[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4682))

Included in the following conference series:

  • 2144 Accesses

Abstract

To obstruct the attacks, and to hamper with the liveness and retransmission issues of biometrics images, we have researched on the challenge/response-based biometrics scrambled image transmission. We proposed an intelligent biometrics sensor, which has computational power to receive challenges from the authentication server and generate response against the challenge with the encrypted biometric image. We utilized the FRT for biometric image encryption and used its scaling factors and random phase mask as the additional secret keys. In addition, we chaotically generated the random phase masks by a chaotic map to further improve the encryption security. Experimental and simulation results have shown that the presented system is secure, robust, and deters the risks of attacks of biometrics image transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. In: Proceedings of the IEEE. vol. 92, pp. 948–960 (2004)

    Google Scholar 

  2. Ratha, N., Connell, J., Bolle, R.: Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM System Journal 40(3), 614–634 (2001)

    Article  Google Scholar 

  3. Ozaktas, H.M., Zalevsky, Z., Kutay, M.A.: The Fractional Fourier Transform with Applications in Optics and Signal Processing. John Wiley & Sons, New York (2000)

    Google Scholar 

  4. Almeida, L.B: The Fractional Fourier Transform and Time-Frequency Representations. IEEE Trans. Signal Processing 42, 3084–3091 (1994)

    Article  Google Scholar 

  5. Jianlin, Z., Hongqiang, L., Xiaoshan, S., Jifeng, L., Yanghua, M.: Optical Image Encryption based on Multistage Fractional Fourier Transforms and Pixel Scrambling Technique. Optics Communications 249, 493–499 (2005)

    Article  Google Scholar 

  6. Yan, Z., Cheng-Han, Z., Naohiro, T.: Optical Encryption based on Iterative Fractional Fourier Transform. Optics Communications 202, 277–285 (2002)

    Article  Google Scholar 

  7. Xiaomin, W., Jiashu, Z.: Chaotic Secure Communication based on Nonlinear Autoregressive Filter with Changeable Parameters. Physics Letters A, Elsevier Science (Article in press)

    Google Scholar 

  8. Khan, M.K., Jiashu, Z., Lei, T.: Chaotic Secure Content-based Hidden Transmission of Biometrics Templates. Chaos, Solitons, and Fractals, Elsevier Science 32(5), 1749–1759 (2007)

    Article  Google Scholar 

  9. Chen, G.R., Mao, Y.B., Chui, C.K.: A Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps. Chaos, Solitons & Fractals 21, 749–761 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  10. Linhua, Z., Xiaofeng, L., Xuebing, W.: An Image Encryption Approach based on Chaotic Maps. Chaos, Solitons, and Fractals 24, 759–765 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  11. FVC DB Fingerprint online

    Google Scholar 

  12. Shannon, C.E.: A Mathematical Theory of Communication. Bell Systems Technical Journal 27, 379–423 (1948)

    MATH  MathSciNet  Google Scholar 

  13. Shannon, C.E.: Communication Theory of Secrecy Systems. Bell Systems Technical Journal 28, 656–715 (1949)

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

De-Shuang Huang Laurent Heutte Marco Loog

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khan, M.K., Zhang, J. (2007). An Intelligent Fingerprint-Biometric Image Scrambling Scheme. In: Huang, DS., Heutte, L., Loog, M. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2007. Lecture Notes in Computer Science(), vol 4682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74205-0_118

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74205-0_118

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74201-2

  • Online ISBN: 978-3-540-74205-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics