Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

August Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the August 2021 Edition of the journal. The last date of research paper submission is July 15, 2021.

A Novel Face Template Protection Scheme based on Chaos and Visual Cryptography

Divya James, Mintu Philip Published in Biometrics

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
10.5120/ijais12-450356
Download full text
  1. Divya James and Mintu Philip. Article: A Novel Face Template Protection Scheme based on Chaos and Visual Cryptography. International Journal of Applied Information Systems 2(5):31-35, May 2012. BibTeX

    @article{key:article,
    	author = "Divya James and Mintu Philip",
    	title = "Article: A Novel Face Template Protection Scheme based on Chaos and Visual Cryptography",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 2,
    	number = 5,
    	pages = "31-35",
    	month = "May",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

Protection of biometric data and templates is a crucial issue for the security of biometric systems This paper proposes new security architecture for protection of face templates using visual cryptography and chaotic image encryption. The use of visual cryptography is explored to preserve the privacy of biometric image by decomposing each private face image into two independent public host images such that the original image can be revealed only when both images are simultaneously available. The algorithm ensures protection as well as privacy for image using a fast encryption algorithm based on chaotic encryption. Chaos based cryptography is applied on to individual shares. Using this one can cross verify his identity along with the protection and privacy of the image.

Reference

  1. A. Jain and U. Uludag, "Hiding biometric data," IEEE Trans. Pattern Anal. Mach. Intell. , vol. 25, no. 11, pp. 1494–1498, Nov. 2003.
  2. M. Naor and A. Shamir, "Visual cryptography," in Proc. EUROCRYPT,1994, pp. 1–12.
  3. A. Shamir, . How to Share a Secret,. Communication ACM, vol. 22,1979, pp. 612-613.
  4. G. R. Blakley, . Safeguarding Cryptographic Keys,. Proceedings of AFIPS Conference, vol. 48, 1970, pp. 313-317.
  5. A. Menezes,P. Van Oorschot and S. Vanstone,Handbook of Applied Cryptography,CRC Press, Boca Raton, FL, 1997.
  6. B. Borchert, Segment Based Visual Cryptography,. WSI Press, Germany,2007.
  7. W-Q Yan, D. Jin and M. S. Kanakanahalli, . Visual Cryptography for Print and Scan Applications,. IEEE Transactions, ISCAS-2004, pp. 572-575.
  8. T. Monoth and A. P. Babu, . Recursive Visual Cryptography Using Random Basis Column Pixel Expansion,. in Proceedings of IEEEInternational Conference on Information Technology, 2007, pp. 41-43.
  9. H. J. Kim, V. Sachnev, S. J. Choi and S. Xiang, . An Innocuous Visual Cryptography Scheme,. in Proceedings of IEEE-8th International Workshop on Image Analysis for Multimedia Interactive Services, 2007.
  10. C. Blundo and A. De Santis, . On the contrast in Visual Cryptography Schemes,. in Journal on Cryptography, vol. 12, 1999, pp. 261-289.
  11. P. A. Eisen and D. R. Stinson, . Threshold Visual Cryptography with speci_ed Whiteness Levels of Reconstructed Pixels,. Designs, Codes, Cryptography, vol. 25, no. 1, 2002, pp. 15-61.
  12. E. R. Verheul and H. C. A. Van Tilborg, . Constructions and Properties of k out of n Visual Secret Sharing Schemes,. Designs, Codes, Cryptography, vol. 11, no. 2, 1997, pp. 179-196.
  13. H. Yan, Z. Gan and K. Chen, . A Cheater Detectable Visual Cryptography Scheme,. Journal of Shanghai Jiaotong University, vol. 38, no. 1,2004.
  14. G. B. Horng, T. G. Chen and D. S. Tsai, . Cheating in Visua Cryptography,. Designs, Codes, Cryptography, vol. 38, no. 2, 2006,pp. 219-236.
  15. C. M. Hu and W. G. Tzeng, . Cheating Prevention in Visual Cryptography,. IEEE Transaction on Image Processing, vol. 16, no. 1, Jan-2007,pp. 36-45.
  16. Fridrich J. Symmetric Ciphers Based on Two-dimensional Chaotic Maps. Int. J. Bifurcat Chaos 1998;8(6):1259-84.
  17. Chen G, Mao YB, Chui CK. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals 2004;12:749-761.
  18. Mao YB, Chen G, Lian SG, A novel fast image encryption scheme based on the 3D chaotic baker map. Int. J. Bifurcat Chaos 2004;14(10):3613-24.
  19. Guan ZH, Huang FJ, Guan WJ. Chaos-based image encryption algorithm, Phys LettA 2005;346:153-7.
  20. Lian SG, Sun J, Wang Z. A block cipher based on a suitable use of chaotic standard map. Chaos, Solitons and Fractals 2005;26(1):117-29.
  21. H. Gao, Y. Zhang, S. Liang, and D. Li, "A new chaotic algorithm for image encryption," Chaos, Solutions &Fractals, vol. 29, no. 2, pp. 393–399, 2006.
  22. M. Naor and A. Shamir, "Visual cryptography," in Proc. EUROCRYPT,1994, pp. 1–12.
  23. M. Nakajima and Y. Yamaguchi, "Extended visual cryptography fornatural images," J. WSCG, vol. 10, no. 2, pp. 303–310, 2002.
  24. G. Ateniese, C. Blundo, A. Santis, and D. Stinson, "Extended capabilitiesfor visual cryptography," Theor. Comput. Sci. , vol. 250, no. 1–2,pp. 143–161, 2001.
  25. S. Shevell, The Science of Color. Amsterdam, The Netherlands: ElsevierScience Ltd. , 2003.
  26. R. Floyd and L. Steinberg, "An adaptive algorithm for spatialgreyscale," SPIE Milestone Series, vol. 154, pp. 281–283, 1999.
  27. A. Ross and A. Othmen, "Visual Cryptography for Biometric Privacy" ,IEEE Transactions on Information forensics and security", vol. 6, no. 1, March 2011,pp. 70-81.

Keywords

Visual Cryptography, Security, Chaotic, Arnold Map