. 7(2), 28–37 (2010)

    Google Scholar 

  2. Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenized random number. Pattern Recogn. 37(11), 2245–2255 (2004)

    Article  Google Scholar 

  3. Bhoi, N., Mohanty, M.N.: Template matching based eye detection in facial image. Int. J. Comput. Appl. 12(5), 15–18 (2010)

    Google Scholar 

  4. Khan, K.M., Zhang, J., Tian, L.: Chaotic secure content-based hidden transmission of biometric templates. Chaos, Solitons Fractals 32(5), 1749–1759 (2007)

    Article  Google Scholar 

  5. Maiorana, E.: Biometric cryptosystem using function based on-line signature recognition. Expert Syst. Appl. 37(4), 3454–3461 (2010)

    Article  Google Scholar 

  6. Kocarev, L., Galias, Z., Lian, S.: Intelligent Computing Based on Chaos. Springer, Berlin (2009)

    Google Scholar 

  7. Kocarev, L., Lian, S.: Chaos Based Cryptography: Theory, Algorithms and Applications. Springer, Berlin (2011)

    Book  MATH  Google Scholar 

  8. Ahmad, M., Ahmad, T.: Securing multimedia color imagery using multiple high dimensional chaos based hybrid keys. Int. J. Commun. Netw. Distrib. Syst. 12(1), 113–128 (2014)

    Article  Google Scholar 

  9. Verma, O.P., Nizam, M., Ahmad, M.: Modified multi chaotic systems that are based on pixel shuffle for image encryption. J. Inf. Process. Syst. 9(2), 271–286 (2013)

    Article  Google Scholar 

  10. Jain, A., Bolle, R., Pankanti, S.: Biometrics: Personal Identification in Networked Society. Kluwer Academic Publisher, Dordrecht (2002)

    Google Scholar 

  11. Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurcat. Chaos 15(10), 3119–3151 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  12. Liu, Y., Tong, X.J.: A new pseudorandom number generator based on complex number chaotic equation. Chin. Phys. B 21(9), 090506–090508 (2012)

    Article  Google Scholar 

  13. Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  14. Hermassi, H., Rhouma, R., Belghith, S.: Improvement of an image encryption algorithm based on hyper-chaos. Telecommun. Syst. 52(2), 539–549 (2013)

    Google Scholar 

  15. Kanso, A., Yahyaoui, H., Almulla, M.: Keyed hash function based on a chaotic map. Inf. Sci. 186(1), 249–264 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  16. Wang, X.-Y., Chen, F., Wang, T.: A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2479–2485 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  17. Fu, C., Lin, B., Miao, Y., Liu, X., Chen, J.: A novel chaos-based bit-level permutation scheme for digital image encryption. Opt. Commun. 284(23), 5415–5423 (2011)

    Article  Google Scholar 

  18. Anees, A., Siddiqui, A.M., Ahmed, F.: Chaotic substitution for highly auto-correlated data in encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 19(9), 3106–3118 (2014)

    Article  MathSciNet  Google Scholar 

  19. Luo, Y., Du, M., Liu, J.: A symmetrical image encryption scheme in wavelet and time domain. Commun. Nonlinear Sci. Numer. Simul. 20(2), 447–460 (2015)

    Article  Google Scholar 

  20. Sun, F., Lü, Z., Liu, S.: A new cryptosystem based on spatial chaotic system. Opt. Commun. 283(10), 2066–2073 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Musheer Ahmad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Ahmad, M., Alam, B. (2015). A Novel Biometric Fingerprint Template Based Method for Stream Cipher Design. In: Mandal, J., Satapathy, S., Kumar Sanyal, M., Sarkar, P., Mukhopadhyay, A. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 340. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2247-7_43

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2247-7_43

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2246-0

  • Online ISBN: 978-81-322-2247-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics