2014 International Conference on Medical Biometrics 2014
DOI: 10.1109/icmb.2014.37
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Biometric Data Security and Chaotic Encryption Strategy with Bernoulli Mapping

Abstract: This paper discusses the information security issue on biometric data. A brief survey is given at first with the discussion on the significance of biometric application. A novel encrypting strategy combined with Bernoulli-Logistic chaotic cipher system is proposed to improve the performance on cryptographic text with consideration both of volatility and correlation. Experimental results show that the proposed approach for encryption provides an efficient and more secure performance.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 37 publications
0
6
0
Order By: Relevance
“…Results of security and performance analysis show that the proposed scheme provides secure, reliable and efficient WSNs. A recent proposal combined Bernoulli-logistic mapping and chaotic encryption techniques to create a secure bio-cryptographic scheme [9]. This approach is suitable for online based biometric data network encryption and information transmission.…”
Section: Biometric Encryptionmentioning
confidence: 99%
“…Results of security and performance analysis show that the proposed scheme provides secure, reliable and efficient WSNs. A recent proposal combined Bernoulli-logistic mapping and chaotic encryption techniques to create a secure bio-cryptographic scheme [9]. This approach is suitable for online based biometric data network encryption and information transmission.…”
Section: Biometric Encryptionmentioning
confidence: 99%
“…However, he did not use encrypted finger vein features for recognition experiments. Liew et al [32] proposed an encryption method using a 2D Bernoulli-Logistic map for retinas, irises, and fingerprints. Similarly, their encrypted images have better volatility and correlation performance, but no analysis or comparison of the recognition performance was conducted.…”
Section: Chaotic Encryption Technologymentioning
confidence: 99%
“…Te advancements in information and communication technology have not only transformed various aspects of our daily lives but have also signifcantly broadened the scope of telemedicine. Tis evolution encompasses the delivery of health services, including remote diagnosis, treatment, and even surgical operations conducted from a distance [13]. In addition, physiological data such as fngerprint image, palm, eye iris and retina, face, hand geometry, fnger geometry, vein image, and behavioral biometric data such as voice, handwriting, and walking are widely used today to safely recognize user identity [13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…Tis evolution encompasses the delivery of health services, including remote diagnosis, treatment, and even surgical operations conducted from a distance [13]. In addition, physiological data such as fngerprint image, palm, eye iris and retina, face, hand geometry, fnger geometry, vein image, and behavioral biometric data such as voice, handwriting, and walking are widely used today to safely recognize user identity [13][14][15]. Also, biometric identifcation has become more popular than traditional identifcation techniques, especially in identity cards, passwords, and personal identifcation numbers (PIN) applications.…”
Section: Introductionmentioning
confidence: 99%