Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2016, Article ID 2670494, 15 pages
http://dx.doi.org/10.1155/2016/2670494
Research Article

A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rössler Map

1Engineering, Architecture and Design Faculty, Autonomous University of Baja California (UABC), Ensenada, BC, Mexico
2Electronics and Telecommunications Department, Scientific Research and Advanced Studies of Ensenada (CICESE), Ensenada, BC, Mexico

Received 8 February 2016; Revised 16 June 2016; Accepted 22 June 2016

Academic Editor: Miguel A. F. Sanjuan

Copyright © 2016 F. Abundiz-Pérez et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. A. Murillo-Escobar, C. Cruz-Hernández, F. Abundiz-Pérez, R. M. López-Gutiérrez, and O. R. Acosta Del Campo, “A RGB image encryption algorithm based on total plain image characteristics and chaos,” Signal Processing, vol. 109, pp. 119–131, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. M. A. Murillo-Escobar, C. Cruz-Hernández, F. Abundiz-Pérez, and R. M. López-Gutiérrez, “A robust embedded biometric authentication system based on fingerprint and chaotic encryption,” Expert Systems with Applications, vol. 42, no. 21, pp. 8198–8211, 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Aguilar-Bustos, C. Cruz-Hernández, R. López-Gutiérrez, E. Tlelo-Cuautle, and C. Posadas-Castillo, “Hyperchaotic encryption for secure e-mail communication,” in Emergent Web Intelligence: Advanced Information Retrieval, pp. 471–486, Springer, London, UK, 2010. View at Google Scholar
  4. C. Cruz-Hernández, R. López-Gutiérrez, A. Aguilar-Bustos, and C. Posadas-Castillo, “Communicating encrypted information based on synchronized hyperchaotic maps,” International Journal of Nonlinear Sciences and Numerical Simulation, vol. 11, no. 5, pp. 337–350, 2010. View at Google Scholar
  5. A. Y. Aguilar-Bustos, C. Cruz-Hernández, R. M. López-Gutiérrez, and C. Posadas-Castillo, “Synchronization of different hyperchaotic maps for encryption,” Nonlinear Dynamics and Systems Theory, vol. 8, no. 3, pp. 221–236, 2008. View at Google Scholar · View at MathSciNet
  6. A. Y. Aguilar-Bustos and C. Cruz-Hernández, “Synchronization of discrete-time hyperchaotic systems: an application in communications,” Chaos, Solitons and Fractals, vol. 41, no. 3, pp. 1301–1310, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. E. J. Ngamga, A. Buscarino, M. Frasca, G. Sciuto, J. Kurths, and L. Fortuna, “Recurrence-based detection of the hyperchaos-chaos transition in an electronic circuit,” Chaos, vol. 20, no. 4, Article ID 043115, 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. M. L. Barakat, A. S. Mansingka, A. G. Radwan, and K. N. Salama, “Generalized hardware post-processing technique for chaos-based pseudorandom number generators,” ETRI Journal, vol. 35, no. 3, pp. 448–458, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. E. Inzunza-González and C. Cruz-Hernández, “Double hyperchaotic encryption for security in biometric systems,” Nonlinear Dynamics and Systems Theory, vol. 13, no. 1, pp. 55–68, 2013. View at Google Scholar
  10. O. Farooq and S. Datta, “Signal-dependent chaotic-state-modulated digital secure communication,” ETRI Journal, vol. 28, no. 2, pp. 250–252, 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. G. Bhatnagar and Q. M. J. Wu, “Enhancing the transmission security of biometric images using chaotic encryption,” Multimedia Systems, vol. 20, no. 2, pp. 203–214, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. H.-I. Hsiao and J. Lee, “A novel fingerprint image encryption algorithm based on chaos using APFM nonlinear adaptive filter,” in Proceedings of the IEEE 17th International Symposium on Consumer Electronics (ISCE '13), pp. 95–96, IEEE, Hsinchu, Taiwan, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. R. Liu, “Chaos-based fingerprint images encryption using symmetric cryptography,” in Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD '12), pp. 2153–2156, Sichuan, China, May 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. H.-I. Hsiao and J. Lee, “Fingerprint image cryptography based on multiple chaotic systems,” Signal Processing, vol. 113, pp. 169–181, 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. F. Abundiz-Pérez, C. Cruz-Hernández, M. Murillo-Escobar, and R. López-Gutierrez, “Fingerprint image encryption based on rossler map,” in Proceedings of the International Conference on Communications, Signal Processing and Computers, pp. 193–197, Interlaken, Switzerland, February 2014.
  16. O. Mirzaei, M. Yaghoobi, and H. Irani, “A new image encryption method: parallel sub-image encryption with hyper chaos,” Nonlinear Dynamics, vol. 67, no. 1, pp. 557–566, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. X.-Y. Wang and H.-l. Zhang, “A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems,” Nonlinear Dynamics, vol. 83, no. 1-2, pp. 333–346, 2016. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. X.-Y. Wang, Y.-Q. Zhang, and X.-M. Bao, “A novel chaotic image encryption scheme using DNA sequence operations,” Optics and Lasers in Engineering, vol. 73, pp. 53–61, 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. Q. Zhang, L. Guo, and X. Wei, “A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system,” Optik, vol. 124, no. 18, pp. 3596–3600, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. A. Jain, R. Bolle, and S. Pankanti, Biometrics: Personal Identification in Networked Society, vol. 479, Springer Science & Business Media, 2006.
  21. P. Ambalakat, “Security of biometric authentication systems,” in Proceedings of 21st Computer Science Seminar, SA1-T1, pp. 1–7, Academic Press, 2005.
  22. D. Brooks, “Assessing vulnerabilities of biometric readers using an applied defeat evaluation methodology,” in Proceedings of the 3rd Australian Security and Intelligence Conference, Edith Cowan University, November 2010.
  23. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer Science & Business Media, 2009. View at Publisher · View at Google Scholar
  24. M. K. Khan, J. Zhang, and K. Alghathbar, “Challenge-response-based biometric image scrambling for secure personal identification,” Future Generation Computer Systems, vol. 27, no. 4, pp. 411–418, 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. S. Zhao, H. Li, and X. Yan, “A secure and efficient fingerprint images encryption scheme,” in Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS '08), pp. 2803–2808, Hunan, China, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  26. G. Bhatnagar and Q. M. J. Wu, “Chaos-based security solution for fingerprint data during communication and transmission,” IEEE Transactions on Instrumentation and Measurement, vol. 61, no. 4, pp. 876–887, 2012. View at Publisher · View at Google Scholar · View at Scopus
  27. K. Nandakumar, A. K. Jain, and A. Nagar, “Biometric template security,” EURASIP Journal on Advances in Signal Processing, vol. 2008, Article ID 579416, 2008. View at Publisher · View at Google Scholar · View at Scopus
  28. M. K. Khan, L. Xie, and J. Zhang, “Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals,” Digital Signal Processing, vol. 20, no. 1, pp. 179–190, 2010. View at Publisher · View at Google Scholar · View at Scopus
  29. C. Militello, V. Conti, S. Vitabile, and F. Sorbello, “Embedded access points for trusted data and resources access in HPC systems,” The Journal of Supercomputing, vol. 55, no. 1, pp. 4–27, 2011. View at Publisher · View at Google Scholar · View at Scopus
  30. A. H. B. Muñoz, “Ataques tipo side-channel a sistemas biométricos de reconocimiento de huella dactilar,” Tech. Rep., Universidad Autónoma de Madrid, 2010. View at Google Scholar
  31. U. Uludag and A. K. Jain, “Attacks on biometric systems: a case study in fingerprints,” in Electronic Imaging, vol. 5306 of Proceedings of the SPIE, pp. 622–633, 2004. View at Publisher · View at Google Scholar
  32. G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 16, no. 8, pp. 2129–2151, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  33. H. Li, Y. Wang, H. Yan, L. Li, Q. Li, and X. Zhao, “Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform,” Optics and Lasers in Engineering, vol. 51, no. 12, pp. 1327–1331, 2013. View at Publisher · View at Google Scholar · View at Scopus