Chaotic-Based Encryption Algorithm using Henon and Logistic Maps for Fingerprint Template Protection (original) (raw)

IJERT-Strengthen Fingerprint Data Security Using Chaotic Map Approach

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2013

View PDFchevron_right

Strengthen Fingerprint Data Security Using Chaotic Map Approach

Ankit Jat

International journal of engineering research and technology, 2013

View PDFchevron_right

An Effective Framework for Secure and Reliable Biometric Systems Based on Chaotic Maps

Lotfi Houam

Pattern Recognition and Artificial Intelligence, 2020

View PDFchevron_right

New method for fingerprint images encryption using DNA sequence and chaotic tent map

Naser Safdarian

Optik, 2020

View PDFchevron_right

Fingerprint images encryption via multi-scroll chaotic attractors

Xinghuo Yu

Applied Mathematics and Computation, 2007

View PDFchevron_right

New Enrollment Scheme for Biometric Template Using Hash Chaos-based Cryptography

Marius Iulian Mihailescu

Procedia Engineering, 2014

View PDFchevron_right

An efficient and lightweight multi‐scroll chaos‐based hardware solution for protecting fingerprint biometric templates

Abdelmadjid MAALI

International Journal of Communication Systems, 2019

View PDFchevron_right

Robust Security Model for Biometric Template Protection Using Chaos Phenomenon

Maithili Arjunwadkar

International Journal of Computer Applications, 2010

View PDFchevron_right

ANovel Chaotic Encryption Framework for Securing Palmprint Data

Gaurav Bhatnagar

Procedia Computer Science, 2012

View PDFchevron_right

31 A New Cryptosystem based on Fingerprint Features

Tarik Ismaeel

2016

View PDFchevron_right

Images cryptosystem based on chaotic maps for databases security

el-sayed el-rabaie

2013 Second International Japan-Egypt Conference on Electronics, Communications and Computers (JEC-ECC), 2013

View PDFchevron_right

A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation

Dr Mustafa Al-Hassani

Baghdad Science Journal, 2022

View PDFchevron_right

Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices

Muhammad Khan

Chaos Solitons & Fractals, 2008

View PDFchevron_right

A Novel Irreversible Transformation Scheme for Biometric Template Protection

IOSR Journals

View PDFchevron_right

6D-Chaotic System and 2D Fractional Discrete Cosine Transform Based Encryption of Biometric Templates

Arvind Dhaka

IEEE Access

View PDFchevron_right

A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rössler Map

Adrian Delgado

Mathematical Problems in Engineering, 2016

View PDFchevron_right

A Review on Chaotic Map Based Cryptography

Innovative Research Publications

View PDFchevron_right

Image Encryption Using Modified AES with Bio-Chaotic

Editor Ijasre

View PDFchevron_right

A novel image encryption method based on chaotic maps

Reza Ebrahimi Atani

ICCKE 2013, 2013

View PDFchevron_right

Biometric Template Protection Using Spiral Cube: Performance and Security Analysis

Sanaa Ghouzali

International Journal on Artificial Intelligence Tools, 2016

View PDFchevron_right

A Novel Face Template Protection Scheme based on Chaos and Visual Cryptography

Divya James

research.ijais.org

View PDFchevron_right

A new chaotic algorithm for image encryption By : Haojiang Gao* , Yisheng Zhang, Shuyun Liang, Dequn Li

F. Hulu

View PDFchevron_right

Bio-chaotic Stream Cipher-Based Iris Image Encryption

Hanif Ullah

2009

View PDFchevron_right

Image encryption using chaotic maps

Shivangi Das

View PDFchevron_right

Review: Image Encryption Techniques based on Chaotic Map

Editor Ijasre

International Journal of Engineering Research and Advanced Technology (IJERAT), 2019

View PDFchevron_right

Enhancing Image Security using Chaotic Map and Block Cipher

Irene Getzi

2015

View PDFchevron_right

Symmetric Encryption Algorithms Using Chaotic and Non-Chaotic Generators: A Review

Ahmed Radwan

Journal of Advanced Research, 2015

View PDFchevron_right

Survey: Image Encryption using Chaotic Cryptography Schemes

Po-Han Lee

IJCA special issue on Computational Science-New …, 2011

View PDFchevron_right