CFP last date
16 December 2024
Call for Paper
January Edition
IJAIS solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 16 December 2024

Submit your paper
Know more
Reseach Article

A Novel Face Template Protection Scheme based on Chaos and Visual Cryptography

by Divya James, Mintu Philip
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 2 - Number 5
Year of Publication: 2012
Authors: Divya James, Mintu Philip
10.5120/ijais12-450356

Divya James, Mintu Philip . A Novel Face Template Protection Scheme based on Chaos and Visual Cryptography. International Journal of Applied Information Systems. 2, 5 ( May 2012), 31-35. DOI=10.5120/ijais12-450356

@article{ 10.5120/ijais12-450356,
author = { Divya James, Mintu Philip },
title = { A Novel Face Template Protection Scheme based on Chaos and Visual Cryptography },
journal = { International Journal of Applied Information Systems },
issue_date = { May 2012 },
volume = { 2 },
number = { 5 },
month = { May },
year = { 2012 },
issn = { 2249-0868 },
pages = { 31-35 },
numpages = {9},
url = { https://www.ijais.org/archives/volume2/number5/162-0356/ },
doi = { 10.5120/ijais12-450356 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:44:04.455217+05:30
%A Divya James
%A Mintu Philip
%T A Novel Face Template Protection Scheme based on Chaos and Visual Cryptography
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 2
%N 5
%P 31-35
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Protection of biometric data and templates is a crucial issue for the security of biometric systems This paper proposes new security architecture for protection of face templates using visual cryptography and chaotic image encryption. The use of visual cryptography is explored to preserve the privacy of biometric image by decomposing each private face image into two independent public host images such that the original image can be revealed only when both images are simultaneously available. The algorithm ensures protection as well as privacy for image using a fast encryption algorithm based on chaotic encryption. Chaos based cryptography is applied on to individual shares. Using this one can cross verify his identity along with the protection and privacy of the image.

References
  1. A. Jain and U. Uludag, "Hiding biometric data," IEEE Trans. Pattern Anal. Mach. Intell. , vol. 25, no. 11, pp. 1494–1498, Nov. 2003.
  2. M. Naor and A. Shamir, "Visual cryptography," in Proc. EUROCRYPT,1994, pp. 1–12.
  3. A. Shamir, . How to Share a Secret,. Communication ACM, vol. 22,1979, pp. 612-613.
  4. G. R. Blakley, . Safeguarding Cryptographic Keys,. Proceedings of AFIPS Conference, vol. 48, 1970, pp. 313-317.
  5. A. Menezes,P. Van Oorschot and S. Vanstone,Handbook of Applied Cryptography,CRC Press, Boca Raton, FL, 1997.
  6. B. Borchert, Segment Based Visual Cryptography,. WSI Press, Germany,2007.
  7. W-Q Yan, D. Jin and M. S. Kanakanahalli, . Visual Cryptography for Print and Scan Applications,. IEEE Transactions, ISCAS-2004, pp. 572-575.
  8. T. Monoth and A. P. Babu, . Recursive Visual Cryptography Using Random Basis Column Pixel Expansion,. in Proceedings of IEEEInternational Conference on Information Technology, 2007, pp. 41-43.
  9. H. J. Kim, V. Sachnev, S. J. Choi and S. Xiang, . An Innocuous Visual Cryptography Scheme,. in Proceedings of IEEE-8th International Workshop on Image Analysis for Multimedia Interactive Services, 2007.
  10. C. Blundo and A. De Santis, . On the contrast in Visual Cryptography Schemes,. in Journal on Cryptography, vol. 12, 1999, pp. 261-289.
  11. P. A. Eisen and D. R. Stinson, . Threshold Visual Cryptography with speci_ed Whiteness Levels of Reconstructed Pixels,. Designs, Codes, Cryptography, vol. 25, no. 1, 2002, pp. 15-61.
  12. E. R. Verheul and H. C. A. Van Tilborg, . Constructions and Properties of k out of n Visual Secret Sharing Schemes,. Designs, Codes, Cryptography, vol. 11, no. 2, 1997, pp. 179-196.
  13. H. Yan, Z. Gan and K. Chen, . A Cheater Detectable Visual Cryptography Scheme,. Journal of Shanghai Jiaotong University, vol. 38, no. 1,2004.
  14. G. B. Horng, T. G. Chen and D. S. Tsai, . Cheating in Visua Cryptography,. Designs, Codes, Cryptography, vol. 38, no. 2, 2006,pp. 219-236.
  15. C. M. Hu and W. G. Tzeng, . Cheating Prevention in Visual Cryptography,. IEEE Transaction on Image Processing, vol. 16, no. 1, Jan-2007,pp. 36-45.
  16. Fridrich J. Symmetric Ciphers Based on Two-dimensional Chaotic Maps. Int. J. Bifurcat Chaos 1998;8(6):1259-84.
  17. Chen G, Mao YB, Chui CK. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals 2004;12:749-761.
  18. Mao YB, Chen G, Lian SG, A novel fast image encryption scheme based on the 3D chaotic baker map. Int. J. Bifurcat Chaos 2004;14(10):3613-24.
  19. Guan ZH, Huang FJ, Guan WJ. Chaos-based image encryption algorithm, Phys LettA 2005;346:153-7.
  20. Lian SG, Sun J, Wang Z. A block cipher based on a suitable use of chaotic standard map. Chaos, Solitons and Fractals 2005;26(1):117-29.
  21. H. Gao, Y. Zhang, S. Liang, and D. Li, "A new chaotic algorithm for image encryption," Chaos, Solutions &Fractals, vol. 29, no. 2, pp. 393–399, 2006.
  22. M. Naor and A. Shamir, "Visual cryptography," in Proc. EUROCRYPT,1994, pp. 1–12.
  23. M. Nakajima and Y. Yamaguchi, "Extended visual cryptography fornatural images," J. WSCG, vol. 10, no. 2, pp. 303–310, 2002.
  24. G. Ateniese, C. Blundo, A. Santis, and D. Stinson, "Extended capabilitiesfor visual cryptography," Theor. Comput. Sci. , vol. 250, no. 1–2,pp. 143–161, 2001.
  25. S. Shevell, The Science of Color. Amsterdam, The Netherlands: ElsevierScience Ltd. , 2003.
  26. R. Floyd and L. Steinberg, "An adaptive algorithm for spatialgreyscale," SPIE Milestone Series, vol. 154, pp. 281–283, 1999.
  27. A. Ross and A. Othmen, "Visual Cryptography for Biometric Privacy" ,IEEE Transactions on Information forensics and security", vol. 6, no. 1, March 2011,pp. 70-81.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Security Chaotic Arnold Map