chaos algorithm
Recently Published Documents


TOTAL DOCUMENTS

41
(FIVE YEARS 4)

H-INDEX

6
(FIVE YEARS 0)

Cryptography ◽  
2020 ◽  
pp. 39-47
Author(s):  
Sugandha Agarwal ◽  
O.P. Singh ◽  
Deepak Nagaria

In this world of Advanced Technology, the Biometrics are proved to be a significant method for user identification. However, the use of biometric is not new, but these days, with the increase in multimedia applications, it has gained its popularity in analysing human characteristics for security purposes. Biometric Encryption using Chaos Algorithm is a technique used to make it more convenient to the user and to provide high level security. The most prominent physical biometric patterns investigated for security purposes are the fingerprint, hand, eye, face, and voice. In the proposed image encryption scheme, an external secret key of 160-bit is used. The initial conditions for the logistic map are derived using the external secret key. The results obtained through experimental analysis provide an efficient and secure way for real-time image encryption and transmission.


Author(s):  
Augustin Ousmanou Ahgue ◽  
Jean Dieu De Nkapkop ◽  
Joseph Yves Effa ◽  
Samuel Franz ◽  
Pierre Adelis ◽  
...  

2018 ◽  
Vol 36 (20) ◽  
pp. 4826-4833 ◽  
Author(s):  
Shanshan Li ◽  
Mengfan Cheng ◽  
Lei Deng ◽  
Songnian Fu ◽  
Minming Zhang ◽  
...  

2017 ◽  
Vol 10 (6) ◽  
pp. 221-229 ◽  
Author(s):  
Sandhya Halagowda ◽  
◽  
Sudha Lakshminarayana ◽  

Author(s):  
Sugandha Agarwal ◽  
O.P. Singh ◽  
Deepak Nagaria

In this world of Advanced Technology, the Biometrics are proved to be a significant method for user identification. However, the use of biometric is not new, but these days, with the increase in multimedia applications, it has gained its popularity in analysing human characteristics for security purposes. Biometric Encryption using Chaos Algorithm is a technique used to make it more convenient to the user and to provide high level security. The most prominent physical biometric patterns investigated for security purposes are the fingerprint, hand, eye, face, and voice. In the proposed image encryption scheme, an external secret key of 160-bit is used. The initial conditions for the logistic map are derived using the external secret key. The results obtained through experimental analysis provide an efficient and secure way for real-time image encryption and transmission.


Sign in / Sign up

Export Citation Format

Share Document