IJTEEE
International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
PREVIOUS PUBLICATIONS



IJTEEE >> Volume 1 - Issue 4, November 2013 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



Facial Template Protection Using Extended Visual Cryptography And Chaotic Encryption

[Full Text]

 

AUTHOR(S)

Reena Mary George

 

KEYWORDS

Keywords: Biometry, facial image, visual cryptography, chaotic encryption, logistic map

 

ABSTRACT

ABSTRACT: Protection of biometric data is of prime importance now a days. In this paper a new method is proposed for the protection of biometric facial data using visual cryptography and chaotic encryption. By using visual cryptography each private face image is decomposed into two public host images. The original image gets revealed only when both of these images are available simultaneously. By using chaotic encryption extra protection as well as privacy is ensured for these images. Chaotic encryption is applied onto each share. Any system having chaotic behaviour is used for getting values for encrypting the shares. Here 1D logistic map is used.

 

REFERENCES

[1] S. Prabhakar, S. Pankanti, and A. Jain, “Biometric recognition: Security and privacy concerns,” IEEE Security Privacy , vol. 1, no. 2, pp. 33–42,Mar./Apr. 2003A.

[2] Jain and U. Uludag, “Hiding biometric data,” IEEETrans. Pattern Anal. Mach. Intell., vol. 25, no. 11, pp.1494–1498, Nov. 2003.

[3] M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT ,1994, pp. 1–12.

[4] M. Nakajima and Y. Yamaguchi, “Extended visual cryptography for natural images,” J. WSCG , vol. 10, no. 2, pp. 303–310, 2002.

[5] R. Floyd and L. Steinberg, “An adaptive algorithm for spatial greyscale,” SPIE Milestone Series , vol. 154, pp. 281–283, 1999.

[6] A.Ross and A.Othmen, "Visual Cryptography for Biometric Privacy" ,IEEE Transactions on Information forensics and security", vol. 6, no. 1, March 2011,pp. 70-81.

[7] G. Ateniese, C. Blundo, A. Santis, and D. Stinson, “Extended capabil-ities for visual cryptography,” Theor. Comput. Sci. , vol. 250, no. 1–2,pp. 143–161, 2001.

[8] R.M. May, “Simple mathematical model with very complicated dynamics”, Nature 261, 459(1976).

[9] Mrinal Kanti Mandal, Gourab Dutta banik, Debashish Chattopadhyay and Debashish Nandi, “An Image Encryption Process based on Chaotic Logistic Map,” IETE Technical Review, Vol 29 , Issue 5, Sep-Oct 2005.