New Enrollment Scheme for Biometric Template Using Hash Chaos-based Cryptography

Abstract In this article we propose a new enrollment scheme for biometric template based on hash chaos-based cryptography (more precisely Davies – Meyer scheme). The idea of the scheme is to create a strong and unique authentication process of the biometric templates and to guarantee the safety of the biometric data.

[1]  S. Boccaletti,et al.  The control of chaos: theory and applications , 2000 .

[2]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[3]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[4]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[5]  Donghui Guo,et al.  A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks , 2004, Applied Intelligence.

[6]  Dascalescu Ana Cristina,et al.  A Method for Increasing the Randomness of Lagged Fibonacci Generators , 2010 .

[7]  Xun Yi,et al.  Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.

[8]  Leon O. Chua,et al.  Experimental Demonstration of Secure Communications via Chaotic Synchronization , 1992, Chua's Circuit.

[9]  Wang Pu One way Hash function construction based on chaotic mappings , 2000 .

[10]  Despina Polemi,et al.  Risk Analysis of Biometric Systems , 2004, WOSIS.

[11]  Xiaofeng Liao,et al.  A novel method for designing S-boxes based on chaotic maps , 2005 .

[12]  Vinod Patidar,et al.  Cryptography using multiple one-dimensional chaotic maps , 2005 .

[13]  Chai Wah Wu,et al.  A Simple Way to Synchronize Chaotic Systems with Applications to , 1993 .

[14]  Ö. Morgül,et al.  A chaotic masking scheme by using synchronized chaotic systems , 1999 .

[15]  Iwao Sasase,et al.  A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.

[16]  Ljupco Kocarev,et al.  From chaotic maps to encryption schemes , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).

[17]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[18]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[19]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[20]  Wang Mei-qin,et al.  The collision problem of one kind of methods for constructing one-way Hash function based on chaotic map , 2006 .

[21]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[22]  Mariana Hentea,et al.  Intelligent System for Information Security Management: Architecture and Design Issues , 2007 .

[23]  Vinod Patidar,et al.  A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing , 2009, Informatica.

[24]  Alan V. Oppenheim,et al.  Synchronization of Lorenz-based chaotic circuits with applications to communications , 1993 .

[25]  Heinz G. Schuster,et al.  Handbook of Chaos Control: SCHUSTER:HDBK.CHAOS CONTR O-BK , 1999 .

[26]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[27]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .