A Proposed Fingerprint Image Encryption Scheme Based on Wavelet Fusion

Document Type : Original Article

Authors

1 Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University

2 Department of Electrical Communications, Faculty of Engineering, Kafrelsheikh University, Kafr elsheikh, Egypt.

3 Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt.

Abstract

This paper presents two chaotic image encryption plans combined with Discrete Wavelet Transform (DWT) to encrypt unique fingerprint. In the first proposal, the fingerprint which has few details (low entropy) is fused with another image which is rich in details (high entropy) using the Discrete Wavelet Transform (DWT) prior to encryption. The fusion process is a pre-processing step to alter the homogeneity of flat areas in the few-details fingerprint image. Then, the technique of the Chaotic Baker map randomization is applied on the output fused image. In the second proposal, the fingerprint is fused with an image encrypted with RC6 block cipher algorithm prior to encryption. Several metrics are used in this paper for performance evaluation of the proposed encryption scheme including, visual inspection, histogram analysis, encryption quality analysis, and diffusion analysis. The outcomes demonstrate that the proposed image encryption schemes give a proficient and secure path for unique fingerprint encryption.

Keywords


[1] S. Hong, H. Kim, S. Lee, and Y. Chung, “Analyzing the secure and energy
efficient transmissions of compressed fingerprint images using
encryption and watermarking,” International Conference for Young
computer Scientists, pp. 28032808, 2008.
[2] S. Zhao , H. Li, X. Yan, “A secure and efficient fingerprint images
encryption scheme,” The 9th International Conference for Young
Computer Scientists, pp. 316320, 2008.
[3] L.Hong, Y.Wan, A.Jain, “Fingerprint image enhancement algorithm and
performance evaluation,” IEEE Trans. Pattern and Mach, Intell, 20(8)
(1998)777-789.
[4] J. FRIDRICH," Symmetric Ciphers Based on Two-Dimensional Chaotic
Maps,"
[5] International Journal of Bifurcation and Chaos, Vol. 8, No. 6 (1998)
1259{1284
[6] C. E. Shannon, “Communication theory of secrecy system,” Bell Syst.
Tech. J. 28, 656715
[7] P.Patel ,M.Rajpoot, "Secure Fingerprint Identification System and
Matching by Using Image Registration and Key Matching Techniques,"
Proceeding of the International Journal of Engineering Research &
Technology (IJERT) , Vol. 2 , June 2013.
[8] T. Stathaki, Image Fusion: Algorithms and Applications. New York:
Academic, 2008.
[9] A. Wang, H. J. Sun, and Y. Y. Guan, “The application of wavelet
transform to multi-modality medical image fusion,” Proceedings of the
2006 IEEE International Conference on Networking, Sensing and Control,
(ICNSC), pp. 270-274, 2006.
[10] E. A. Naeem, Mustafa M. AbdElnaby, Mohiy M. Hadhoud and F. E. Abd
El Samie, “Chaotic image encryption in transform domains”, Proceedings
of The 2009 International Conference on Computer Engineering &
Systems (ICCES’09), pp. 288-293, 2009.

[11] S. Kumar D R, K B Raja, R K Chhotaray, S Pattanaik," DWT Based
Fingerprint Recognition using Non Minutiae Features," IJCSI International
Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011.
[12] N.A Flayh, S.I. Ahson, “Wavelet based image encryption”, Proceedings of
the 9th International Conference on Signal Processing (ICSP), pp. 797-800,
2008.
[13] C.C. Chang, M.S. Hwang, T.S. Chen, “A New Encryption Algorithm for
Image Cryptosystems,” Journal of Syst. Software 58 (2001), pp. 83–91.
[14] Khamies El-Shennawy, Author, book title, “Communication Theory and
Signal Processing For Transform Coding,” Bentham Science Publishers,
2014, eISBN:978-1-60805-830-3, and ISBN:978-1-60805-831-0,(chapter
10)