Abstract
Protection of biometric data and templatesis a crucial issue for the security of biometric systems This paper proposes new security architecture for biometric templates using visual cryptography and chaotic image encryption. The use of visual cryptography is explored to preserve the privacy of biometric image by decomposing the original image into two images (known as sheets) such that the original image can be revealed only when both images are simultaneously available; the individual sheet images do not reveal the identity of the original image. The algorithm ensures protection as well as privacy for image using a fast encryption algorithm based on chaotic encryption. Chaos based cryptography is applied on to individual shares. Using this one can cross verify his identity along with the protection and privacy of the image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jain, A., Uludag, U.: Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25(11), 1494–1498 (2003)
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Shamir, A.: How to Share a Secret. ACM Communication 22, 612–613 (1979)
Blakley, G.R.: Safeguarding Cryptographic Keys. In: Proceedings of AFIPS Conference, vol. 48, pp. 313–317 (1970)
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Borchert, B.: Segment Based Visual Cryptography. WSI Press, Germany (2007)
Yan, W.-Q., Jin, D., Kanakanahalli, M.S.: Visual Cryptography for Print and Scan Applications, pp. 572–575. IEEE (2004)
Monoth, T., Babu, A.P.: Recursive Visual Cryptography Using Random Basis Column Pixel Expansion. In: Proceedings of IEEE International Conference on Information Technology, pp. 41–43 (2007)
Kim, H.J., Sachnev, V., Choi, S.J., Xiang, S.: An Innocuous Visual Cryptography Scheme. In: Proceedings of IEEE-8th International Workshop on Image Analysis for Multimedia Interactive Services (2007)
Blundo, C., De Santis, A.: On the contrast in Visual Cryptography Schemes. Journal on Cryptography 12, 261–289 (1999)
Eisen, P.A., Stinson, D.R.: Threshold Visual Cryptography with speci_ed Whiteness Levels of Reconstructed Pixels. Designs, Codes, Cryptography 25(1), 15–61 (2002)
Verheul, E.R., Van Tilborg, H.C.A.: Constructions and Properties of k out of n Visual Secret Sharing Schemes. Designs, Codes, Cryptography 11(2), 179–196 (1997)
Yan, H., Gan, Z., Chen, K.: A Cheater Detectable Visual Cryptography Scheme. Journal of Shanghai Jiaotong University 38(1) (2004)
Horng, G.B., Chen, T.G., Tsai, D.S.: Cheating in Visua Cryptography. Designs, Codes, Cryptography 38(2), 219–236 (2006)
Hu, C.M., Tzeng, W.G.: Cheating Prevention in Visual Cryptography. IEEE Transaction on Image Processing 16(1), 36–45 (2007)
Fridrich, J.: Symmetric Ciphers Based on Two-dimensional Chaotic Maps. Int. J. Bifurcat. Chaos 8(6), 1259–1284 (1998)
Chen, G., Mao, Y.B., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals 12, 749–761 (2004)
Mao, Y.B., Chen, G., Lian, S.G.: A novel fast image encryption scheme based on the 3D chaotic baker map. Int. J. Bifurcat. Chaos 14(10), 3613–3624 (2004)
Guan, Z.H., Huang, F.J., Guan, W.: Chaos-based image encryption algorithm. Phys. Lett. A 346, 153–157 (2005)
Lian, S.G., Sun, J., Wang, Z.: A block cipher based on a suitable use of chaotic standard map. Chaos, Solitons and Fractals 26(1), 117–129 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
James, D., Philip, M. (2012). A Novel Security Architecture for Biometric Templates Using Visual Cryptography and Chaotic Image Encryption. In: Mathew, J., Patra, P., Pradhan, D.K., Kuttyamma, A.J. (eds) Eco-friendly Computing and Communication Systems. ICECCS 2012. Communications in Computer and Information Science, vol 305. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32112-2_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-32112-2_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32111-5
Online ISBN: 978-3-642-32112-2
eBook Packages: Computer ScienceComputer Science (R0)