[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems

Published: 17 April 2024 Publication History

Abstract

Human biometric images are utilized for cell phone authentication, airport security, and biometric passports. To improve the biometric identification process, this should be protected from cyber attackers because it is sensitive to any minor changes. Thus, security is a major concern in biometric images. Traditional encryption and compression methods are ineffective for encrypting biometric images due to their high execution time and algorithm complexity. In this paper, a novel 2D chaotic sine map is proposed for generating encryption keys and improving security for biometric identification systems. The proposed scheme uses the 2D chaotic map to generate the private key and diffusion process. Here, the Hénon-Sine Map (HSM-512), Secure Hash Algorithm (SHA-256), and DNA computing are also used in the key generation process. The pixel values of the original images in the proposed schemes are shuffled using Mersenne Twister (MT) to improve the security of biometric images. Moreover, the Differential Huffman Compression (DHC) method is used for lossless compression while performing the XOR-based encryption process. The proposed model has been tested on different RGB biometric images, namely the SOCOFing dataset and the COVID-19 chest X-ray dataset. The experiment results have been evaluated using many performance metrics, such as entropy, key space, histogram analysis, key sensitivity, robustness analysis, correlation, and similarity analysis. The outcomes demonstrate that the proposed scheme is more effective than the state-of-the-art schemes.

Highlights

A 2D-Chaotic Sine Map is used to boost security in biometric identification.
Moreover, Hénon-Sine map and DNA computing are used for secure key generation.
Diffusion and confusion with Differential Huffman Compression are used to cipher images.
Extensive comparative analysis is shown to validate performance of proposed model.

References

[1]
Dang T.M., Nguyen T.D., Hoang T., Kim H., Teoh A.B.J., Choi D., AVET: A novel transform function to improve cancellable biometrics security, IEEE Trans Inf Forensics Secur 18 (2022) 758–772.
[2]
Begum M., Uddin M.S., Digital image watermarking techniques: A review, Information 11 (2) (2020) 110.
[3]
Mandal P.C., Mukherjee I., Paul G., Chatterji B., Digital image steganography: A literature survey, Inform Sci (2022).
[4]
Li S., Tu Z., Chen Y., Yu T., Multi-scale attention encoder for street-to-aerial image geo-localization, CAAI Trans Intell Technol 8 (1) (2023) 166–176.
[5]
Murmu A., Kumar P., A novel gateaux derivatives with efficient DCNN-resunet method for segmenting multi-class brain tumor, Med Biol Eng Comput (2023) 1–24.
[6]
Kumar P., Parmar A., Versatile approaches for medical image compression: A review, Procedia Comput Sci 167 (2020) 1380–1389.
[7]
Kumar P., Rahman M., Namasudra S., Moparthi N.R., Enhancing security of medical images using deep learning, chaotic map, and hash table, Mob Netw Appl (2023) 1–15.
[8]
Parashar A., Rishi R., Parashar A., Rida I., Medical imaging in rheumatoid arthritis: A review on deep learning approach, Open Life Sci 18 (1) (2023).
[9]
Namasudra S., Nath S., Majumder A., Profile based access control model in cloud computing environment, in: 2014 international conference on green computing communication and electrical engineering, IEEE, 2014, pp. 1–5.
[10]
Parashar A., Parashar A., Abate A.F., Shekhawat R.S., Rida I., Real-time gait biometrics for surveillance applications: A review, Image Vis Comput (2023).
[11]
Murmu A., Kumar P., Deep learning model-based segmentation of medical diseases from MRI and CT images, in: TENCON 2021-2021 IEEE region 10 conference, IEEE, 2021, pp. 608–613.
[12]
Goodfellow I., Pouget-Abadie J., Mirza M., Xu B., Warde-Farley D., Ozair S., et al., Generative adversarial networks, Commun ACM 63 (11) (2020) 139–144.
[13]
Trabelsi S., Samai D., Dornaika F., Benlamoudi A., Bensid K., Taleb-Ahmed A., Efficient palmprint biometric identification systems using deep learning and feature selection methods, Neural Comput Appl 34 (14) (2022) 12119–12141.
[14]
Yi T., Shi M., Zhu H., Medical data publishing based on average distribution and clustering, CAAI Trans Intell Technol 7 (3) (2022) 381–394.
[15]
Ding Y., Tan F., Qin Z., Cao M., Choo K.-K.R., Qin Z., DeepKeyGen: A deep learning-based stream Cipher generator for medical image encryption and decryption, IEEE Trans Neural Netw Learn Syst 33 (9) (2021) 4915–4929.
[16]
Malviya S., Kumar P., Namasudra S., Tiwary U.S., Experience replay-based deep reinforcement learning for dialogue management optimisation, Trans Asian Low-Res Lang Inform Process (2022).
[17]
Hajjaji M.A., Dridi M., Mtibaa A., A medical image crypto-compression algorithm based on neural network and PWLCM, Multimedia Tools Appl 78 (2019) 14379–14396.
[18]
Vallabhadas D.K., Sandhya M., Securing multimodal biometric template using local random projection and homomorphic encryption, J Inform Secur Appl 70 (2022).
[19]
Yang F., Mou J., Sun K., Chu R., Lossless image compression-encryption algorithm based on BP neural network and chaotic system, Multimedia Tools Appl 79 (2020) 19963–19992.
[20]
Belazi A., Talha M., Kharbech S., Xiang W., Novel medical image encryption scheme based on chaos and DNA encoding, IEEE access 7 (2019) 36667–36681.
[21]
Ayoobkhan M.U.A., Chikkannan E., Ramakrishnan K., Feed-forward neural network-based predictive image coding for medical image compression, Arab J Sci Eng 43 (2018) 4239–4247.
[22]
Das S., Gangwani P., Upadhyay H., Integration of machine learning with cybersecurity: Applications and challenges, Artif Intell Cyber Secur: Theories Appl (2023) 67–81.
[23]
Selvi C.T., Amudha J., Sudhakar R., Medical image encryption and compression by adaptive sigma filterized synorr certificateless signcryptive levenshtein entropy-coding-based deep neural learning, Multimedia Syst (2021) 1–16.
[24]
Singh M., Baranwal N., Singh K., Singh A., Zhou H., Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression, J Inform Secur Appl 79 (2023).
[25]
Liu Z, Xu X, Liu T, Liu Q, Wang Y, Shi Y, et al. Machine vision guided 3d medical image compression for efficient transmission and accurate segmentation in the clouds. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2019, p. 12687–96.
[26]
Arab A., Rostami M.J., Ghavami B., An image encryption method based on chaos system and AES algorithm, J Supercomput 75 (2019) 6663–6682.
[27]
Khasim S., Basha S.S., An improved fast and secure CAMEL based authenticated key in smart health care system, Cloud Comput Data Sci (2022) 77–91.
[28]
Wang X., Yin S., Shafiq M., Laghari A.A., Karim S., Cheikhrouhou O., et al., A new V-net convolutional neural network based on four-dimensional hyperchaotic system for medical image encryption, Secur Commun Netw 2022 (2022) 1–14.
[29]
Akkasaligar P.T., Biradar S., Selective medical image encryption using DNA cryptography, Inform Secur J: A Glob Perspect 29 (2) (2020) 91–101.
[30]
Maliyaem M., Tuan N.M., Lockhart D., Muenthong S., A study of using machine learning in predicting COVID-19 cases, Cloud Comput Data Sci (2022) 92–99.
[31]
Ding Y., Wu G., Chen D., Zhang N., Gong L., Cao M., et al., DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things, IEEE Internet Things J 8 (3) (2020) 1504–1518.
[32]
Khemchandani M.A., Jadhav S.M., Iyer B., Brain tumor segmentation and identification using particle imperialist deep convolutional neural network in MRI images, IJIMAI 7 (7) (2022) 38–47.
[33]
Martín Merino M., López Rivero A.J., Alonso V., Vallejo M., Ferreras A., A clustering algorithm based on an ensemble of dissimilarities: An application in the bioinformatics domain, Int J Interact Multim Artif Intell (2022).
[34]
Sharma R.S., Mannava P.N., Wingreen S.C., Reverse-engineering the design rules for cloud-based big data platforms, Cloud Comput Data Sci (2022) 39–59.
[35]
Devi S.A., Felix A., Narayanamoorthy S., Ahmadian A., Balaenu D., Kang D., An intuitionistic fuzzy decision support system for COVID-19 lockdown relaxation protocols in India, Comput Electr Eng 102 (2022).
[36]
Zheng M., Zhi K., Zeng J., Tian C., You L., A hybrid CNN for image denoising, J Artif Intell Technol 2 (3) (2022) 93–99.
[37]
Meng J., Li Y., Liang H., Ma Y., Single-image dehazing based on two-stream convolutional neural network, J Artif Intell Technol 2 (3) (2022) 100–110.
[38]
Hosny K.M., Kamal S.T., Darwish M.M., A color image encryption technique using block scrambling and chaos, Multimedia Tools Appl (2022) 1–21.
[39]
Kumar C.M., Vidhya R., Brindha M., An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function, Appl Intell 52 (3) (2022) 2556–2585.
[40]
Jeevitha S., Amutha Prabha N., Novel medical image encryption using DWT block-based scrambling and edge maps, J Ambient Intell Humaniz Comput 12 (2021) 3373–3388.
[41]
Priyadarshini R., Md A.Q., Mohan S., Alghamdi A., Alrizq M., Mohamad U.H., et al., Novel framework based on ensemble classification and secure feature extraction for COVID-19 critical health prediction, Eng Appl Artif Intell 126 (2023).
[42]
Zhang Q., Xiao J., Tian C., Chun-Wei Lin J., Zhang S., A robust deformed convolutional neural network (CNN) for image denoising, CAAI Trans Intell Technol 8 (2) (2023) 331–342.
[43]
Shafqat S., Majeed H., Javaid Q., Ahmad H.F., Standard ner tagging scheme for big data healthcare analytics built on unified medical corpora, J Artif Intell Technol 2 (4) (2022) 152–157.
[44]
Mooney P., Chest x-ray images (Covid-19), Kaggle, 2020, https://www.kaggle.com/paultimothymooney/chest-xray-pneumonia. [Accessed: 04 August 2023].
[45]
Ruizgara P., Sokoto coventry fingerprint dataset (socofing), Kaggle, 2018, https://www.kaggle.com/datasets/ruizgara/socofing. [Accessed: 04 August 2023].
[46]
Kayalvizhi S., Malarvizhi S., A novel encrypted compressive sensing of images based on fractional order hyper chaotic Chen system and DNA operations, Multimedia Tools Appl 79 (2020) 3957–3974.
[47]
El-Shafai W., Khallaf F., El-Rabaie E.-S.M., El-Samie F.E.A., Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications, J Ambient Intell Humaniz Comput 12 (2021) 9007–9035.
[48]
Hua Z., Zhou Y., Design of image cipher using block-based scrambling and image filtering, Inform Sci 396 (2017) 97–113.
[49]
Dagadu J.C., Li J.-P., Aboagye E.O., Medical image encryption based on hybrid chaotic DNA diffusion, Wirel Pers Commun 108 (2019) 591–612.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Information Security and Applications
Journal of Information Security and Applications  Volume 80, Issue C
Feb 2024
321 pages

Publisher

Elsevier Science Inc.

United States

Publication History

Published: 17 April 2024

Author Tags

  1. 2D Hénon-Sine map
  2. Secure Hash Algorithm
  3. Image encryption
  4. Confusion and diffusion
  5. Lossless compression

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media