Compressed sensing based fingerprint imaging system using a chaotic model-based deterministic sensing matrix

被引:0
作者
Hailemariam, Workneh Wolde [1 ]
Gupta, Pallavi [1 ]
机构
[1] Sharda Univ, Greater Noida, Uttar Pradish, India
关键词
Compressed sensing; Fingerprint image; Sparse representation; Optimization; Encryption; Chaotic model; OVERCOMPLETE DICTIONARIES; ENCRYPTION SCHEME; SENSOR; RECOVERY; FOURIER; RECONSTRUCTION; IMPLEMENTATION; ARRAY;
D O I
10.1007/s11042-022-13444-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secured compressed sensing (CS) systems design approach uses a novel deterministic sensing matrix to sense and transmit fingerprint images. The performance of the CS system was studied in detail by varying CS and security parameters. The sampling and sparse coefficient are the parameters considered from compressed sensing, whereas the encryption key is from the security scheme. The simultaneous compression and encryption has been achieved by multiplying the sparse modeled data with the proposed deterministic partial bounded orthogonal sensing matrix. A chaotic model-based permutation is applied to scramble the DCT matrix rows to build the sensing matrix. Recovering and decryption of the compressed image are accomplished with the help of the L-1 optimization method. The experimental test shows that a sparse vector of 121 widths has been recovered by taking about 25 samples. This indicates that up to 1 : 5 compression ratio is supported without damaging the fingerprint minutiae. If only compression is required without encryption, up to a 1 : 16 ratio can be achieved. The peak signal-to-noise ratio (PSNR) is 27.65 dB for both compression ratios under fulfilments of all necessary security requirements. The 7.20 value of the entropy, histogram analysis, and the correlation analysis show the proposed scheme possesses adequate randomness. Furthermore, the ability of the system resistance against attacks is proved by 100% NPCR (Net Pixel Change Rate) and 0.92% UACI (Unified Average Changing Intensity) values.
引用
收藏
页码:6885 / 6915
页数:31
相关论文
共 72 条
  • [1] A wireless IOT system towards gait detection technique using FSR sensor and wearable IOT devices
    Achanta, Sampath Dakshina Murthy
    Karthikeyan, T.
    Kanna, Vinoth R.
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT UNMANNED SYSTEMS, 2019, 8 (01) : 43 - 54
  • [2] A novel hidden Markov model-based adaptive dynamic time warping (HMDTW) gait analysis for identifying physically challenged persons
    Achanta, Sampath Dakshina Murthy
    Karthikeyan, T.
    Vinothkanna, R.
    [J]. SOFT COMPUTING, 2019, 23 (18) : 8359 - 8366
  • [3] On the uniqueness of overcomplete dictionaries, and a practical way to retrieve them
    Aharon, Michal
    Elad, Michael
    Bruckstein, Alfred M.
    [J]. LINEAR ALGEBRA AND ITS APPLICATIONS, 2006, 416 (01) : 48 - 67
  • [4] K-SVD: An algorithm for designing overcomplete dictionaries for sparse representation
    Aharon, Michal
    Elad, Michael
    Bruckstein, Alfred
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (11) : 4311 - 4322
  • [5] UNIFIED APPROACH TO SHORT-TIME FOURIER-ANALYSIS AND SYNTHESIS
    ALLEN, JB
    RABINER, LR
    [J]. PROCEEDINGS OF THE IEEE, 1977, 65 (11) : 1558 - 1564
  • [6] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [7] [Anonymous], 2005, Automated fingerprint identification systems (AFIS)
  • [8] [Anonymous], 2001, SCIENTIFICWORKING GR
  • [9] Image coding using wavelet transform
    Antonini, Marc
    Barlaud, Michel
    Mathieu, Pierre
    Daubechies, Ingrid
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1992, 1 (02) : 205 - 220
  • [10] Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses
    Bakiri, Mohammed
    Guyeux, Christophe
    Couchot, Jean-Francois
    Oudjida, Abdelkrim Kamel
    [J]. COMPUTER SCIENCE REVIEW, 2018, 27 : 135 - 153