A Novel Face Template Protection Scheme based on Chaos and Visual Cryptography
نویسندگان
چکیده
Protection of biometric data and templates is a crucial issue for the security of biometric systems This paper proposes new security architecture for protection of face templates using visual cryptography and chaotic image encryption. The use of visual cryptography is explored to preserve the privacy of biometric image by decomposing each private face image into two independent public host images such that the original image can be revealed only when both images are simultaneously available. The algorithm ensures protection as well as privacy for image using a fast encryption algorithm based on chaotic encryption. Chaos based cryptography is applied on to individual shares. Using this one can cross verify his identity along with the protection and privacy of the image.
منابع مشابه
Facial Template Protection Using Extended Visual Cryptography And Chaotic Encryption
Protection of biometric data is of prime importance now a days. In this paper a new method is proposed for the protection of biometric facial data using visual cryptography and chaotic encryption. By using visual cryptography each private face image is decomposed into two public host images. The original image gets revealed only when both of these images are available simultaneously. By using c...
متن کاملProtection of Fused Template Using Visual Cryptography
Template protection is a challenging task in the field of biometric systems. Multimodal biometrics is an emergent technology in this field because of its high security features. In this paper, a novel approach is proposed to secure fused template of Iris and Finger Knuckle Print (FKP) by using visual cryptography. Visual cryptography is a secret sharing scheme where a fused template is encrypte...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملA Novel Retina based Biometric Privacy using Visual Cryptography
Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Preserving the biometric privacy such as digital biometric data (eg. face, iris, retina and fingerprint) is very important nowadays. The retinal biometrics is considered one of the most accurate and robust methods of the identity verification...
متن کاملA Biometric Key-Binding and Template Protection Framework Using Correlation Filters
We describe a new framework to bind cryptographic keys with biometric signatures using correlation filters. This scheme combines correlation filter based biometric recognition with biometric key-binding while offering template protection, revocability, diversity and security. We demonstrate the effectiveness of our scheme via numerical results on the CMU-PIE face database.
متن کامل