Biometric Inspired Multimedia Encryption Based on Dual Parameter Fractional Fourier Transform

被引:14
作者
Bhatnagar, Gaurav [1 ]
Wu, Q. M. Jonathan [2 ]
机构
[1] Indian Inst Technol Jodhpur, Jodhpur 342011, Rajasthan, India
[2] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2014年 / 44卷 / 09期
基金
加拿大自然科学与工程研究理事会;
关键词
Biometrics; dual parameter fractional Fourier transform (DP-FrFT); encryption techniques; fractional Fourier transform; Hessenberg Decomposition; nonlinear chaotic map; CRYPTOGRAPHIC KEY GENERATION; IMAGE ENCRYPTION; ALGORITHM;
D O I
10.1109/TSMC.2014.2303789
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel biometric inspired multimedia encryption technique is proposed. For this purpose, a new advent in the definition of fractional Fourier transform, namely, dual parameter fractional Fourier transform (DP-FrFT) is proposed and used in multimedia encryption. The core idea behind the proposed encryption technique is to obtain biometrically encoded bitstream followed by the generation of the keys used in the encryption process. Since the key generation process of encryption technique directly determines the security of the technique. Therefore, this paper proposes an efficient method for generating biometrically encoded bitstream from biometrics and its usage to generate the keys. Then, the encryption of multimedia data is done in the DP-FrFT domain with the help of Hessenberg decomposition and nonlinear chaotic map. Finally, a reliable decryption process is proposed to construct original multimedia data from the encrypted data. Theoretical analyses and computer simulations both confirm high security and efficiency of the proposed encryption technique.
引用
收藏
页码:1234 / 1247
页数:14
相关论文
共 28 条
  • [1] THE FRACTIONAL FOURIER-TRANSFORM AND TIME-FREQUENCY REPRESENTATIONS
    ALMEIDA, LB
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 1994, 42 (11) : 3084 - 3091
  • [2] Andrews George E, 1999, Encyclopedia of Mathematics and its Applications, V71, DOI DOI 10.1017/CBO9781107325937
  • [3] [Anonymous], 2000, FRACTIONAL FOURIER T
  • [4] [Anonymous], 2006, BIOMETRIC TECHNOLOGY
  • [5] [Anonymous], 2007, HDB BIOMETRICS HDB B
  • [6] Chen B., 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, P394, DOI DOI 10.1109/DICTA.2007.4426824
  • [7] How iris recognition works
    Daugman, J
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004, 14 (01) : 21 - 30
  • [8] Daugman J, 2003, PATTERN RECOGN, V36, P279, DOI 10.1016/S0031-3203(02)00030-4
  • [9] New methods in iris recognition
    Daugman, John
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2007, 37 (05): : 1167 - 1175
  • [10] A new image encryption scheme based on a chaotic function
    Francois, M.
    Grosges, T.
    Barchiesi, D.
    Erra, R.
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2012, 27 (03) : 249 - 259