Biometric Authentication Using Multilevel Encryption And Decryption

Security becomes an important issue nowadays in communication and storage of images. Encryption is one of the method used to ensure the high security of images. Due to the intrinsic features of the images such as bulk data capacity and high correlation among pixels the earlier encryption techniques such as DES, AES, RSA, etc are not suitable for practical applications. So nowadays chaos based encryption is used. In this paper we have two process. The first process is the training process and the second one is testing process. In the training process we will perform the encryption of different fingerprint images and then it will be stored. And in the testing process we will perform the authentication of the user. And the authentication is done after the decryption of the image. The encryption is done in both spatial domain and frequency domain. The spatial domain encryption is done using reversible hidden transform and the frequency domain encryption is done using piecewise linear chaotic map, fractional wavelet packet transform and singular value decomposition. The decryption process is the inverse of encryption process. And finally the authentication is done using support vector machine classifier.

[1]  Zhang Han,et al.  IMAGE ENCRYPTION TECHNIQUES USING CHAOTIC SCHEMES : A REVIEW , 2010 .

[2]  C. E. Puente,et al.  The Essence of Chaos , 1995 .

[3]  L. Chua,et al.  CLARIFYING CHAOS: EXAMPLES AND COUNTEREXAMPLES , 1996 .

[4]  Ying Huang,et al.  Fractional wave packet transform , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[5]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[6]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[7]  Delong Cui A Novel Fingerprint Encryption Algorithm Based on Chaotic System and Fractional Fourier Transform , 2010, 2010 International Conference on Machine Vision and Human-machine Interface.

[8]  B. N. Chatterji,et al.  Secure Image encryption through key hashing and wavelet transform techniques , 2012 .

[9]  Xinghuo Yu,et al.  Fingerprint images encryption via multi-scroll chaotic attractors , 2007, Appl. Math. Comput..

[10]  Roland Schmitz,et al.  Use of chaotic dynamical systems in cryptography , 2001, J. Frankl. Inst..

[11]  Xin Zhang,et al.  A new chaotic algorithm for image encryption , 2006 .

[12]  Linfei Chen,et al.  Image encryption with fractional wavelet packet method , 2008 .

[13]  Ljupco Kocarev,et al.  From chaotic maps to encryption schemes , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).

[14]  Abhinav Srivastava A survey report on Different Techniques of Image Encryption , 2012 .

[15]  A. Akhavan,et al.  A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .

[16]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[17]  Ganapati Panda,et al.  Image Encryption Using Advanced Hill Cipher Algorithm , 2009 .

[18]  Payal Sharma,et al.  DigitalImage Encryption Techniques: A Review , 2012 .

[19]  W. Tang,et al.  A fast image encryption system based on chaotic maps with finite precision representation , 2007 .

[20]  Gaurav Bhatnagar,et al.  Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission , 2012, IEEE Transactions on Instrumentation and Measurement.

[21]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[22]  Muhammad Khurram Khan,et al.  Challenge-response-based biometric image scrambling for secure personal identification , 2011, Future Gener. Comput. Syst..

[23]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .