Chaotic Encryption for Fingerprint Authentication

被引:0
|
作者
Aarthi, N. Ganitha [1 ]
Jeyaseelan, W. R. Salem [1 ]
Oviya, K. [1 ]
机构
[1] Karpagam Coll Engn Autonomous, Dept Informat Technol, Coimbatore, Tamil Nadu, India
来源
关键词
FINGERPRINT; BIOMETRIC TEMPLATE; MURILLO-ESCOBAR; LOGISTIC MAP;
D O I
10.21786/bbrc/SI/12.2/11
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Biometrics based verification frameworks perceive people by considering their anatomical qualities or behavioral attributes and accordingly offers a few favorable circumstances over customary confirmation strategies, for example, passwords and personality records. Fingerprint acknowledgment is a one solid arrangement in biometrics based validation frameworks. In spite of their focal points the potential ruptures of security and privacy of the client's information are a still awaiting concern. Subsequently, biometric layout assurance to dodge fraud has turned into a noteworthy worry in the present security needs. In this paper, hearty unique fingerprint format assurance plot by using chaotic encryption which has outrageous sensibility on introductory conditions with perplexity and ergodicity with dissemination is exhibited. Conversely with different methodologies exhibited before, an entire security examination in both measurable dimension and execution level is displayed in order to legitimize the cryptographic quality of the proposed technique. Based on acquired outcomes, it very well may be surmised that the proposed installed verification framework is exceptionally secure, powerful and cheap, which are essential for any validation framework to increase public satisfaction for using in secure access control frameworks in real time.
引用
收藏
页码:70 / 75
页数:6
相关论文
共 50 条
  • [1] A robust embedded biometric authentication system based on fingerprint and chaotic encryption
    Murillo-Escobar, M. A.
    Cruz-Hernandez, C.
    Abundiz-Perez, F.
    Lopez-Gutierrez, R. M.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (21) : 8198 - 8211
  • [2] Secure Fingerprint Authentication with Homomorphic Encryption
    Yang, Wencheng
    Wang, Song
    Yu, Kan
    Kang, James Jin
    Johnstone, Michael N.
    [J]. 2020 DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2020,
  • [3] A client/server implementation of an encryption system for fingerprint user authentication
    Pujol, Francisco A.
    Mora, Higinio
    Luis Sanchez, Jose
    Jimeno, Antonio
    [J]. KYBERNETES, 2008, 37 (08) : 1111 - 1119
  • [4] A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication
    Yang, Yijun
    Yu, Jianping
    Zhang, Peng
    Wang, Shulan
    [J]. COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE, 2015, 2015
  • [5] Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption
    Kim, Taeyun
    Kim, Hyoungshick
    [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 813 - 815
  • [6] A Novel Fingerprint Protection Approach based on SoPC Chaotic Encryption
    Azzaz, Mohamed Salah
    Aissaoui, Noureddine
    Tanougast, Camel
    [J]. 2018 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2018), 2018,
  • [7] A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA
    Zhu, Lijuan
    [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2471 - 2474
  • [8] A fast image encryption and authentication scheme based on chaotic maps
    Yang, Huaqian
    Wong, Kwok-wo
    Liao, Xiaofeng
    Zhang, Wei
    Wei, Pengcheng
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (11) : 3507 - 3517
  • [9] Image encryption based on image authentication and multiple chaotic systems
    Pu, Changjiu
    Yang, Huaqian
    [J]. International Review on Computers and Software, 2012, 7 (04) : 1893 - 1899
  • [10] Fingerprint images encryption via multi-scroll chaotic attractors
    Han, Fengling
    Hu, Jiankun
    Yu, Xinghuo
    Wang, Yi
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2007, 185 (02) : 931 - 939