Efficient and secure cryptosystem for fingerprint images in wavelet domain (original) (raw)
Abstract
In this paper, a fingerprint image encryption algorithm is proposed in order to enhance the protection of fingerprint-based systems against replay attacks. The proposed algorithm is consisting of permutation and diffusion operations in wavelet domain, whereas, one-level Lifting Wavelet Transform Integer-to-Integer is performed to the original fingerprint image. The approximation and detail sub-bands are then partitioned into blocks and permuted using a permutation key. It is noteworthy that, for each sub-band the Rubik’s cube principle is applied. The encrypted image is constructed by ordering the encrypted sub-bands. Eventually, an experimental tests and security analysis were conducted on three fingerprint images attained through Fingerprint Verification Competition “FVC 2000” database. The obtained results confirm the effectiveness of the proposed encryption algorithm and clearly show the robustness against common attacks, for example differential and statistical attacks. In addition, it reveals the high security level achieved.
Access this article
Subscribe and save
- Starting from 10 chapters or articles per month
- Access and download chapters and articles from more than 300k books and 2,500 journals
- Cancel anytime View plans
Buy Now
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Instant access to the full article PDF.
Similar content being viewed by others
References
- Abundiz-Pérez F, Cruz-Hernández C, Murillo-Escobar MA, López-Gutiérrez RM, Arellano-Delgado A (2016) A fingerprint image encryption scheme based on hyperchaotic Rössler map, vol 2016
- Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16(8):2129–2151
Article MathSciNet MATH Google Scholar - Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21:749–761
Article MathSciNet MATH Google Scholar - Congress of the United States of America Enhanced border security and visa entry reform act of 2002, available at http://unitedstatesvisas.gov/pdfs/
- Delong C (2010) A novel fingerprint encryption algorithm based on chaotic system and fractional fourier transform. In: Proceedings of international conference on machine vision and human-machine interface, pp 168–171
Google Scholar - Fingerprint Verification Competition (2012) FVC 2000, http://bias.csr.unibo.it/fvc2000/databases.asp
- Han F, Hu J, Yu X, Wang Y (2007) Fingerprint images encryption via multi-scroll chaotic attractors. Appl Math Comput 185(2):931–939
MATH Google Scholar - Jain AK, Bolle R, Pankanti S (2005) Biometrics: personal identification in networked society. Kluwer Academic Press
- Khan MK, Zhang J (2007) An intelligent fingerprint-biometric image scrambling scheme. In: Proceedings of the third international conference on intelligent computing, pp 1141–1151
Google Scholar - Loukhaoukha K, Chouinard J-Y, Berdai A (2012) A secure image encryption algorithm based on rubik’s cube principle. J Electr Comput Eng 2012:13
MathSciNet MATH Google Scholar - Ratha NK, Connell HH, Bolle RM (2001) An analysis of minutiae matching strength. In: Proceedings of the 3rd international conference on audio and video based biometric person, vol 2091, pp 223– 228
Google Scholar - Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634
Article Google Scholar - Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715
Article MathSciNet MATH Google Scholar - Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92(6):948–960
Article Google Scholar - Wu C (2007) Advanced feature extraction algorithms for automatic fingerprint recognition systems. Ph.D. thesis, University of New York at Buffalo, USA
- Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323–342
Article MathSciNet MATH Google Scholar
Author information
Authors and Affiliations
- Development Research Center, Bouchaoui, Algiers, Algeria
Khaled Loukhaoukha & Khalil Zebbiche - Department of ECE, Manhattan College, Riverdale, NY, 10471, USA
Ahmed Refaey - Department of Electrical and Computer Engineering, Laval University, Québec, Canada
Khaled Loukhaoukha - School of Electronics, Electrical Engineering and Computer Science, Queen’s University, Belfast, UK
Khalil Zebbiche - Department of ECE, Western University, London, ON, N6G 5B9, Canada
Ahmed Refaey & Abdallah Shami
Authors
- Khaled Loukhaoukha
- Ahmed Refaey
- Khalil Zebbiche
- Abdallah Shami
Corresponding author
Correspondence toKhaled Loukhaoukha.
Rights and permissions
About this article
Cite this article
Loukhaoukha, K., Refaey, A., Zebbiche, K. et al. Efficient and secure cryptosystem for fingerprint images in wavelet domain.Multimed Tools Appl 77, 9325–9339 (2018). https://doi.org/10.1007/s11042-017-4938-9
- Received: 29 January 2017
- Revised: 01 June 2017
- Accepted: 08 June 2017
- Published: 22 June 2017
- Issue date: April 2018
- DOI: https://doi.org/10.1007/s11042-017-4938-9