Skip to main content

A Secure Encryption Method for Biometric Templates Based on Chaotic Theory

  • Chapter
  • First Online:
Transactions on Computational Science XXVII

Part of the book series: Lecture Notes in Computer Science ((TCOMPUTATSCIE,volume 9570))

Abstract

This paper presents an encryption based security solution for iris biometric template for secure transmission and database storage. Unlike conventionalĀ methods where raw biometric images are encrypted, this paperĀ proposes method for encryption of biometric templates. The advantage of this method is reduced computational complexity as templates are smaller in size than the original biometric image making it suitable for real time applications. To increase the security of the biometric template, encryption is done by using the concept of multiple 1-D chaos and 2-D Arnold chaotic map. The proposed scheme provides a large key space and a high order of resistance against various attacks. Template matching parameters like hamming distance, weighted Euclidean distance, and normalized correlation coefficient are calculated to evaluate the performance of the encryption technique. The proposed algorithm has good key sensitivity, robustness against statistical and differential attacks and an efficient and lossless method for encrypting biometric templates.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Sig. Process. 2008, 17 (2008)

    Google ScholarĀ 

  2. Daugman, J.: High confidence recognition of persons by test of statistical independence. IEEE Trans. PAMI 15, 1148ā€“1160 (1993)

    ArticleĀ  Google ScholarĀ 

  3. Jain, Anil K., Ross, A., Parbhakar, S.: An Introduction to Biometrics Recognition. IEEE Trans. Circ. Syst. video Technol. 14(1), 4ā€“20 (2004)

    ArticleĀ  Google ScholarĀ 

  4. Tian, J., Yang, X.: Biometric Recognition Theory and Application. Publishing House of Electronics Industry, Beijing (2005). ISBN 9787302184195

    Google ScholarĀ 

  5. Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric recognition: security and privacy concerns. Proc. IEEE Secur. Priv. 1(2), 33ā€“42 (2003)

    ArticleĀ  Google ScholarĀ 

  6. Lian, S.: Multimedia Content Encryption: Techniques and Applications. CRC Press, Boca Raton (2008)

    MATHĀ  Google ScholarĀ 

  7. Huang, M.-Y., et al.: Image encryption method based on chaotic map. In: International Computer Symposium (ICS), pp. 154ā€“158 (2010)

    Google ScholarĀ 

  8. Masek, L., Kovesi, P.: Thesis on ā€œBiometric Identification System Based on Iris Patterns,ā€ The School of Computer Science and Software Engineering, the University of Western Australia (2003)

    Google ScholarĀ 

  9. Daugman, J.: How iris recognition works. In: Proceedings of International Conference on Image Processing, vol. 1, pp. I-33ā€“I-36 (2002)

    Google ScholarĀ 

  10. Bhatnagar, G., Jonathan Wu, Q.M.: Chaos-based security solution for fingerprint data during communication and transmission. IEEE Trans. Instrum. Meas. 61(4), 876ā€“887 (2012)

    ArticleĀ  Google ScholarĀ 

  11. Liu, R.: Chaos-based fingerprint images encryption using symmetric cryptography. In: IEEE International Conference Fuzzy System Knowledge Discovery, pp. 2153ā€“2156 (2012)

    Google ScholarĀ 

  12. Jain, A.K., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Boston (1999)

    Google ScholarĀ 

  13. Dachselt, F., Schwarz, W.: Chaos and cryptography. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 48(2), 1498ā€“1508 (2001)

    ArticleĀ  MathSciNetĀ  MATHĀ  Google ScholarĀ 

  14. Bhatnagar, G., Jonathan, Q.M.: A novel chaotic encryption framework for securing palm print data. Procedia Comput. Sci. 10, 442ā€“449 (2012)

    ArticleĀ  Google ScholarĀ 

  15. Bhatnagar, G., Wu, Q.M.J.: Enhancing the transmission security of biometric data using chaotic encryption. Mutimedia Syst. 20(2), 203ā€“214 (2014)

    ArticleĀ  Google ScholarĀ 

  16. Taneja, N., Raman, B., Gupta, I.: Combinational Domain Encryption for Still Visual Data. Multimdia Tools Appl. 59(3), 775ā€“793 (2012)

    ArticleĀ  Google ScholarĀ 

  17. Khan, M.K., Zhang, J., Alghathbar, K.: Challenge-response-based biometric image scrambling for secure personal identification. Future Generation Comput. Syst. 27(4), 411ā€“418 (2011)

    ArticleĀ  Google ScholarĀ 

  18. Taneja, N., Raman, B., Gupta, I.: Chaos based cryptosystem for still visual data. Multimedia Tools Appl. 16(2), 281ā€“298 (2012)

    ArticleĀ  Google ScholarĀ 

  19. G Peterson Arnoldā€™s cat map (1997). Available from http://online.redwoods.cc.ca.us/instruct/darnold/maw/catmap3.html

  20. Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Encryption, ICSA Guide to Cryptography. McGraw Hill, New York (1999)

    Google ScholarĀ 

  21. Huang, M.-Y., et. al.: Image Encryption Method Based on Chaotic Map. In: International Computer Symposium (ICS), pp. 154ā€“158 (2010)

    Google ScholarĀ 

  22. Bhatnagar, G., Jonathan-Wu, Q.M., Raman, B.: A new fractional random wavelet transform for fingerprint security. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 42(1), 262ā€“275 (2012)

    ArticleĀ  Google ScholarĀ 

  23. Mehta, G., Dutta, M.K., karasek, J., Kim, P.S.: An efficient and lossless fingerprint encryption algorithm using henon map and arnold transformation. In: ICCC 2013, pp. 485ā€“489 (2013)

    Google ScholarĀ 

  24. Mehta, G., Dutta, M.K., Kim, P.S.: An efficient and secure encryption scheme for biometric data using holmes map and singular value decomposition. In: 2014 International Conference on Medical Imaging, m-Health and Emerging Communication Systems (MedCom), pp. 211ā€“215. IEEE (2014)

    Google ScholarĀ 

  25. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    BookĀ  MATHĀ  Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Garima Mehta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2016 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Mehta, G., Dutta, M.K., Kim, P.S. (2016). A Secure Encryption Method for Biometric Templates Based on Chaotic Theory. In: Gavrilova, M., Tan, C. (eds) Transactions on Computational Science XXVII. Lecture Notes in Computer Science(), vol 9570. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-50412-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-50412-3_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-50411-6

  • Online ISBN: 978-3-662-50412-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics