Dynamic fractional chaotic biometric isomorphic elliptic curve for partial image encryption
نویسندگان
چکیده
In this paper, a Modular Fractional Chaotic Sine Map (MFC-SM) has been introduced to achieve high Lyapunov exponent values and completely chaotic behavior of the bifurcation diagram for level security. The proposed MFC-SM is compared with conventional non it an excellent analysis. addition, randomness test results indicate that shows better performance satisfy all tests. Due properties good randomization MFC-SM, used be cooperated biometric digital identity dynamic identity. Also, real time image encryption, both Discrete Wavelet Transform (DWT)partial encryption Isomorphic Elliptic Curve (IEC)key exchange are used. extracted from user fingerprint as minutia data incorporated hence, new Dynamic Biometric Digital IdentityIEC (DFC-BID-IEC) introduced. Key Generator (DFC-KG) control key schedule decryption processing. process consists confusion diffusion steps. step, 2D Arnold Cat (ACM) secret parameters taken DFC-KG. step based on self-invertible matrix which can generated MFC-SM. IEC Diffie?Hellman(ECDH) isomorphism parametre. Statistical analysis, differential analysis sensitivity tests performed estimate security strengths DFC-BID-IEC system. experimental show algorithm robust against common signal processing attacks provides speed application.
منابع مشابه
Biometric encryption using enhanced finger print image and elliptic curve
The greatest strength of biometrics is that it does not change over time. But at the same time while using it directly for enhancing the security in network system, if that data has been compromised, its compromised forever[1]. Therefore, cancellable biometrics will increase the privacy which means that the true biometrics are never stored or revealed to the authentication server. Biometrics, c...
متن کاملImage Encryption of Biometric Characteristics Using Chaotic System
Nowadays ,due to the rapid development of multimedia and digital technology the transmission over public channel become more and more. Also the issues with the confidentiality and integrity of data increases in an alarming rate. So that the personal identification information or biometric signatures requires a security technique to protect from the any of the unauthorized access. Biometric sign...
متن کاملChaotic Image Encryption Techniques
The development of the Space Science and Technology has recently attracted a growing interest from researchers and industrial communities, mainly because of large number of possible applications capable to exploit remotely sensed data and satellite images. Advances in space science, data analysis, and communication technologies present new opportunities for users to increase productivity, reduc...
متن کاملVisual Cryptography with Chaotic Encryption for Biometric Templates
Preserving the privacy of digital biometric data (e.g., fingerprint) stored in a central database has become of paramount importance. It demands high speed decryption/encryption process with restricted computational powers. This work explores the possibility of using visual cryptography with chaotic encryption suitable for imparting security to biometric data such as fingerprint images. By usin...
متن کاملEfficient neural chaotic generator for image encryption
In this paper, we propose a new implementation of chaotic generator using artificial neural network. Neural network can act as an efficient source of perturbation in the chaotic generator which increases the cycle’s length, and thus avoid the dynamical degradation due to the used finite dimensional space. On the other hand, the use of neural network enlarges the key space of the chaotic generat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Science and Information Systems
سال: 2021
ISSN: ['1820-0214', '2406-1018']
DOI: https://doi.org/10.2298/csis200502018k