Fingerprint images encryption via multi-scroll chaotic attractors

被引:73
作者
Han, Fengling [1 ]
Hu, Jiankun
Yu, Xinghuo
Wang, Yi
机构
[1] RMIT Univ, Sch Comp Sci & Informat Technol, Melbourne, Vic 3001, Australia
[2] RMIT Univ, Sch Elect & Comp Engn, Melbourne, Vic 3001, Australia
基金
澳大利亚研究理事会;
关键词
biometrics; chaotic attractor; fingerprint; image encryption; multi-scroll;
D O I
10.1016/j.amc.2006.07.030
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
This paper proposes a chaotic fingerprint images encryption approach. An image of a fingerprint is encrypted via a two-dimensional (2D) chaotic sequence obtained from multi-scroll chaotic attractors. Initial values of the chaotic attractors are served as the private key, which can be generated from the pixel distribution of the binary images of the captured fingerprints. Due to the dynamic uncertainties in the acquisition process of fingerprint images, the keys generated from the pixel value distribution are virtually random. With the elaborately designed 2D chaotic sequence, the encrypted fingerprint images have balanced 0-1 ratio and ideal nonlinearity. Only with the valid private key can the images of fingerprint be recovered. Simulation results and 2D-DFT validate this chaotic encryption approach. (c) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:931 / 939
页数:9
相关论文
共 16 条
  • [1] [Anonymous], 1995, APPL CRYPTOGRAPHY PR
  • [2] A new encryption algorithm for image cryptosystems
    Chang, CC
    Hwang, MS
    Chen, TS
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (02) : 83 - 91
  • [3] A symmetric image encryption scheme based on 3D chaotic cat maps
    Chen, GR
    Mao, YB
    Chui, CK
    [J]. CHAOS SOLITONS & FRACTALS, 2004, 21 (03) : 749 - 761
  • [4] HAN F, 2004, THESIS ROYAL MELBOUR
  • [5] Han FL, 2005, DYNAM CONT DIS SER B, V12, P95
  • [6] n-scroll chaotic oscillators by second-order systems and double-hysteresis blocks
    Han, FL
    Yu, XH
    Wang, YY
    Feng, Y
    Chen, GR
    [J]. ELECTRONICS LETTERS, 2003, 39 (23) : 1636 - 1638
  • [7] Feasibility of generating biometric encryption keys
    Hoque, S
    Fairhurst, M
    Howells, G
    Deravi, F
    [J]. ELECTRONICS LETTERS, 2005, 41 (06) : 309 - 311
  • [8] Chaos and cryptography: Block encryption ciphers based on chaotic maps
    Jakimoski, G
    Kocarev, L
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2001, 48 (02) : 163 - 169
  • [9] Kocarev L., 1998, P IEEE INT S CIRC SY, V4, P514, DOI DOI 10.1109/ISCAS.1998.698968
  • [10] Li SJ, 2002, 2002 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL II, PROCEEDINGS, P708