Biometric information security based on double chaotic rotating diffusion

被引:1
|
作者
Man, Zhenlong [1 ]
机构
[1] Liaoning Tech Univ, Sch Elect & Informat Engn, Huludao, Peoples R China
关键词
Biometrics technology; Private data; Chaotic system; Image encryption; Performance analysis; IMAGE; MAP;
D O I
10.1016/j.chaos.2023.113614
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Biometric technology is increasingly being used in various areas, including government law enforcement, exit and entry management, visitor access control, user identification, and daily attendance management for companies. This technology simplifies the procedure of user identity verification and reduces the time required for verification. However, the security of biological data stored in the system can be overlooked. To address this, we propose a secure biometric feature matching framework that encrypts all information stored in the biometric system. The system decrypts and extracts feature values only when recognition and matching are required, enabling secure matching judgment. This framework protects private data in the biometric system from illegal theft, tampering, and destruction, and promotes research and practical application of biometric security technology. To fully ensure system data security, we propose an adaptive rotation diffusion image encryption algorithm based on double chaos. The algorithm uses double chaos to control image scrambling and leverages the random characteristics of chaos. The algorithm adopts six different rotation diffusion methods, and different plaintext images lead to completely different diffusion methods, making the algorithm adaptive and effective against selected plaintext attacks. Experimental simulations and performance analysis confirm the feasibility and superiority of the proposed algorithm.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Information Disclosure and the Diffusion of Information Security Attacks
    Mitra, Sabyasachi
    Ransbotham, Sam
    INFORMATION SYSTEMS RESEARCH, 2015, 26 (03) : 565 - 584
  • [22] Social media user information security encryption method based on chaotic algorithm
    Yi, Xiao
    International Journal of Web Based Communities, 2024, 20 (1-2) : 128 - 138
  • [23] Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems
    Lou, Der-Chyuan
    Lee, Tian-Fu
    Lin, Tsung-Hung
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (05)
  • [24] Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems
    Der-Chyuan Lou
    Tian-Fu Lee
    Tsung-Hung Lin
    Journal of Medical Systems, 2015, 39
  • [25] Chaotic Construction of Cryptographic Keys Based on Biometric Data
    Nakouri, Ihsen
    Hamdi, Mohamed
    Kim, Tai-Hoon
    2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 509 - 516
  • [26] Secure Biometric Authentication Scheme Based on Chaotic Map
    Liang, Jiahao
    You, Lin
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 643 - 653
  • [27] Enhanced wireless body sensor networks security based on an integration of mamdani fuzzy and biometric information
    Sangi, Abdur Rashid
    Alshamrani, Hani A.
    Abdalla, Ahmad N.
    Alkatheiri, Mohammed S.
    Jatoi, Jahanzeb A.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 76 - 76
  • [28] An agent based multifactor biometric security system
    Chetty, Girija
    Sharma, Dharmendra
    Balachandran, Bala M.
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 245 - 251
  • [29] Biometric security management based on Internet of Things
    Sesha Vidhya S.
    Shanthi K.G.
    Keerthana S.
    Nisha P.
    Monisha H.
    Nandhini Devi G.
    Materials Today: Proceedings, 2023, 80 : 3204 - 3207
  • [30] Model Based Biometric Identification for Improved Security
    Raajan, N. R.
    Priya, M. V.
    Suganya, S.
    Philomina, A. Jenifer
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 479 - 485