Biometric Image Encryption Based on Chaotic Sine Map and Information Entropy

  • Mahendra PatilEmail author
  • Avinash Gawande
  • Dilendra
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 38)


The Multi-biometric frameworks are utilized in numerous significant biometric applications and more are connected to the UIDAI framework in India. Encryption of biometric pictures is pivotal because of the dynamic increment in the utilization of powerless frameworks and systems for chronicling, transmission and confirmation. This examination proposes a tumultuous sine guide based picture encryption plan utilizing data entropy calculation with different degrees of perplexity and dissemination. The confused sine map with data entropy encryption calculation has a high key space, entropy around equivalent to eight (for dim pictures). The significant preferred position of this strategy is the best qualities for the quantity of pixels and the bound together normal pace of progress it offers. These better qualities obviously demonstrate that the scrambled pictures delivered by the riotous sine map with data entropy calculation plan are arbitrary. Exploratory recreations were performed to acquire the cryptographic parameters and approve the calculation through normal assaults, for example, compression and noise. The proposed calculation is strong because of the pressure assault which is fundamentally required during chronicling and recuperation. Hence, the proposed cryptographic calculation can be connected to the pictures of fingerprints utilized in participation observing frameworks, in biometric gets to, and so forth utilized by most surely understood open and private associations.


Attacks Biometric images Encryption algorithm Chaotic sine map Information entropy Robustness 


  1. 1.
    Wen, J., Chang, X.-W.: A modified KZ reduction algorithm. In: Proceedings of IEEE International Symposium on Information Theory, no. 7, pp. 451–455, June 2015Google Scholar
  2. 2.
    Bhatnagar, G., Wu, Q.J.: Chaos-based security solution for fingerprint data during communication and transmission. IEEE Trans. Instrum. Meas. 61(4), 876–887 (2012)CrossRefGoogle Scholar
  3. 3.
    Hassibi, A., Boyd, S.: Integer parameter estimation in linear models with applications to GPS. IEEE Trans. Sig. Process. 46(11), 2918–2925 (1998)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Neelamani, R., Baraniuk, R., de Queiroz, R.: Compression color space estimation of JPEG images using lattice basis reduction. In: Proceedings of IEEE International Conference on Image Processing, vol. 1, pp. 890–893 (2001)Google Scholar
  5. 5.
    Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., Mosavi, M.R.: A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed. Tools Appl. 1–31 (2013)Google Scholar
  6. 6.
    Nagar, A., Nandakumar, K., Jain, A.K.: Multibiometric cryptosystems based on feature-level fusion. IEEE Trans. Inf. Forensics Secur. 7(1), 255–268 (2012)CrossRefGoogle Scholar
  7. 7.
    Liu, H., Wang, X.: Color image encryption based on one-time keys and robust chaotic maps. J. Comput. Math. Appl. 59, 3320–3327 (2010)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Murugan, B., Gounder, A.G.N.: Image encryption scheme based on block based confusion and multiple levels of diffusion. IET Comput. Vis. 10(6), 593–602 (2016)CrossRefGoogle Scholar
  9. 9.
    Bringer, J., Chabanne, H., Patey, A.: Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends. Sig. Process. Mag. 30(2), 42–52 (2013)CrossRefGoogle Scholar
  10. 10.
    Bhatnagar, G., Wu, Q.J., Raman, B.: A new fractional random wavelet transform for fingerprint security. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 42(1), 262–275 (2012)CrossRefGoogle Scholar
  11. 11.
    Chen, C.L.P., Zhang, T., Zhou, Y.: Image encryption algorithm based on a new combined chaotic system. In: IEEE International Conference on Systems, Man, and Cybernetics (2012)Google Scholar
  12. 12.
    Wang, Y., et al.: A new chaos-based fast image encryption algorithm. J. Appl. Soft Comput. 11, 514–522 (2011)CrossRefGoogle Scholar
  13. 13.
    Wu, X., Wang, Z.: A new DWT-based lossless chaotic encryption scheme for color ımages. In: IEEE International Conference on Computer and Computational Sciences (2015)Google Scholar
  14. 14.
    Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3), 749–761 (2004)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Sun, J., Liao, X., Chen, X., Guo, S.: Privacy-aware image encryption based on logistic map and data hiding. Int. J. Bifurcation Chaos 27(5) (2017). Article no. 1750073MathSciNetCrossRefGoogle Scholar
  16. 16.
    Li, C., Xie, T., Liu, Q., Chen, G.: Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn. 78(2), 1545–1551 (2014)CrossRefGoogle Scholar
  17. 17.
    Li, C.: Cracking a hierarchical chaotic image encryption algorithm based on permutation. Sig. Process. 118, 203–210 (2016)CrossRefGoogle Scholar
  18. 18.
    Li, S., Li, C., Chen, G., Lo, K.-T.: Cryptanalysis of the RCES/RSES image encryption scheme. J. Syst. Softw. 81(7), 1130–1143 (2008)CrossRefGoogle Scholar
  19. 19.
    Ge, X., Lu, B., Liu, F., Luo, X.: Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation. Nonlinear Dyn. 90(2), 1141–1150 (2017)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Yap, W.-S., Phan, R.C.-W., Yau, W.-C., Heng, S.-H.: Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn. 80(3), 1483–1491 (2015)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Wang, Q., et al.: Theoretical design and FPGA-based implementation of higher-dimensional digital chaotic systems. IEEE Trans. Circ. Syst. I: Reg. Papers 63(3), 401–412 (2016)MathSciNetGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Faculty of EngineeringPacific Academy of Higher Education and Research UniversityUdaipurIndia
  2. 2.Sipna College of Engineering and TechnologyAmravatiIndia

Personalised recommendations