A Novel Biometric Fingerprint Template Based Method for Stream Cipher Design

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 340)


In biometric-based security systems, generation of random biometric keys is a significant means to realize secure, reliable and robust data confidentiality. Here, a novel method for stream cipher design is proposed using biometric fingerprint template. The biometric feature vector is extracted from user’s fingerprint in discrete wavelet transform domain. The feature vector is shuffled and inter-mixed with chaotic sequence to eliminate similar patterns, if any. The whole method of enciphering and deciphering is under the control of user’s secret key and fingerprint template. The method is apt enough to yield great encryption effect and can resist cryptographic attacks. The method is tested on digital images to investigate its encryption performance. The measures like histogram distribution, pixels auto-correlation, entropy, plain-image sensitivity are assessed and compared with recent proposals to demonstrate effectiveness, suitability and consistency of proposed method.


Biometric security Fingerprint Stream cipher Discrete wavelet transform Chaotic sequence 


  1. 1.
    Jagadeesan, A., Duraiswamy, K.: Secured cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris. Int. J. Comput. Sci. Inf. Secur. 7(2), 28–37 (2010)Google Scholar
  2. 2.
    Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenized random number. Pattern Recogn. 37(11), 2245–2255 (2004)CrossRefGoogle Scholar
  3. 3.
    Bhoi, N., Mohanty, M.N.: Template matching based eye detection in facial image. Int. J. Comput. Appl. 12(5), 15–18 (2010)Google Scholar
  4. 4.
    Khan, K.M., Zhang, J., Tian, L.: Chaotic secure content-based hidden transmission of biometric templates. Chaos, Solitons Fractals 32(5), 1749–1759 (2007)CrossRefGoogle Scholar
  5. 5.
    Maiorana, E.: Biometric cryptosystem using function based on-line signature recognition. Expert Syst. Appl. 37(4), 3454–3461 (2010)CrossRefGoogle Scholar
  6. 6.
    Kocarev, L., Galias, Z., Lian, S.: Intelligent Computing Based on Chaos. Springer, Berlin (2009)Google Scholar
  7. 7.
    Kocarev, L., Lian, S.: Chaos Based Cryptography: Theory, Algorithms and Applications. Springer, Berlin (2011)CrossRefMATHGoogle Scholar
  8. 8.
    Ahmad, M., Ahmad, T.: Securing multimedia color imagery using multiple high dimensional chaos based hybrid keys. Int. J. Commun. Netw. Distrib. Syst. 12(1), 113–128 (2014)CrossRefGoogle Scholar
  9. 9.
    Verma, O.P., Nizam, M., Ahmad, M.: Modified multi chaotic systems that are based on pixel shuffle for image encryption. J. Inf. Process. Syst. 9(2), 271–286 (2013)CrossRefGoogle Scholar
  10. 10.
    Jain, A., Bolle, R., Pankanti, S.: Biometrics: Personal Identification in Networked Society. Kluwer Academic Publisher, Dordrecht (2002)Google Scholar
  11. 11.
    Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurcat. Chaos 15(10), 3119–3151 (2005)MathSciNetCrossRefMATHGoogle Scholar
  12. 12.
    Liu, Y., Tong, X.J.: A new pseudorandom number generator based on complex number chaotic equation. Chin. Phys. B 21(9), 090506–090508 (2012)CrossRefGoogle Scholar
  13. 13.
    Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129 (2006)MathSciNetCrossRefMATHGoogle Scholar
  14. 14.
    Hermassi, H., Rhouma, R., Belghith, S.: Improvement of an image encryption algorithm based on hyper-chaos. Telecommun. Syst. 52(2), 539–549 (2013)Google Scholar
  15. 15.
    Kanso, A., Yahyaoui, H., Almulla, M.: Keyed hash function based on a chaotic map. Inf. Sci. 186(1), 249–264 (2012)MathSciNetCrossRefMATHGoogle Scholar
  16. 16.
    Wang, X.-Y., Chen, F., Wang, T.: A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2479–2485 (2010)MathSciNetCrossRefMATHGoogle Scholar
  17. 17.
    Fu, C., Lin, B., Miao, Y., Liu, X., Chen, J.: A novel chaos-based bit-level permutation scheme for digital image encryption. Opt. Commun. 284(23), 5415–5423 (2011)CrossRefGoogle Scholar
  18. 18.
    Anees, A., Siddiqui, A.M., Ahmed, F.: Chaotic substitution for highly auto-correlated data in encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 19(9), 3106–3118 (2014)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Luo, Y., Du, M., Liu, J.: A symmetrical image encryption scheme in wavelet and time domain. Commun. Nonlinear Sci. Numer. Simul. 20(2), 447–460 (2015)CrossRefGoogle Scholar
  20. 20.
    Sun, F., Lü, Z., Liu, S.: A new cryptosystem based on spatial chaotic system. Opt. Commun. 283(10), 2066–2073 (2010)CrossRefGoogle Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Department of Computer Engineering, Faculty of Engineering and TechnologyJamia Millia IslamiaNew DelhiIndia

Personalised recommendations