A robust embedded biometric authentication system based on fingerprint and chaotic encryption

Chaos and fingerprint data are combined for a highly secure authentication system.Embedded system in a 32-bit microcontroller with high performance at low cost.Murillo-Escobar's algorithm is implemented to protect template and avoid identity theft.Security analysis of encryption verifies the secrecy of the personal data.Performance and resources analysis justify the implementation of the system. Fingerprint recognition is a reliable solution in user authentication systems. Nevertheless, the security and secrecy of the users data are a concern in today's biometric systems and most of the security attention is focused in biometric template protection to avoid identity theft. In recent years, several approaches have been presented where the main objective is to have the biometric revocable, but almost all them have failed in verify their security and robustness. In last years, chaotic systems have been proposed in cryptography due they have several properties related with cryptography properties such as extreme sensibility on initial conditions with confusion and ergodicity with diffusion. In this paper, we present a novel fingerprint template protection scheme based on chaotic encryption by using the logistic map and Murillo-Escobar's algorithm (Murillo-Escobar et al., 2014). In addition, we present a novel implementation of our scheme in a 32 bit microcontroller for secure authentication systems to show its application on embedded expert systems. In contrast with recent approaches presented in literature, we present a complete security analysis in both statistical and implementation level, to justify the proposed scheme in a real application. Based in the results, the proposed embedded authentication system is secure, effective and at low cost, and it could be implemented on real secure access control systems.

[1]  Alfred Menezes,et al.  Handbook Of Applied Cryptography Crc Press , 2015 .

[2]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[3]  L M Adleman,et al.  Molecular computation of solutions to combinatorial problems. , 1994, Science.

[4]  E. Canto,et al.  Embedded security: New trends in personal recognition systems , 2007, 2007 Ph.D Research in Microelectronics and Electronics Conference.

[5]  Lei Qin,et al.  Asymmetric encryption and signature method with DNA technology , 2010, Science China Information Sciences.

[6]  Olcay Taner Yildiz,et al.  Cryptanalysis of Fridrich's Chaotic Image Encryption , 2010, Int. J. Bifurc. Chaos.

[7]  Christoph Busch,et al.  A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems , 2010, BIOSIG.

[8]  Milan Adamek,et al.  Security of biometric systems , 2015 .

[9]  Zhe Jin,et al.  Fingerprint template protection with minutiae-based bit-string for security and privacy preserving , 2012, Expert Syst. Appl..

[10]  Jia-Hong Dai,et al.  An embedded fingerprint authentication system with reduced hardware resources requirement , 2005, Proceedings of the Ninth International Symposium on Consumer Electronics, 2005. (ISCE 2005)..

[11]  Rui Liu,et al.  Chaos-based fingerprint images encryption using symmetric cryptography , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.

[12]  Monica Borda,et al.  DNA secret writing techniques , 2010, 2010 8th International Conference on Communications.

[13]  Safya Belghith,et al.  Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .

[14]  Guozhen Xiao,et al.  New field of cryptography: DNA cryptography , 2006 .

[15]  Muhammad Khurram Khan,et al.  Securing Biometric Templates for Reliable Identity Authentication , 2005, ICIC.

[16]  Yansheng Li,et al.  A multilevel fingerprinting method for FPGA IP protection , 2013, 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013).

[17]  Anil K. Jain,et al.  Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.

[18]  Niels Ferguson,et al.  A Simple Algebraic Representation of Rijndael , 2001, Selected Areas in Cryptography.

[19]  S. Li,et al.  Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption , 2009 .

[20]  Wang Xiaomin,et al.  Chaos-based biometrics template protection and secure authentication , 2011 .

[21]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[22]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[23]  Xinghuo Yu,et al.  Fingerprint images encryption via multi-scroll chaotic attractors , 2007, Appl. Math. Comput..

[24]  Lei Tian,et al.  Chaotic secure content-based hidden transmission of biometric templates , 2007 .

[25]  E. Solak,et al.  Cryptanalysis of a chaos-based image encryption algorithm , 2009 .

[26]  Hisham Al-Assam,et al.  A lightweight approach for biometric template protection , 2009, Defense + Commercial Sensing.

[27]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[28]  R. M. López-Gutiérrez,et al.  A RGB image encryption algorithm based on total plain image characteristics and chaos , 2015, Signal Process..

[29]  Gonzalo Alvarez,et al.  On the inadequacy of the logistic map for cryptographic applications , 2008 .

[30]  Sunil Kumar,et al.  Encryption of Biometric Templates using One Time Biometric Transform , 2009 .

[31]  Hung-I Hsiao,et al.  Fingerprint image cryptography based on multiple chaotic systems , 2015, Signal Process..

[32]  Hengjian Li,et al.  A High Performance and Secure Palmprint Template Protection Scheme , 2012, J. Softw..

[33]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[34]  Sanaa Ghouzali,et al.  Fingerprint shell: Secure representation of fingerprint template , 2014, Pattern Recognit. Lett..

[35]  Qiang Zhang,et al.  A Summarization on Image Encryption , 2010 .

[36]  X. Liao,et al.  Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map , 2007 .

[37]  Azizah Abdul Manaf,et al.  Data Hiding Method Based on DNA Basic Characteristics , 2011, DEIS.

[38]  Gaurav Bhatnagar,et al.  A novel chaos-based secure transmission of biometric data , 2015, Neurocomputing.

[39]  Andrew Beng Jin Teoh,et al.  Biometric cryptosystem based on discretized fingerprint texture descriptors , 2013, Expert Syst. Appl..

[40]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[41]  Muhammad Khurram Khan,et al.  Protecting Biometric Data for Personal Identification , 2004, SINOBIOMETRICS.

[42]  Zhang Jia-shu,et al.  A novel chaotic stream cipher and its application to palmprint template protection , 2010 .

[43]  Marius Iulian Mihailescu,et al.  New Enrollment Scheme for Biometric Template Using Hash Chaos-based Cryptography , 2014 .

[44]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[45]  Akira Otsuka,et al.  Relations among security metrics for template protection algorithms , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[46]  Hengjian Li,et al.  A Secure and Efficient Fingerprint Images Encryption Scheme , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[47]  Andrew Beng Jin Teoh,et al.  Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.

[48]  Munaga V. N. K. Prasad,et al.  Fingerprint template protection using multiline neighboring relation , 2014, Expert Syst. Appl..

[49]  Sanjeev Sofat,et al.  Template and Database Security in Biometrics Systems: A Challenging Task , 2010 .

[50]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[51]  Vincenzo Conti,et al.  A Novel Embedded Fingerprints Authentication System Based on Singularity Points , 2008, 2008 International Conference on Complex, Intelligent and Software Intensive Systems.

[52]  Sanaa Ghouzali,et al.  Private chaotic biometric template protection algorithm , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).

[53]  Ee-Chien Chang,et al.  Robust Extraction of Secret Bits from Minutiae , 2007, ICB.

[54]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[55]  Deepak Ranjan Nayak A Novel Architecture for Embedded Biometric Authentication System , 2008, 2008 Second UKSIM European Symposium on Computer Modeling and Simulation.

[56]  Kathy J. Horadam,et al.  Fuzzy Extractors for Minutiae-Based Fingerprint Authentication , 2007, ICB.

[57]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[58]  Robert M. May,et al.  Simple mathematical models with very complicated dynamics , 1976, Nature.

[59]  Gaurav Bhatnagar,et al.  Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission , 2012, IEEE Transactions on Instrumentation and Measurement.

[60]  Loris Nanni,et al.  State of the art in Biometrics , 2011 .

[61]  Delong Cui A Novel Fingerprint Encryption Algorithm Based on Chaotic System and Fractional Fourier Transform , 2010, 2010 International Conference on Machine Vision and Human-machine Interface.

[62]  Dongju Li,et al.  A novel SOC architecture embedded bit serial FPGA , 2004, The 2004 IEEE Asia-Pacific Conference on Circuits and Systems, 2004. Proceedings..

[63]  Catherine Taylor Clelland,et al.  Hiding messages in DNA microdots , 1999, Nature.

[64]  N. Nagaraj,et al.  Cryptanalysis of a Chaotic Image Encryption Algorithm , 2008, 0801.0276.

[65]  Anil K. Jain,et al.  Fingerprint Template Protection: From Theory to Practice , 2013, Security and Privacy in Biometrics.

[66]  Wolfgang A. Halang,et al.  Cryptanalysis of an image encryption scheme based on a compound chaotic sequence , 2007, Image Vis. Comput..