scholarly journals Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing

2014 ◽  
Vol 2014 ◽  
pp. 1-13 ◽  
Author(s):  
Ali A. Yassin

Now, the security of digital images is considered more and more essential and fingerprint plays the main role in the world of image. Furthermore, fingerprint recognition is a scheme of biometric verification that applies pattern recognition techniques depending on image of fingerprint individually. In the cloud environment, an adversary has the ability to intercept information and must be secured from eavesdroppers. Unluckily, encryption and decryption functions are slow and they are often hard. Fingerprint techniques required extra hardware and software; it is masqueraded by artificial gummy fingers (spoof attacks). Additionally, when a large number of users are being verified at the same time, the mechanism will become slow. In this paper, we employed each of the partial encryptions of user’s fingerprint and discrete wavelet transform to obtain a new scheme of fingerprint verification. Moreover, our proposed scheme can overcome those problems; it does not require cost, reduces the computational supplies for huge volumes of fingerprint images, and resists well-known attacks. In addition, experimental results illustrate that our proposed scheme has a good performance of user’s fingerprint verification.

Fractals ◽  
2015 ◽  
Vol 23 (04) ◽  
pp. 1550037 ◽  
Author(s):  
D. C. MISHRA ◽  
R. K. SHARMA ◽  
MAYANK DAWAR ◽  
M. HANMANDLU

In this cryptosystem, we have presented a novel technique for security of video data by using matrix affine cipher (MAC) combined with two-dimensional discrete wavelet transform (2D-DWT). Existing schemes for security of video data provides only one layer of security, but the presented technique provides two layers of security for video data. In this cryptosystem, keys and arrangement of MAC parameters are imperative for decryption process. In this cryptosystem, if the attacker knows about all the exact keys, but has no information about the specific arrangement of MAC parameters, then the information of original video cannot be recovered from the encrypted video. Experimental results on standard examples support to the robustness and appropriateness of the presented cryptosystem of video encryption and decryption. The statistical analysis of the experimental results based on standard examples critically examine the behavior of the proposed technique. Comparison between existing schemes for security of video with the presented cryptosystem is also provided for the robustness of the proposed cryptosystem.


Author(s):  
R.Uma Maheshwari

Images consists various kinds of information which can be used for encryption and decryption of messages through them. This paper proposes a photograph encryption and decryption method to encrypt a covert snapshot with the aid of combining the Arnold transform system within the area and decrypting the duvet photograph through combining inverse Arnold become. First, grow to be a cover snapshot into subparts which consists of eight binary pictures with the aid of decimal value to eight-digit binary operation. Then, change into eight binary snap shots into sub-blocks of eight binary scrambled pixel by means of the Arnold change into, respectively. And then, recombine the sequence of the eight binary scrambled matrices right into a scrambled matrix with 256 grey phases in keeping with the special membership. Discrete Wavelet Transform (DWT) is used to perform picture compression on the input picture and secretly hidden photograph which is finished making use of alpha mixing. Sooner or later, derive an encrypted image from the scrambled photograph with the aid of the Hartley turn out to be. Second, decode the encrypted picture making use of inverse Arnold develop. Inverse DWT is performed to regain the compressed pictures. Simulations indicate that the proposed approach has a bigger photograph scrambling measure, more protection and has the robustness against occlusion and speckle noise attacks.


Informatica ◽  
2013 ◽  
Vol 24 (4) ◽  
pp. 657-675
Author(s):  
Jonas Valantinas ◽  
Deividas Kančelkis ◽  
Rokas Valantinas ◽  
Gintarė Viščiūtė

Sign in / Sign up

Export Citation Format

Share Document