6D-Chaotic System and 2D Fractional Discrete Cosine Transform Based Encryption of Biometric Templates

A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In this technique, the <inline-formula> <tex-math notation="LaTeX">k </tex-math></inline-formula> biometric templates ar...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IEEE access Ročník 9; s. 103056 - 103074
Hlavní autori: Kumar, Dhanesh, Joshi, Anand B., Singh, Sonali, Mishra, Vishnu Narayan, Rosales, Hamurabi Gamboa, Zhou, Liang, Dhaka, Arvind, Nandal, Amita, Malik, Hasmat, Singh, Satyendra
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Piscataway IEEE 2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Predmet:
ISSN:2169-3536, 2169-3536
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Popis
Shrnutí:A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In this technique, the <inline-formula> <tex-math notation="LaTeX">k </tex-math></inline-formula> biometric templates are represented into three groups. After representation, these three groups are converted into row vectors and scrambled by using keys generated by the 6D-chaotic system and after that, these row vectors are combined into three matrices. The three matrices are then mixed horizontally and divided into two halves, with the left half serving as the real part and the right half serving as the imaginary part of a complex-valued matrix (CVM). This CVM is further subjected to 2D FrDCT. The output of 2D FrDCT is separated into three parts. The robustness of the technique is further enhanced by substitution operation using keys generated by the 6D-chaotic system. Thus, the final encrypted template is obtained. The analysis like security, statistical, and attacks are given to authenticate the reliability of the proposed technique. The experimental values also show that the proposed technique is resistant to brute force attacks.
Bibliografia:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2021.3097881