Path: Top -> Journal -> Jurnal Internasional -> King Saud University -> 2020 -> Volume 32, Issue 7, September
A new approach for palmprint image encryption based on hybrid chaotic maps
Oleh : Noha A. Hikal, Marwa M. Eid, King Saud University
Dibuat : 2021-08-06, dengan 0 file
Keyword : Ikeda map, Arnold s cat map, Lorenz map, Palmprint security, Chaos cryptography
Url : http://www.sciencedirect.com/science/article/pii/S1319157818302210
Sumber pengambilan dokumen : Web
Biometric data has gain great interests as being precise authenticators. Saving and transmitting biometric data in the form of images over public networks needs a fast, lossless and secure cryptosystem for keeping biometric images details while securing it. In this paper, a novel encryption scheme is presented for securing palm print images based on hybrid chaotic maps. The proposed hybrid scheme is designed to fit the challenges of diffusion, confusion, and to provide large key space. The scheme applies a mixture of different chaos maps for a particular selection of the control parameters. Both the encryption and decryption processes are explained, formulated, and graphically presented. The results of security analysis verified the strengths of the proposed cryptosystem against statistical, brute force and differential attacks. The evaluated running time, for both encryption and decryption processes, guarantee that the cryptosystem can work effectively in real-time applications compared to current available techniques.
Deskripsi Alternatif :Biometric data has gain great interests as being precise authenticators. Saving and transmitting biometric data in the form of images over public networks needs a fast, lossless and secure cryptosystem for keeping biometric images details while securing it. In this paper, a novel encryption scheme is presented for securing palm print images based on hybrid chaotic maps. The proposed hybrid scheme is designed to fit the challenges of diffusion, confusion, and to provide large key space. The scheme applies a mixture of different chaos maps for a particular selection of the control parameters. Both the encryption and decryption processes are explained, formulated, and graphically presented. The results of security analysis verified the strengths of the proposed cryptosystem against statistical, brute force and differential attacks. The evaluated running time, for both encryption and decryption processes, guarantee that the cryptosystem can work effectively in real-time applications compared to current available techniques.
Beri Komentar ?#(0) | Bookmark
Properti | Nilai Properti |
---|---|
ID Publisher | gdlhub |
Organisasi | King Saud University |
Nama Kontak | Herti Yani, S.Kom |
Alamat | Jln. Jenderal Sudirman |
Kota | Jambi |
Daerah | Jambi |
Negara | Indonesia |
Telepon | 0741-35095 |
Fax | 0741-35093 |
E-mail Administrator | elibrarystikom@gmail.com |
E-mail CKO | elibrarystikom@gmail.com |
Print ...
Kontributor...
- Editor: Calvin