A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer

In this paper, a Lorenz-like chaotic system was developed to encrypt the dorsal hand patterns on a microcomputer. First, the dorsal hand vein images were taken from the subjects via an infrared camera. These were subjected to two different processes called contrast enhancement and segmentation of vein regions. Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. For the encryption process, random numbers were generated by the chaotic system. These random numbers were subjected to NIST-800-22 test which is the most widely accepted statistical test suite. The speeded up robust feature (SURF) matching algorithm was utilized in the initial condition sensitivity analysis of the encrypted images. The results of the analysis have shown that the proposed encryption algorithm can be used in identification and verification systems. The encrypted images were analyzed with histogram, correlation, entropy, pixel change rate (NPCR), initial condition sensitivity, data loss, and noise attacks which are frequently used for security analyses in the literature. In addition, the images were analyzed after noise attacks by means of peak signal-to-noise ratio (PSNR), mean square error (MSE), and the structural similarity index (SSIM) tests. It has been shown that the dorsal hand vein images can be used in identification systems safely with the help of the proposed method on microcomputers.

[1]  Yicong Zhou,et al.  Medical image encryption using edge maps , 2017, Signal Process..

[2]  Ihsan Pehlivan,et al.  A novel hybrid encryption algorithm based on chaos and S-AES algorithm , 2018, Nonlinear Dynamics.

[3]  Malrey Lee,et al.  A hybrid genetic algorithm and chaotic function model for image encryption , 2012 .

[4]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[5]  Lu Xu,et al.  A novel bit-level image encryption algorithm based on chaotic maps , 2016 .

[6]  Serdar Çiçek,et al.  A new 3D chaotic system: Dynamical analysis, electronic circuit design, active control synchronization and chaotic masking communication application , 2016 .

[7]  Dolendro Singh Laiphrakpam,et al.  Medical image encryption based on improved ElGamal encryption technique , 2017 .

[8]  A. Akhavan,et al.  An image encryption scheme based on quantum logistic map , 2012 .

[9]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[10]  Yong Zhang,et al.  A Fast Image Encryption Algorithm Based on Convolution Operation , 2019 .

[11]  Yin Dai,et al.  Chaotic Medical Image Encryption Algorithm Based on Bit-Plane Decomposition , 2016, Int. J. Pattern Recognit. Artif. Intell..

[12]  Chang Liu,et al.  Sensor-Based Random Number Generator Seeding , 2015, IEEE Access.

[13]  Hui Wang,et al.  A visually secure image encryption scheme based on parallel compressive sensing , 2019, Signal Process..

[14]  Akif Akgul,et al.  A new three-dimensional chaotic system, its dynamical analysis and electronic circuit applications , 2016 .

[15]  Jinde Cao,et al.  Synchronization of Time Delayed Fractional Order Chaotic Financial System , 2017 .

[16]  Xiao Chen,et al.  Adaptive medical image encryption algorithm based on multiple chaotic mapping , 2017, Saudi journal of biological sciences.

[17]  Xing-Yuan Wang,et al.  A new image encryption algorithm based on non-adjacent coupled map lattices , 2015, Appl. Soft Comput..

[18]  Aceng Sambas,et al.  A new three-dimensional chaotic system with a hidden attractor, circuit design and application in wireless mobile robot , 2017 .

[19]  K. Thenmozhi,et al.  Pixel scattering matrix formalism for image encryption—A key scheduled substitution and diffusion approach , 2015 .

[20]  Yong Zhang,et al.  The image encryption algorithm with plaintext-related shuffling , 2016 .

[21]  Yicong Zhou,et al.  Image encryption using binary bitplane , 2014, Signal Process..

[22]  Ali Emre Pusane,et al.  A novel design method for discrete time chaos based true random number generators , 2014, Integr..

[23]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[24]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[25]  Yiran Chen,et al.  A novel chaos-based image encryption algorithm using DNA sequence operations , 2017 .

[26]  Ihsan Pehlivan,et al.  A new 3D chaotic system with golden proportion equilibria: Analysis and electronic circuit realization , 2012, Comput. Electr. Eng..

[27]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[28]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[29]  Xingyuan Wang,et al.  Image encryption using DNA complementary rule and chaotic maps , 2012, Appl. Soft Comput..

[30]  曹晖,et al.  A new four-dimensional hyperchaotic Lorenz system and its adaptive control , 2011 .

[31]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[32]  Serdar Çiçek,et al.  Simulation and Circuit Implementation of Sprott Case H Chaotic System and its Synchronization Application for Secure Communication Systems , 2013, J. Circuits Syst. Comput..

[33]  Akif Akgul,et al.  A new three-dimensional chaotic system without equilibrium points, its dynamical analyses and electronic circuit application , 2016 .

[34]  V. Sundarapandian,et al.  Analysis, control, synchronization, and circuit design of a novel chaotic system , 2012, Math. Comput. Model..

[35]  Paulo Amorim,et al.  3D Adaptive Histogram Equalization Method for Medical Volumes , 2018, VISIGRAPP.

[36]  Jun-jie Chen,et al.  A chaos-based digital image encryption scheme with an improved diffusion strategy. , 2012, Optics express.

[37]  Soo-Won Kim,et al.  An biometric identification system by extracting hand vein patterns , 2001 .

[38]  Jian Zhang,et al.  Image Encryption Algorithm Based on Dynamic DNA Coding and Chen’s Hyperchaotic System , 2016 .

[39]  Safya Belghith,et al.  A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..

[40]  Bibhudendra Acharya,et al.  A Novel Image Encryption Based on Bit-Shuffled Improved Tent Map , 2016 .

[41]  Zhen Li,et al.  A novel plaintext-related image encryption scheme using hyper-chaotic system , 2018, Nonlinear Dynamics.

[42]  Peter Stavroulakis,et al.  Chaos Applications in Telecommunications , 2005 .

[43]  Funda Ergün Yardim,et al.  LORENZ-TABANLI DİFERANSİYEL KAOS KAYDIRMALI ANAHTARLAMA (DCSK) MODELİ KULLANILARAK KAOTİK BİR HABERLEŞME SİSTEMİNİN SİMÜLASYONU , 2010 .

[44]  M Kaur,et al.  Efficient image encryption method based on improved Lorenz chaotic system , 2018 .

[45]  Pagavathigounder Balasubramaniam,et al.  Synchronization of Markovian jumping inertial neural networks and its applications in image encryption , 2016, Neural Networks.

[46]  Lingyu Wang,et al.  Minutiae feature analysis for infrared hand vein pattern biometrics , 2008, Pattern Recognit..

[47]  I. Pehlivan,et al.  A strange novel chaotic system with fully golden proportion equilibria and its mobile microcomputer-based RNG application , 2018, Chinese Journal of Physics.

[48]  A. Wolf,et al.  Determining Lyapunov exponents from a time series , 1985 .

[49]  Massimiliano Zanin,et al.  Gray code permutation algorithm for high-dimensional data encryption , 2014, Inf. Sci..

[50]  Yicong Zhou,et al.  Medical image encryption using high-speed scrambling and pixel adaptive diffusion , 2018, Signal Process..

[51]  In-Kwon Lee,et al.  Modified computational integral imaging-based double image encryption using fractional Fourier transform , 2015 .

[52]  Ihsan Pehlivan,et al.  Simplified chaotic diffusionless Lorentz attractor and its application to secure communication systems , 2007, IET Commun..

[53]  Feng Xu,et al.  Image encryption based on non-affine and balanced cellular automata , 2014, Signal Process..

[54]  Xingyuan Wang,et al.  A novel chaotic image encryption scheme using DNA sequence operations , 2015 .

[55]  Ilaiah Kavati,et al.  Biometric Authentication Based on Hand Vein Pattern , 2014 .

[56]  Luigi Fortuna,et al.  Modelling of long-wave chaotic radar system for anti-stealth applications , 2018, Commun. Nonlinear Sci. Numer. Simul..

[57]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[58]  James A. Yorke,et al.  Numerical solution of a generalized eigenvalue problem for even mappings , 1979 .

[59]  G. Chetty,et al.  Human Identity Verification by Using Physiological and Behavioural Biometric Traits , 2011 .

[60]  Tariq Shah,et al.  A novel scheme for image encryption using substitution box and chaotic system , 2017 .

[61]  Giuseppe Lo Re,et al.  Secure random number generation in wireless sensor networks , 2015, Concurr. Comput. Pract. Exp..

[63]  Yicong Zhou,et al.  Design of image cipher using block-based scrambling and image filtering , 2017, Inf. Sci..

[64]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[65]  Takashi Yanagawa,et al.  Estimating the Lyapunov exponent from chaotic time series with dynamic noise , 2007 .

[66]  金忠 Jin Zhong,et al.  An Adaptive Feature and Weight Selection Method Based on Gabor Image for Face Recognition , 2011 .

[67]  Ihsan Pehlivan,et al.  Nonlinear Sprott94 Case A chaotic equation: Synchronization and masking communication applications , 2010, Comput. Electr. Eng..

[68]  Yurong Wang,et al.  Computational ghost imaging encryption based on fingerprint phase mask , 2018 .

[69]  Xingyuan Wang,et al.  A color image encryption with heterogeneous bit-permutation and correlated chaos , 2015 .

[70]  John C. Rodgers,et al.  True random number generation using CMOS Boolean chaotic oscillator , 2015, Microelectron. J..

[71]  A. Akhavan,et al.  A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .