Table of Contents
International Scholarly Research Notices
Volume 2014, Article ID 351696, 13 pages
http://dx.doi.org/10.1155/2014/351696
Research Article

Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing

Computer Science Department, Education College for Pure Science, Basrah University, Basrah 61004, Iraq

Received 15 March 2014; Revised 6 June 2014; Accepted 11 June 2014; Published 24 September 2014

Academic Editor: Min-Shiang Hwang

Copyright © 2014 Ali A. Yassin. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1–11, 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Shin, K. Kobara, and H. Imai, “A secure construction for threshold anonymous password-authenticated key exchange,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 91, no. 11, pp. 3312–3324, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Katz and M. Yung, “Scalable protocols for authenticated group key exchange,” Journal of Cryptology, vol. 20, no. 1, pp. 85–113, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  4. R. Kaur and E. K. Singh, “Image encryption techniques? A selected review,” Journal of Computer Engineering, vol. 9, no. 6, pp. 80–83, 2013. View at Google Scholar
  5. K. Karthik and D. Hatzinakos, “Decryption key design for joint fingerprinting and decryption in the sign bit plane for multicast content protection,” International Journal of Network Security, vol. 4, no. 3, pp. 254–265, 2007. View at Google Scholar · View at Scopus
  6. C.-C. Lee, P.-S. Chung, and M.-S. Hwang, “A survey on attribute-based encryption schemes of access control in cloud environments,” International Journal of Network Security, vol. 15, no. 4, pp. 231–240, 2013. View at Google Scholar · View at Scopus
  7. A. A. Yassin, R. M. Ghadban, S. F. Salah, and H. Z. Neima, “Using discrete wavelet transformation to enhance underwater image,” International Journal of Computer Science Issues, vol. 10, no. 2, pp. 220–228, 2013. View at Google Scholar
  8. I. Vasilescu, C. Detweiler, and D. Rus, “Color-accurate underwater imaging using perceptual adaptive illumination,” Autonomous Robots, vol. 31, no. 2-3, pp. 285–296, 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. R. Rhouma, D. Arroyo, and S. Belghith, “A new color image cryptosystem based on a piecewise linear chaotic map,” in Proceedings of the 6th International Multi-Conference on Systems, Signals and Devices (SSD '09), pp. 1–6, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. M. Ahmad and M. Alam, “A new algorithm of encryption and decryption of images using chaotic mapping,” International Journal on Computer Science and Engineering, vol. 2, no. 1, pp. 46–50, 2009. View at Google Scholar
  11. W. Wei, L. Fen-Lin, G. Xin, and Y. Yebin, “Color image encryption algorithm based on hyper chaos,” in Proceedings of the 2nd IEEE International Conference on Information Management and Engineering (ICIME '10), pp. 271–274, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. S. H. Kamali, M. Hedayati, R. Shakerian, and M. Rahmani, “A new modified version of Advanced Encryption Standard based algorithm for image encryption,” in Proceedings of the International Conference on Electronics and Information Engineering (ICEIE '10), vol. 1, pp. 141–145, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. Z. Aihong, L. Lian, and Z. Shuai, “Research on method of color image protective transmission based on Logistic map,” in Proceedings of the International Conference on Computer Application and System Modeling (ICCASM '10), vol. 9, pp. V9266–V9269, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. M. T. Rodríguez-Sahagún, J. B. Mercado-Sánchez, D. López-Mancilla, R. Jaimes-Reátegui, and J. H. García-López, “Image encryption based on logistic chaotic map for secure communications,” in Proceedings of the 7th IEEE Electronics, Robotics and Automotive Mechanics Conference (CERMA '10), pp. 319–324, Morelos, Mexico, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. J. M. K. Mastan, G. A. Sathishkumar, and K. B. Bagan, “A color image encryption technique based on a substitution permutation network,” Advances in Computing and Communications, vol. 4, pp. 524–533, 2011. View at Google Scholar
  16. K. K. S. Pareek, K. Narendra, and V. Patidar, “A symmetric encryption scheme for colour BMP images,” International Journal of Computer Applications in Special Issue on Network Security and Cryptography, no. 2, pp. 42–46, 2011. View at Google Scholar
  17. L. M. Jawad and G. B. Sulong, “A review of color image encryption techniques,” International Journal of Computer Science Issues, vol. 10, no. 6, pp. 266–275, 2013. View at Google Scholar
  18. S. K. Panigrahy, B. Acharya, and D. Jen, “Image encryption using self-invertible key matrix of hill cipher algorithm,” in Proceedings of the 1st International Conference on Advances in Computing, Chikhli, India, February 2008.
  19. H. H. Nien, W. T. Huang, C. M. Hung et al., “Hybrid image encryption using multi-chaos-system,” in Proceedings of the 7th International Conference on Information, Communications and Signal Processing (ICICS '09), pp. 1–5, Macau, China, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. S. M. Seyedzade, R. E. Atani, and S. Mirzakuchaki, “A novel image encryption algorithm based on hash function,” in Proceedings of the 6th Iranian Conference on Machine Vision and Image Processing (MVIP '10), pp. 1–6, Isfahan, Iran, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. I. S.-I. Abuhaiba and M. A.-S. Hassan, “Image encryption using differential evolution approach in frequency domain,” Signal & Image Processing, vol. 2, no. 1, 2011. View at Google Scholar
  22. R. Munir, “Robustness analysis of selective image encryption algorithm based on Arnold cat map permutation,” in Proceedings of 3rd Makassar International Conference on Electrical Engineering and Informatics, pp. 1–5, November 2012.
  23. M. Tico and P. Kuosmanen, “Fingerprint matching using an orientation-based minutia descriptor,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 8, pp. 1009–1014, 2003. View at Publisher · View at Google Scholar · View at Scopus
  24. A. Kisel, A. Kochetkov, and J. Kranauskas, “Fingerprint minutiae matching without global alignment using local structures,” Informatica, vol. 19, no. 1, pp. 31–44, 2008. View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  25. S. Arora and S. K. Singla, “Image based fingerprint verification system using LabVIEW,” Majeo International Journal of Science and Technology, vol. 2, no. 3, pp. 489–501, 2008. View at Google Scholar
  26. F. Chen, J. Zhou, and C. Yang, “Reconstructing orientation field from fingerprint minutiae to improve minutiae-matching accuracy,” IEEE Transactions on Image Processing, vol. 18, no. 7, pp. 1665–1670, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  27. K. Cao, X. Yang, X. Tao, P. Li, Y. Zang, and J. Tian, “Combining features for distorted fingerprint matching,” Journal of Network and Computer Applications, vol. 33, no. 3, pp. 258–267, 2010. View at Publisher · View at Google Scholar · View at Scopus
  28. H. Choi, K. Choi, and J. Kim, “Fingerprint matching incorporating ridge features with minutiae,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 338–345, 2011. View at Publisher · View at Google Scholar · View at Scopus
  29. A. Lumini and L. Nanni, “When fingerprints are combined with iris—a case study: FVC2004 and CASIA,” International Journal of Network Security, vol. 4, no. 1, pp. 27–34, 2007. View at Google Scholar