A Bio-Chaotic Block Cryptosystem for Privacy Protection of Multimedia Data

  • Musheer Ahmad
  • Sonia Gupta
  • A. K. Mohapatra
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 247)


In this paper, we propose a novel bio-chaotic block cryptosystem by combining the features of chaos-based cryptography and biometric system for providing inviolable data confidentiality, nonrepudiation and authentication. The proposed system involves the extraction of wavelet features out of iris biometric template of user, which on chaotic shuffling and mixing with chaotic logistic sequences generates bio-chaotic keys. The encryption is carried out in cipher-block-chaining mode to fetch strong confusion of plaintext data. The proposed cryptosystem offers two-level of security, as the generated keys are under the control of random secret key and biometric template as well. The NIST SP800-22 randomness tests of generated bio-chaotic keys and other simulation tests like histogram distribution, correlation, entropy, etc., of ciphertext data validate the high security performance and suitability of the proposed cryptosystem for protecting the privacy of user’s sensitive data.


Block cryptosystem biometric template bio-chaotic keys wavelet transform chaotic system 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Jain, A.K., Pankanti, S., Bolle, R.: Biometrics: personal identification in networked society. Kluwer (1999)Google Scholar
  2. 2.
    Khan, M.K., Zhang, J., Tian, L.: Chaotic secure content-based hidden transmission of biometric templates. Chaos, Solitons & Fractals 32, 1749–1759 (2007)CrossRefGoogle Scholar
  3. 3.
    Li, P., Yang, X., Qiao, H., Cao, K., Liu, E., Tian, J.: An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Systems with Applications 39, 6562–6574 (2012)CrossRefGoogle Scholar
  4. 4.
    Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenized random number. Pattern Recognition 37(11), 2245–2255 (2004)CrossRefGoogle Scholar
  5. 5.
    Imamverdiyev, Y., Teoh, A.B.J., Kim, J.: Biometric cryptosystem based on discretized fingerprint texture descriptors. Expert Systems with Applications 40, 1888–1901 (2013)CrossRefGoogle Scholar
  6. 6.
    Ahmad, M., Ahmad, T.: A framework to protect patient digital medical imagery for secure telediagnosis. Procedia Engineering 48, 1055–1066 (2012)CrossRefGoogle Scholar
  7. 7.
    Patidar, V., Pareek, N.K., Sud, K.K.: A new substitution diffusion based image cipher using chaotic standard and logistic maps. Communication in Nonlinear Science and Numerical Simulation 14, 3056–3075 (2009)CrossRefGoogle Scholar
  8. 8.
    Khan, M.K., Zhang, J.: Implementing templates security in remote biometric authentication systems. In: IEEE Conference Proceedings on CIS, vol. 2, pp. 1396–1400 (2006)Google Scholar
  9. 9.
    Maiorana, E.: Biometric cryptosystem using function based on-line signature recognition. Expert Systems with Applications 37(4), 3454–3461 (2010)CrossRefGoogle Scholar
  10. 10.
    Wu, X., Wang, K., Zhang, D.: A cryptosystem based on palmprint feature. In: International Conference on Pattern Recognition, pp. 1–4 (2008)Google Scholar
  11. 11.
    May, R.M.: Simple mathematical model with very complicated dynamics. Nature 261, 459–467 (1967)CrossRefGoogle Scholar
  12. 12.
    Rukhin, A., et al.: A Statistical Test Suite for Random and Pseudo-random Number Generators for Cryptographic Applications. NIST Special Publication, 800–822 (2001)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Musheer Ahmad
    • 1
  • Sonia Gupta
    • 2
  • A. K. Mohapatra
    • 2
  1. 1.Department of Computer Engineering, Faculty of Engineering and TechnologyJamia Millia IslamiaNew DelhiIndia
  2. 2.Department of Computer Science & EngineeringGGS Indraprastha UniversityNew DelhiIndia

Personalised recommendations