An efficient and lightweight multi‐scroll chaos‐based hardware solution for protecting fingerprint biometric templates (original) (raw)
Related papers
The Design and FPGA-Based Implementation of a Stream Cipher Based on a Secure Chaotic Generator
Applied Sciences
In this study, with an FPGA-board using VHDL, we designed a secure chaos-based stream cipher (SCbSC), and we evaluated its hardware implementation performance in terms of computational complexity and its security. The fundamental element of the system is the proposed secure pseudo-chaotic number generator (SPCNG). The architecture of the proposed SPCNG includes three first-order recursive filters, each containing a discrete chaotic map and a mixing technique using an internal pseudo-random number (PRN). The three discrete chaotic maps, namely, the 3D Chebyshev map (3D Ch), the 1D logistic map (L), and the 1D skew-tent map (S), are weakly coupled by a predefined coupling matrix M. The mixing technique combined with the weak coupling technique of the three chaotic maps allows preserving the system against side-channel attacks (SCAs). The proposed system was implemented on a Xilinx XC7Z020 PYNQ-Z2 FPGA platform. Logic resources, throughput, and cryptanalytic and statistical tests showe...
A new way of generating grid-scroll chaos and its application to biometric authentication
2005
A new circuit design is proposed for generating grid-scroll chaos in the phase plane by using a second-order linear system with a control of double-hysteresis series. The double-hysteresis series is constructed in a systematic way by using the basic double-hysteresis building blocks. With the proposed scheme, the number of scrolls can be arbitrarily assigned, and the multi-scroll chaotic attractors can be placed anywhere and can cover any chosen area in the phase plane. The grid-scroll chaotic attractor is applied to biometric (fingerprint image) authentication. In this application, a two-dimensional (2D) discrete chaotic image is created from these grid-scroll chaotic attractors. Some of the parameters of the 2D chaotic image are extracted from the stable global structure of fingerprint image, and used to derive the encryption key at a terminal. Decryption, minutiae extraction and matching are fulfilled at the central server.
Chaotic-Based Encryption Algorithm using Henon and Logistic Maps for Fingerprint Template Protection
2020
Fingerprint is a reliable user authentication method as it is unique to individual users that makes it efficient for authenticating users. In a fingerprint authentication system, user fingerprint information is stored in databases in an image format known as a fingerprint template. Although fingerprint is reliable, the templates stored in the database are exposed to security threats either during the data transmission process over the network or in storage. Therefore, there is a need to protect the fingerprint template, especially in unsecured networks to maintain data privacy and confidentiality. Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. However, the robustness of the algorithm caused a trade-off to encryption speed where it remai...
Fingerprint images encryption via multi-scroll chaotic attractors
Applied Mathematics and Computation, 2007
This paper proposes a chaotic fingerprint images encryption approach. An image of a fingerprint is encrypted via a twodimensional (2D) chaotic sequence obtained from multi-scroll chaotic attractors. Initial values of the chaotic attractors are served as the private key, which can be generated from the pixel distribution of the binary images of the captured fingerprints. Due to the dynamic uncertainties in the acquisition process of fingerprint images, the keys generated from the pixel value distribution are virtually random. With the elaborately designed 2D chaotic sequence, the encrypted fingerprint images have balanced 0-1 ratio and ideal nonlinearity. Only with the valid private key can the images of fingerprint be recovered. Simulation results and 2D-DFT validate this chaotic encryption approach.
IJERT-Strengthen Fingerprint Data Security Using Chaotic Map Approach
International Journal of Engineering Research and Technology (IJERT), 2013
https://www.ijert.org/strengthen-fingerprint-data-security-using-chaotic-map-approach https://www.ijert.org/research/strengthen-fingerprint-data-security-using-chaotic-map-approach-IJERTV2IS70309.pdf A data security is an issue for research from the beginning. Different method and different technique have been implemented for data security but no one gives the high security provides for data. it can be use the chaotic map technique for data security. The salient features of the technique is that any authorized user can retrieve the corresponding fingerprint information from the complex encrypted and multiplexed image by a single decryption process with the authentic key. An orthogonal coding scheme with chaotic map is developed to encrypt the given fingerprint image. In this paper, we presented a new algorithm of encryption and decryption of images. The algorithm is based on the concept of shuffling the pixels positions and changing the gray values of the image pixels. To perform the shuffling of the plain-image"s pixels, a block based shuffling scheme is proposed, in which the plain-image is decomposed into 8x8 size blocks and a 2D Cat map is applied in three different ways to achieve good shuffling effect. Moreover, the control parameters of shuffling are randomly generated using a 2D Standard map to enforce the secrecy of the image. The encryption of the shuffled image is done using chaotic sequence generated through a 2D standard map. A traditional cryptosystems employ algorithms where confusion and diffusion are linear function of the number of iteration and key length. All the simulation and experimental analysis show that the proposed image encryption system has a very large key space, high sensitivity to secret keys. The proposed cryptographic technique involves a simple architecture by not requiring any mathematical transformation. Performance of the technique is investigated through computer simulation employing real-life fingerprint images.
A New Lightweight Stream Cipher Based on Chaos
A chaotic system and two Nonlinear Feadback Shift Registers (NFSRs) are used to generate a new stream cipher in this paper. This design can be used for efficient encryption in resource-constrained devices or environments. The chaotic system is quantified and integrated with two NFSRs based on the technology of Field Programmable Gate Array (FPGA). Many analyses are made from the angle of entropy in order to verify the cryptographic characteristics of the stream cipher, and National Institute of Standards and Technology (NIST) statistical test is completed to analyze the cipher. The test results show that the stream cipher here has good cryptographic characteristics.
Baptista's chaos-based cipher implemented in a field programmable gate array
2017
In the context of the current struggle for information security and computational efficacy, this paper studies Baptista's chaos-based encryption cipher as a resource-efficient alternative to the more popular block cipher algorithms. We evaluate the cipher by encrypting different types of data — text, images and sound — and we present the analysis of cyphertext statistical distribution and obfuscation characteristics. Simulation results illustrate the effectiveness of the algorithm on multimedia content. We present an implementation of the cipher as a digital system in a Xilinx Zynq 7000 series FPGA, and evaluate hardware resource utilization and maximum obtainable frequency. The cipher source code — Matlab simulation and the Verilog hardware description — is made available as a GIT repository. The aim of the demarche is to provide digital circuitry which may be easily integrated in a hybrid analog-digital cryptosystem which employs a dynamically changing secret key.
FPGA design and implementation for adaptive digital chaotic key generator
Bulletin of the National Research Centre
Background Information security is very important in today’s digital world, especially cybersecurity. The most common requirement in securing data in all services: confidentiality, digital signature, authentication, and data integrity is generating random keys. These random keys should be tested for randomness. Hardware security is more recommended than software. Hardware security has more speed and less exposure to many attacks than software security. Software security is vulnerable to attacks like buffer overflow attacks, side-channel attacks, and Meltdown–Spectre attacks. Results In this paper, we propose an FPGA Implementation for the adaptive digital chaotic generator. This algorithm is proposed and tested before. We introduce its implementation as hardware. This algorithm needs a random number seed as input. We propose two designs. The first one has an input random number. The second one has PRNG inside. The target FPGA is Xilinx Spartan 6 xc6slx9-2-cpg196. We used MATLAB HDL ...
Taking the Lorenz chaotic equation as an example, FPGA (Field Programmable Gate Array) technology is applied to obtain chaotic sequence in this paper. Based on the design of a digital integrator and quantification circuit, we get Lorenz chaotic output sequence by DSP Builder tool. This design method may improve arithmetic precision according to the need of the system and resource efficiency. Experiment shows the output sequence of the designed system has good self-correlation. This method can be applied to other continuous chaotic systems and may be applied to chaotic system for information security and secrecy communication field.
2021
Chaos was one of the most significant topics in nonlinear science and has been in-depth studying as the Lorenz system be found. Analysis of nonlinear dynamics and chaos in electronic systems has state of the art terribly within the past few years. A 0.Lorenz system is anhonor nonlinear dynamical dissipative system and that initially extracts at Lorenz to work chaos during weather patterns. That paper distinct working the FPGA implementation from Lorenz chaotic oscillator. At first, the Lorenz chaotic oscillator model was build using MATLAB-Simulink model and later that wasa change in the Generator model of Xilinx System. The synchronization from the Lorenz oscillator was moreover no more rising that project. The Pecora-Carroll familiar flowing synchronization technique was affected for reaching synchronization. Now the exploits from the response method turn on deportment from a drive method. That event of chaos synchronization can serve as the basis to reach ensures communication. B...