Abstract
This paper presents an encryption based security solution for iris biometric template for secure transmission and database storage. Unlike conventionalĀ methods where raw biometric images are encrypted, this paperĀ proposes method for encryption of biometric templates. The advantage of this method is reduced computational complexity as templates are smaller in size than the original biometric image making it suitable for real time applications. To increase the security of the biometric template, encryption is done by using the concept of multiple 1-D chaos and 2-D Arnold chaotic map. The proposed scheme provides a large key space and a high order of resistance against various attacks. Template matching parameters like hamming distance, weighted Euclidean distance, and normalized correlation coefficient are calculated to evaluate the performance of the encryption technique. The proposed algorithm has good key sensitivity, robustness against statistical and differential attacks and an efficient and lossless method for encrypting biometric templates.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Sig. Process. 2008, 17 (2008)
Daugman, J.: High confidence recognition of persons by test of statistical independence. IEEE Trans. PAMI 15, 1148ā1160 (1993)
Jain, Anil K., Ross, A., Parbhakar, S.: An Introduction to Biometrics Recognition. IEEE Trans. Circ. Syst. video Technol. 14(1), 4ā20 (2004)
Tian, J., Yang, X.: Biometric Recognition Theory and Application. Publishing House of Electronics Industry, Beijing (2005). ISBN 9787302184195
Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric recognition: security and privacy concerns. Proc. IEEE Secur. Priv. 1(2), 33ā42 (2003)
Lian, S.: Multimedia Content Encryption: Techniques and Applications. CRC Press, Boca Raton (2008)
Huang, M.-Y., et al.: Image encryption method based on chaotic map. In: International Computer Symposium (ICS), pp. 154ā158 (2010)
Masek, L., Kovesi, P.: Thesis on āBiometric Identification System Based on Iris Patterns,ā The School of Computer Science and Software Engineering, the University of Western Australia (2003)
Daugman, J.: How iris recognition works. In: Proceedings of International Conference on Image Processing, vol. 1, pp. I-33āI-36 (2002)
Bhatnagar, G., Jonathan Wu, Q.M.: Chaos-based security solution for fingerprint data during communication and transmission. IEEE Trans. Instrum. Meas. 61(4), 876ā887 (2012)
Liu, R.: Chaos-based fingerprint images encryption using symmetric cryptography. In: IEEE International Conference Fuzzy System Knowledge Discovery, pp. 2153ā2156 (2012)
Jain, A.K., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Boston (1999)
Dachselt, F., Schwarz, W.: Chaos and cryptography. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 48(2), 1498ā1508 (2001)
Bhatnagar, G., Jonathan, Q.M.: A novel chaotic encryption framework for securing palm print data. Procedia Comput. Sci. 10, 442ā449 (2012)
Bhatnagar, G., Wu, Q.M.J.: Enhancing the transmission security of biometric data using chaotic encryption. Mutimedia Syst. 20(2), 203ā214 (2014)
Taneja, N., Raman, B., Gupta, I.: Combinational Domain Encryption for Still Visual Data. Multimdia Tools Appl. 59(3), 775ā793 (2012)
Khan, M.K., Zhang, J., Alghathbar, K.: Challenge-response-based biometric image scrambling for secure personal identification. Future Generation Comput. Syst. 27(4), 411ā418 (2011)
Taneja, N., Raman, B., Gupta, I.: Chaos based cryptosystem for still visual data. Multimedia Tools Appl. 16(2), 281ā298 (2012)
G Peterson Arnoldās cat map (1997). Available from http://online.redwoods.cc.ca.us/instruct/darnold/maw/catmap3.html
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Encryption, ICSA Guide to Cryptography. McGraw Hill, New York (1999)
Huang, M.-Y., et. al.: Image Encryption Method Based on Chaotic Map. In: International Computer Symposium (ICS), pp. 154ā158 (2010)
Bhatnagar, G., Jonathan-Wu, Q.M., Raman, B.: A new fractional random wavelet transform for fingerprint security. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 42(1), 262ā275 (2012)
Mehta, G., Dutta, M.K., karasek, J., Kim, P.S.: An efficient and lossless fingerprint encryption algorithm using henon map and arnold transformation. In: ICCC 2013, pp. 485ā489 (2013)
Mehta, G., Dutta, M.K., Kim, P.S.: An efficient and secure encryption scheme for biometric data using holmes map and singular value decomposition. In: 2014 International Conference on Medical Imaging, m-Health and Emerging Communication Systems (MedCom), pp. 211ā215. IEEE (2014)
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2016 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Mehta, G., Dutta, M.K., Kim, P.S. (2016). A Secure Encryption Method for Biometric Templates Based on Chaotic Theory. In: Gavrilova, M., Tan, C. (eds) Transactions on Computational Science XXVII. Lecture Notes in Computer Science(), vol 9570. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-50412-3_8
Download citation
DOI: https://doi.org/10.1007/978-3-662-50412-3_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-50411-6
Online ISBN: 978-3-662-50412-3
eBook Packages: Computer ScienceComputer Science (R0)