Skip to main content

A Novel Image Encryption Scheme Using an Irrevocable Multimodal Biometric Key

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 536))

Included in the following conference series:

  • 1813 Accesses

Abstract

In today’s digital world the use of secret key is inevitable to any secure communication through the network. But human beings feel hard to recollect the lengthy cryptographic key. One solution to this would be the use of biometric characteristics of human beings which are unique in nature, that makes the attacker difficult to guess the key generated from these features. Here we propose a new scheme for multimodal biometric key generation to secure cryptographic communication. Initially, the feature points of fingerprint and iris image are extracted using SLGS feature extraction algorithm followed by which chaotic mechanism is applied to shuffle the feature vectors and finally fused them to produce a single biometric key. In this paper we also present a new image encryption technique using the multimodal biometric key, where we are able to reconstruct the secret image without any pixel quality loss.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Acharya, B., Panigrahy, S.K.: image encryption using advanced hill cipher algorithm. Int. J. Recent Trends Eng. 1(1), 663–667 (2009)

    Google Scholar 

  2. Öztürk, I., Sogukpınar, I.: Analysis and comparison of image encryption algorithms. World Acad. Sci. Eng. Technol. 3, 26–30 (2005)

    Google Scholar 

  3. Zhang, L., Liao, X., Klein, D.V.: Foiling the cracker: a survey of, and improvements to, password security. In: Proceedings of the 2nd USENIX Workshop Security, pp. 5–14 (1990)

    Google Scholar 

  4. Rabuzin, K., Baca, M., Malekovic, M.: A Multimodal biometric system implemented within an active database management system. J. Softw. 2(4) (2007)

    Google Scholar 

  5. Baca, M., Rabuzin, K.: Biometrics in network security. In: Proceedings of the XXVIII International Convention MIPRO 2005, pp. 205–210, Rijeka (2005)

    Google Scholar 

  6. Jagadeesan, A., Duraiswamy, K.: Secured cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris. (IJCSIS) Int. J. Comput. Sci. Inf. Secur. 7(2), 28–37 (2010)

    Google Scholar 

  7. Hong, L., Jain, A.K., Pankanti, S.: Can multibiometrics improve performance? In: Proceedings of IEEE Workshop on Automatic Identification Advanced Technologies, NJ, USA, pp. 59–64 (1999)

    Google Scholar 

  8. Jain, A., Nandakumar, K., Ross, A.: Score normalization in multimodal biometric systems. Pattern Recogn. 38, 2270–2285 (2005)

    Article  Google Scholar 

  9. Wang, R., Bhanu, B.: Performance prediction for multimodal biometrics. In: Proceedings of the IEEE International Conference on Pattern Recognition, pp. 586–589 (2006)

    Google Scholar 

  10. Jing, X., Yao, Y., Zhang, D., Yang, J., Li, M.: Face and palm print pixel level fusion and Kernel DCV-RBF classifier for small sample biometric recognition. Pattern Recogn. 40(11), 3209–3224 (2007)

    Article  MATH  Google Scholar 

  11. Zhang, T., Li, X., Tao, D., Yang, J.: Multi-modal biometrics using geometry preserving projections. Pattern Recogn. 41(3), 805–813 (2008)

    Article  MATH  Google Scholar 

  12. Arul, P., Shanmugam, A.: Generate a key for AES using biometric for VOIP network security. J. Theor. Appl. Inf. Technol. 5(2), 107–112 (2009)

    Google Scholar 

  13. Goh, A., Ngo, D.C.L.: Computation of cryptographic keys from face biometrics. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 1–13. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  14. Hao, F., Chan, C.W.: Private key generation from on-line handwritten signatures. Inf. Manage. Comput. Secur. 10(2), 159–164 (2002)

    Google Scholar 

  15. Chen, B., Chandran, V.: Biometric based cryptographic key generation from faces. In: Proceedings of 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp. 394–401, December 2007

    Google Scholar 

  16. Lalithamani, N., Soman, K.P.: An effective scheme for generating irrevocable cryptographic key from cancelable fingerprint templates. Int. J. Comput. Sci. Netw. Secur. 9(3), 183–193 (2009)

    Google Scholar 

  17. Abdullah, M.F.A., Sayeed, M.S., Muthu, K.S., Bashier, H.K., Azman, A., Ibrahim, S.Z.: Face recognition with symmetric local graph structure (SLGS). Expert Syst. Appl. 41, 6131–6137 (2014)

    Article  Google Scholar 

  18. Prasad, M., Sudha, K.L.: Chaos image encryption using pixel shuffling. In: Wyld, D.C., et al. (eds.) CCSEA 2011, CS & IT 02, pp. 169–179 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Suchithra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Suchithra, M., Sikha, O.K. (2015). A Novel Image Encryption Scheme Using an Irrevocable Multimodal Biometric Key. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics