scholarly journals Cancelable Multimodal Biometrics Based on Chaotic Maps

2021 ◽  
Vol 11 (18) ◽  
pp. 8573
Author(s):  
Sanaa Ghouzali ◽  
Ohoud Nafea ◽  
Abdul Wadood ◽  
Muhammad Hussain

Biometric authentication systems raise certain concerns with regard to security, violation of privacy, and storage issues of biometric templates. This paper proposes a protection approach of biometric templates storage in a multimodal biometric system while ensuring both the cancelability of biometric templates and the efficiency of the authentication process. We propose applying a chaotic maps-based transform on the biometric features to address the cancelability issue. We used Logistic map and Torus Automorphism to generate cancelable biometric features of the face and fingerprint minutia points, respectively. Both transformed features would be concatenated and saved in the database of the system instead of the original features. In the authentication stage, the similarity scores of both transformed face and fingerprint templates are computed and fused using the weighted sum rule. The results of the experimentation, conducted using images from the ORL face and FVC2002 DB1 fingerprint databases, demonstrated the higher performance of the proposed approach achieving a genuine accept rate equal to 100%. Moreover, the obtained results confirmed the soundness of the proposed cancelable technique to satisfy the biometric systems’ requirements (i.e., security, revocability, and diversity).

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Xiaoling Zhu ◽  
Chenglong Cao

E-learning has been carried out all over the world and then online examinations have become an important means to check learning effect during the outbreak of COVID-19. Participant authenticity, data integrity, and access control are the assurance to online examination. The existing online examination schemes cannot provide the protection of biometric features and fine-grained access control. Particularly, they did not discuss how to resolve some disputes among students, teachers, and a platform in a fair and reasonable way. We propose a novel biometric authentication and blockchain-based online examination scheme. The examination data are encrypted to store in a distributed system, which can be obtained only if the user satisfies decryption policy. And the pieces of evidence are recorded in a blockchain network which is jointly established by some credible institutions. Unlike other examination authentication systems, face templates in our scheme are protected using a fuzzy vault and a cryptographic method. Furthermore, educational administrative department can determine who the real initiator of malicious behavior is when a dispute arises using a dispute determination protocol. Analysis shows that no central authority is required in our scheme; the collusion of multiple users cannot obtain more data; even if the authorities compromise, biometric features of each user will not be leaked. Therefore, in terms of privacy-preserving biometric templates, fine-grained access, and dispute resolution, it is superior to the existing schemes.


2016 ◽  
Vol 13 (2) ◽  
pp. 313-334
Author(s):  
Bojan Jovanovic ◽  
Ivan Milenkovic ◽  
Marija Bogicevic-Sretenovic ◽  
Dejan Simic

Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover, precision of biometric authentication can be improved by the use of multimodal biometrics. This paper presents a system which has been designed for identity management based on FreeIPA solution for digital identity management and MMBio framework for multimodal biometrics. Proposed system provides multifactor authentication, where MMBio framework is used for handling user biometric data. Developed prototype confirms possible integration of identity management and multimodal biometric systems.


2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1313
Author(s):  
Wenhao Yan ◽  
Qun Ding

In this paper, a method to enhance the dynamic characteristics of one-dimension (1D) chaotic maps is first presented. Linear combinations and nonlinear transform based on existing chaotic systems (LNECS) are introduced. Then, a numerical chaotic map (LCLS), based on Logistic map and Sine map, is given. Through the analysis of a bifurcation diagram, Lyapunov exponent (LE), and Sample entropy (SE), we can see that CLS has overcome the shortcomings of a low-dimensional chaotic system and can be used in the field of cryptology. In addition, the construction of eight functions is designed to obtain an S-box. Finally, five security criteria of the S-box are shown, which indicate the S-box based on the proposed in this paper has strong encryption characteristics. The research of this paper is helpful for the development of cryptography study such as dynamic construction methods based on chaotic systems.


1996 ◽  
Vol 06 (04) ◽  
pp. 725-735 ◽  
Author(s):  
ALEXANDER Yu. LOSKUTOV ◽  
VALERY M. TERESHKO ◽  
KONSTANTIN A. VASILIEV

We consider one-dimensional maps, the logistic map and an exponential map, in those sets of parameter values which correspond to their chaotic dynamics. It is proven that such dynamics may be stabilized by a certain cyclic parametric transformation operating strictly within the chaotic set. The stabilization is a result of the creation of stable periodic orbits in the initially chaotic maps. The period of these stable orbits is a multiple of the period of the cyclic transformation. It is shown that stabilized behavior cannot be destroyed by a weak noise smearing of the required parameter values. The regions where the behavior stabilization takes place are numerically estimated. Periods of the created stabile periodic orbits are calculated.


2013 ◽  
Vol 2013 ◽  
pp. 1-6 ◽  
Author(s):  
Sofia Benfeito ◽  
Tiago Rodrigues ◽  
Jorge Garrido ◽  
Fernanda Borges ◽  
E. Manuela Garrido

In the face of a growing human population and increased urbanization, the demand for pesticides will simply rise. Farmers must escalate yields on increasingly fewer farm acres. However, the risks of pesticides, whether real or perceived, may force changes in the way these chemicals are used. Scientists are working toward pest control plans that are environmentally sound, effective, and profitable. In this context the development of new pesticide formulations which may improve application effectiveness, safety, handling, and storage can be pointed out as a solution. As a contribution to the area, the microencapsulation of the herbicide oxadiargyl (OXA) in (2-hydroxypropyl)-β-cyclodextrin (HP-β-CD) was performed. The study was conducted in different aqueous media (ultrapure water and in different pH buffer solutions). In all cases an increment of the oxadiargyl solubility as a function of the HP-β-CD concentration that has been related to the formation of an inclusion complex was verified. UV-Vis and NMR experiments allowed concluding that the stoichiometry of the OXA/HP-β-CD complex formed is 1 : 1. The gathered results can be regarded as an important step for its removal from industrial effluents and/or to increase the stabilizing action, encapsulation, and adsorption in water treatment plants.


Author(s):  
Vandana ◽  
Navdeep Kaur

The digitalization has been challenged with the security and privacy aspects in each and every field. In addition to numerous authentication methods, biometrics has been popularized as it relies on one’s individual behavioral and physical characters. In this context, numerous unimodal and multimodal biometrics have been proposed and tested in the last decade. In this paper, authors have presented a comprehensive survey of the existing biometric systems while highlighting their respective challenges, advantage and limitations. The paper also discusses the present biometric technology market value, its scope, and practical applications in vivid sectors. The goal of this review is to offer a compact outline of various advances in biometrics technology with potential applications using unimodal and multimodal bioinformatics are discussed that would prove to offer a base for any biometric-based future research.


Author(s):  
Sukhdev Singh ◽  
Chander Kant

Growth of mobile devices uses has favored the user experience with different digital platforms, from basic activities such as sending messages, phone calls, taking pictures for social networks, email, bank account management, and commerce. These are some examples of daily tasks performed from mobile devices, which makes it essential to provide security of information. Therefore, privacy of stored information has become a main point in the development of mobile devices. This article presents research about the impact that mobile devices have in people's lives and the presence of biometric systems in this kind of device. Papers related with biometrics on mobile devices were examined to find which devices have integrated biometric systems; in addition to identifying biometric features used to authenticate people and find out what mobile platforms were created for. It was found that the smartphone is the device with more biometrics systems, and fingerprints are the most used feature; also, that the Android operating system is the most widely used mobile platform for these purposes.


2020 ◽  
Vol 2020 ◽  
pp. 1-17
Author(s):  
Yichao Ma ◽  
Zengxi Huang ◽  
Xiaoming Wang ◽  
Kai Huang

In the recent years, we have witnessed the rapid development of face recognition, though it is still plagued by variations such as facial expressions, pose, and occlusion. In contrast to the face, the ear has a stable 3D structure and is nearly unaffected by aging and expression changes. Both the face and ear can be captured from a distance and in a nonintrusive manner, which makes them applicable to a wider range of application domains. Together with their physiological structure and location, the ear can readily serve as supplement to the face for biometric recognition. It has been a trend to combine the face and ear to develop nonintrusive multimodal recognition for improved accuracy, robustness, and security. However, when either the face or the ear suffers from data degeneration, if the fusion rule is fixed or with inferior flexibility, a multimodal system may perform worse than the unimodal system using only the modality with better quality sample. The biometric quality-based adaptive fusion is an avenue to address this issue. In this paper, we present an overview of the literature about multimodal biometrics using the face and ear. All the approaches are classified into categories according to their fusion levels. In the end, we pay particular attention to an adaptive multimodal identification system, which adopts a general biometric quality assessment (BQA) method and dynamically integrates the face and ear via sparse representation. Apart from a refinement of the BQA and fusion weights selection, we extend the experiments for a more thorough evaluation by using more datasets and more types of image degeneration.


2014 ◽  
Vol 2014 ◽  
pp. 1-17 ◽  
Author(s):  
Akugbe Martins Arasomwan ◽  
Aderemi Oluyinka Adewumi

This paper experimentally investigates the effect of nine chaotic maps on the performance of two Particle Swarm Optimization (PSO) variants, namely, Random Inertia Weight PSO (RIW-PSO) and Linear Decreasing Inertia Weight PSO (LDIW-PSO) algorithms. The applications of logistic chaotic map by researchers to these variants have led to Chaotic Random Inertia Weight PSO (CRIW-PSO) and Chaotic Linear Decreasing Inertia Weight PSO (CDIW-PSO) with improved optimizing capability due to better global search mobility. However, there are many other chaotic maps in literature which could perhaps enhance the performances of RIW-PSO and LDIW-PSO more than logistic map. Some benchmark mathematical problems well-studied in literature were used to verify the performances of RIW-PSO and LDIW-PSO variants using the nine chaotic maps in comparison with logistic chaotic map. Results show that the performances of these two variants were improved more by many of the chaotic maps than by logistic map in many of the test problems. The best performance, in terms of function evaluations, was obtained by the two variants using Intermittency chaotic map. Results in this paper provide a platform for informative decision making when selecting chaotic maps to be used in the inertia weight formula of LDIW-PSO and RIW-PSO.


Sign in / Sign up

Export Citation Format

Share Document