A Proposed Fingerprint Image Encryption Scheme Based on Wavelet Fusion | ||||
Menoufia Journal of Electronic Engineering Research | ||||
Article 8, Volume 27, Issue 2, July 2018, Page 165-182 | ||||
Document Type: Original Article | ||||
DOI: 10.21608/mjeer.2018.63187 | ||||
View on SCiNiTO | ||||
Authors | ||||
Fatma G. Hashad1; El-Sayed M. El-Rabaie1; Ibrahim F. El Ashry2; F. E. Abd ElSamie1; O. Zahran3 | ||||
1Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University | ||||
2Department of Electrical Communications, Faculty of Engineering, Kafrelsheikh University, Kafr elsheikh, Egypt. | ||||
3Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt. | ||||
Abstract | ||||
This paper presents two chaotic image encryption plans combined with Discrete Wavelet Transform (DWT) to encrypt unique fingerprint. In the first proposal, the fingerprint which has few details (low entropy) is fused with another image which is rich in details (high entropy) using the Discrete Wavelet Transform (DWT) prior to encryption. The fusion process is a pre-processing step to alter the homogeneity of flat areas in the few-details fingerprint image. Then, the technique of the Chaotic Baker map randomization is applied on the output fused image. In the second proposal, the fingerprint is fused with an image encrypted with RC6 block cipher algorithm prior to encryption. Several metrics are used in this paper for performance evaluation of the proposed encryption scheme including, visual inspection, histogram analysis, encryption quality analysis, and diffusion analysis. The outcomes demonstrate that the proposed image encryption schemes give a proficient and secure path for unique fingerprint encryption. | ||||
Keywords | ||||
Fingerprint image encryption; Chaotic Baker map; RC6 block cipher algorithm; DWT; image fusion | ||||
References | ||||
[1] S. Hong, H. Kim, S. Lee, and Y. Chung, “Analyzing the secure and energy efficient transmissions of compressed fingerprint images using encryption and watermarking,” International Conference for Young computer Scientists, pp. 2803–2808, 2008. [2] S. Zhao , H. Li, X. Yan, “A secure and efficient fingerprint images encryption scheme,” The 9th International Conference for Young Computer Scientists, pp. 316–320, 2008. [3] L.Hong, Y.Wan, A.Jain, “Fingerprint image enhancement algorithm and performance evaluation,” IEEE Trans. Pattern and Mach, Intell, 20(8) (1998)777-789. [4] J. FRIDRICH," Symmetric Ciphers Based on Two-Dimensional Chaotic Maps," [5] International Journal of Bifurcation and Chaos, Vol. 8, No. 6 (1998) 1259{1284 [6] C. E. Shannon, “Communication theory of secrecy system,” Bell Syst. Tech. J. 28, 656–715 [7] P.Patel ,M.Rajpoot, "Secure Fingerprint Identification System and Matching by Using Image Registration and Key Matching Techniques," Proceeding of the International Journal of Engineering Research & Technology (IJERT) , Vol. 2 , June – 2013. [8] T. Stathaki, Image Fusion: Algorithms and Applications. New York: Academic, 2008. [9] A. Wang, H. J. Sun, and Y. Y. Guan, “The application of wavelet transform to multi-modality medical image fusion,” Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, (ICNSC), pp. 270-274, 2006. [10] E. A. Naeem, Mustafa M. AbdElnaby, Mohiy M. Hadhoud and F. E. Abd El Samie, “Chaotic image encryption in transform domains”, Proceedings of The 2009 International Conference on Computer Engineering & Systems (ICCES’09), pp. 288-293, 2009. [11] S. Kumar D R, K B Raja, R K Chhotaray, S Pattanaik," DWT Based Fingerprint Recognition using Non Minutiae Features," IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011. [12] N.A Flayh, S.I. Ahson, “Wavelet based image encryption”, Proceedings of the 9th International Conference on Signal Processing (ICSP), pp. 797-800, 2008. [13] C.C. Chang, M.S. Hwang, T.S. Chen, “A New Encryption Algorithm for Image Cryptosystems,” Journal of Syst. Software 58 (2001), pp. 83–91. [14] Khamies El-Shennawy, Author, book title, “Communication Theory and Signal Processing For Transform Coding,” Bentham Science Publishers, 2014, eISBN:978-1-60805-830-3, and ISBN:978-1-60805-831-0,(chapter 10) | ||||
Statistics Article View: 159 |
||||