Secure Biometric Authentication Scheme Based on Chaotic Map

被引:0
|
作者
Liang, Jiahao [1 ]
You, Lin [1 ]
机构
[1] Hangzhou Dianzi Univ, Coll Commun Engn, Hangzhou 310018, Peoples R China
基金
美国国家科学基金会;
关键词
Biometric authentication; Piecewise Logistic map; Biometric template; Security;
D O I
10.1007/978-3-030-05063-4_50
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Biometric authentication system has been widely used because of its convenience. But the development of science and technology has brought new challenges to biological information in the authentication system. In this paper, a revocable biometric template authentication scheme based on chaotic map is proposed. The scheme uses a piecewise Logistic chaotic mapping system to generate key sequences to encrypt biometric data and changes the way of traditional biometric authentication system which directly stored biometric templates in plaintext. Our scheme enables the storage and matching of biometrics in the encryption domain and it has improved the security of the biometric identity authentication in open network.
引用
收藏
页码:643 / 653
页数:11
相关论文
共 50 条
  • [21] Chaotic Map based Privacy Preservation User Authentication Scheme for WBANs
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    [J]. PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 1037 - 1042
  • [22] An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
    Zhou, Yousheng
    Zhou, Junfeng
    Wang, Feng
    Guo, Feng
    [J]. APPLIED COMPUTATIONAL INTELLIGENCE AND SOFT COMPUTING, 2016, 2016
  • [23] A digital secure image communication scheme based on the chaotic Chebyshev map
    Liao, XF
    Li, XM
    Pen, J
    Chen, GR
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2004, 17 (05) : 437 - 445
  • [24] ECG BASED BIOMETRIC FOR DOUBLY SECURE AUTHENTICATION
    Safie, Sairul I.
    Soraghan, John J.
    Petropoulakis, Lykourgos
    [J]. 19TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO-2011), 2011, : 2274 - 2278
  • [25] Secure Hamming Distance based Biometric Authentication
    Kulkarni, Rohan
    Namboodiri, Anoop
    [J]. 2013 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2013,
  • [26] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
    Cheng Hongbing
    Rong Chunming
    Tan Zhenghua
    Zeng Qingkai
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02) : 254 - 259
  • [27] Secure VoIP System Based on Biometric Voice Authentication and Nested Digital Cryptosystem using Chaotic Baker's map and Arnold's Cat Map Encryption
    Elshamy, Elsayed M.
    Hussein, Aziza I.
    Hamed, Hesham F. A.
    Abdelghany, M. A.
    Kelash, Hamdy M.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2017, : 140 - 146
  • [28] A secure biometric based multi-server authentication scheme for social multimedia networks
    Shehzad Ashraf Chaudhry
    [J]. Multimedia Tools and Applications, 2016, 75 : 12705 - 12725
  • [29] A secure biometric based multi-server authentication scheme for social multimedia networks
    Chaudhry, Shehzad Ashraf
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (20) : 12705 - 12725
  • [30] An efficient biometric based remote user authentication scheme for secure internet of things environment
    Roy, Sandip
    Chatterjee, Santanu
    Mahapatra, Gautam
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) : 1403 - 1410