Facial Template Protection Using Extended Visual Cryptography And Chaotic Encryption
[Full Text]
AUTHOR(S)
Reena Mary George
KEYWORDS
Keywords: Biometry, facial image, visual cryptography, chaotic encryption, logistic map
ABSTRACT
ABSTRACT: Protection of biometric data is of prime importance now a days. In this paper a new method is proposed for the protection of biometric facial data using visual cryptography and chaotic encryption. By using visual cryptography each private face image is decomposed into two public host images. The original image gets revealed only when both of these images are available simultaneously. By using chaotic encryption extra protection as well as privacy is ensured for these images. Chaotic encryption is applied onto each share. Any system having chaotic behaviour is used for getting values for encrypting the shares. Here 1D logistic map is used.
REFERENCES
[1] S. Prabhakar, S. Pankanti, and A. Jain, “Biometric recognition: Security and privacy concerns,” IEEE Security Privacy , vol. 1, no. 2, pp. 33–42,Mar./Apr. 2003A.
[2] Jain and U. Uludag, “Hiding biometric data,” IEEETrans. Pattern Anal. Mach. Intell., vol. 25, no. 11, pp.1494–1498, Nov. 2003.
[3] M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT ,1994, pp. 1–12.
[4] M. Nakajima and Y. Yamaguchi, “Extended visual cryptography for natural images,” J. WSCG , vol. 10, no. 2, pp. 303–310, 2002.
[5] R. Floyd and L. Steinberg, “An adaptive algorithm for spatial greyscale,” SPIE Milestone Series , vol. 154, pp. 281–283, 1999.
[6] A.Ross and A.Othmen, "Visual Cryptography for Biometric Privacy" ,IEEE Transactions on Information forensics and security", vol. 6, no. 1, March 2011,pp. 7081.
[7] G. Ateniese, C. Blundo, A. Santis, and D. Stinson, “Extended capabilities for visual cryptography,” Theor. Comput. Sci. , vol. 250, no. 1–2,pp. 143–161, 2001.
[8] R.M. May, “Simple mathematical model with very complicated dynamics”, Nature 261, 459(1976).
[9] Mrinal Kanti Mandal, Gourab Dutta banik, Debashish Chattopadhyay and Debashish Nandi, “An Image Encryption Process based on Chaotic Logistic Map,” IETE Technical Review, Vol 29 , Issue 5, SepOct 2005.
