2012
DOI: 10.1007/978-3-642-32112-2_29
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Security Architecture for Biometric Templates Using Visual Cryptography and Chaotic Image Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Numerous template protection methods are presented in the research alongside with the goal of safeguarding noninvariability, revocability; and non-link ability lacking compromise on the credit performance. James, D et al, in [7] proposed secure method for biometric templates protection by employing a visual cryptography approach and a 3D chaotic map. The combinations of these techniques are used to provide most appropriate solution to privacy or protection.…”
Section: Introductionmentioning
confidence: 99%
“…Numerous template protection methods are presented in the research alongside with the goal of safeguarding noninvariability, revocability; and non-link ability lacking compromise on the credit performance. James, D et al, in [7] proposed secure method for biometric templates protection by employing a visual cryptography approach and a 3D chaotic map. The combinations of these techniques are used to provide most appropriate solution to privacy or protection.…”
Section: Introductionmentioning
confidence: 99%
“…However, it was achieved by compromising the encryption time. A chaos based cryptography in [4] increased in the protection and privacy of the image using fast encryption algorithm. However, encryption time was not included.…”
Section: Introductionmentioning
confidence: 99%
“…Most chaotic encryption is simply chaotic system based on low-dimensional discrete chaotic iterative image scrambling [3]. This approach has a simple form, and encryption time is short.…”
Section: Introductionmentioning
confidence: 99%
“…This method has been widely used for image encryption [7][8]. The scrambled location of image pixel refers to change the position of pixels from original image so that an attacker is difficult to identify the original image so as to achieve the purpose of image encryption [3,9]. Chaotic system, due to its sensitive dependence on initial conditions, is very suitable for image encryption.…”
Section: Introductionmentioning
confidence: 99%