6D-Chaotic System and 2D Fractional Discrete Cosine Transform Based Encryption of Biometric Templates

A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In this technique, the <inline-formula> <tex-math notation="LaTeX">k </tex-math></inline-formula> biometric templates ar...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access Vol. 9; pp. 103056 - 103074
Main Authors: Kumar, Dhanesh, Joshi, Anand B., Singh, Sonali, Mishra, Vishnu Narayan, Rosales, Hamurabi Gamboa, Zhou, Liang, Dhaka, Arvind, Nandal, Amita, Malik, Hasmat, Singh, Satyendra
Format: Journal Article
Language:English
Published: Piscataway IEEE 2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:2169-3536, 2169-3536
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In this technique, the <inline-formula> <tex-math notation="LaTeX">k </tex-math></inline-formula> biometric templates are represented into three groups. After representation, these three groups are converted into row vectors and scrambled by using keys generated by the 6D-chaotic system and after that, these row vectors are combined into three matrices. The three matrices are then mixed horizontally and divided into two halves, with the left half serving as the real part and the right half serving as the imaginary part of a complex-valued matrix (CVM). This CVM is further subjected to 2D FrDCT. The output of 2D FrDCT is separated into three parts. The robustness of the technique is further enhanced by substitution operation using keys generated by the 6D-chaotic system. Thus, the final encrypted template is obtained. The analysis like security, statistical, and attacks are given to authenticate the reliability of the proposed technique. The experimental values also show that the proposed technique is resistant to brute force attacks.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2021.3097881