Biometric Inspired Multimedia Encryption Based on Dual Parameter Fractional Fourier Transform

被引:14
作者
Bhatnagar, Gaurav [1 ]
Wu, Q. M. Jonathan [2 ]
机构
[1] Indian Inst Technol Jodhpur, Jodhpur 342011, Rajasthan, India
[2] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2014年 / 44卷 / 09期
基金
加拿大自然科学与工程研究理事会;
关键词
Biometrics; dual parameter fractional Fourier transform (DP-FrFT); encryption techniques; fractional Fourier transform; Hessenberg Decomposition; nonlinear chaotic map; CRYPTOGRAPHIC KEY GENERATION; IMAGE ENCRYPTION; ALGORITHM;
D O I
10.1109/TSMC.2014.2303789
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel biometric inspired multimedia encryption technique is proposed. For this purpose, a new advent in the definition of fractional Fourier transform, namely, dual parameter fractional Fourier transform (DP-FrFT) is proposed and used in multimedia encryption. The core idea behind the proposed encryption technique is to obtain biometrically encoded bitstream followed by the generation of the keys used in the encryption process. Since the key generation process of encryption technique directly determines the security of the technique. Therefore, this paper proposes an efficient method for generating biometrically encoded bitstream from biometrics and its usage to generate the keys. Then, the encryption of multimedia data is done in the DP-FrFT domain with the help of Hessenberg decomposition and nonlinear chaotic map. Finally, a reliable decryption process is proposed to construct original multimedia data from the encrypted data. Theoretical analyses and computer simulations both confirm high security and efficiency of the proposed encryption technique.
引用
收藏
页码:1234 / 1247
页数:14
相关论文
共 28 条
  • [11] Furht B., 2003, IEC COMPREHENSIVE RE
  • [12] Gaddam S. V. K., 2010, INT J NETW SECURITY, V11, P57
  • [13] A new chaotic algorithm for image encryption
    Gao, HJ
    Zhang, YS
    Liang, SY
    Li, DQ
    [J]. CHAOS SOLITONS & FRACTALS, 2006, 29 (02) : 393 - 399
  • [14] A new image encryption algorithm based on hyper-chaos
    Gao, Tiegang
    Chen, Zengqiang
    [J]. PHYSICS LETTERS A, 2008, 372 (04) : 394 - 400
  • [15] Combining crypto with biometrics effectively
    Hao, Feng
    Anderson, Ross
    Daugman, John
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (09) : 1081 - 1088
  • [16] Biometrics: A tool for information security
    Jain, Anil K.
    Ross, Arun
    Pankanti, Sharath
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (02) : 125 - 143
  • [17] Lian S., 2008, Multimedia Content Encryption: Techniques and Applications
  • [18] A novel image encryption algorithm based on self-adaptive wave transmission
    Liao, Xiaofeng
    Lai, Shiyue
    Zhou, Qing
    [J]. SIGNAL PROCESSING, 2010, 90 (09) : 2714 - 2722
  • [19] McClellan J. H., 1972, IEEE Transactions on Audio and Electroacoustics, VAU20, P66, DOI 10.1109/TAU.1972.1162342
  • [20] Cryptographic key generation from voice
    Monrose, F
    Reiter, MK
    Li, Q
    Wetzel, S
    [J]. 2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 202 - 213