Skip to main content
Log in

Biometric authentication and image encryption for image security in cloud framework

  • Original Paper
  • Published:
Multiscale and Multidisciplinary Modeling, Experiments and Design Aims and scope Submit manuscript

Abstract

Cloud computing is a major blooming technology which has numerous applications in today’s market and is rightly so hyped. Images are a major part of today’s internet data traffic, especially due to widespread social media, and hence, its security is crucial. However, in the present scenario, the images in cloud are a major issue in terms of security. Since the user who has uploaded the image has no control over the security of images, the cloud provider has to ensure maximum security in terms of authentication and prevention from attacks. The main objective of this paper is to provide a method to enhance the safety of images on cloud. This paper presents an idea of securing images on cloud platform using biometric authentication. Different steps involved in biometric authentication and secure upload and access of images are explained, and integration of all the steps is done at the end as a case study which puts light on the whole process in which methods are best-regarding results and compatibility. The proposed algorithm in this paper presents the idea of authentication of images in two basic steps of image compression using standard discrete wavelet transform method followed by image encryption using the hybrid method of SHA and blowfish. This image is then stored into the database of cloud and accessed whenever the user requests it. A structured and comprehensive view of encryption methods, types of biometrics and to secure data as well as images is provided in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Abdullah AM, Aziz RHH (2016) New approaches to encrypt and decrypt data in image using cryptography and steganography algorithm. Int J Comput Appl 143(4):11–17

    MathSciNet  Google Scholar 

  • Al-hamami AH, Al-juneidi JY (2015) Secure mobile cloud computing based-on fingerprint. World Comput Sci Inform Technol J 5(2):23–27

    Google Scholar 

  • Alsaadi IM (2015) Physiological biometric authentication systems, advantages, disadvantages and future development: a review. Int J Sci Technol Res 4(12):285–289

    MathSciNet  Google Scholar 

  • Archer J, Cullinane D, Puhlmann N, Boehme A, Kurtz P, Reavis J (2010) Top Threats to cloud computing V1.0. Cloud Security Alliance. pp 1–14

  • Bala Y, Malik A (2018) Biometric inspired homomorphic encryption algorithm for secured cloud computing. In: Panigrahi B, Hoda M, Sharma V, Goel S (eds) Nature inspired computing. Advances in intelligent systems and computing, vol 652. Springer, Singapore, pp 13–21

    Google Scholar 

  • Batool R, Naveed G, Khan A (2015) Biometric authentication in cloud computing. Int J Comput Appl 129(11):6–9

    Google Scholar 

  • Bhansali A, Barot H, Masrani K, Shah S, Chheda V (2013) Encrypting watermarked images: a transparent approach. Int J Future Comput Commun 2(6):665–667

    Google Scholar 

  • Bhattacharyya D, Ranjan R, Alisherov F, Choi M (2009) Biometric authentication: a review. Int J u- and e- Serv Sci Technol 2(3):13–28

    Google Scholar 

  • Bothe S, Jadhao RM, Shinde S (2012) Cloud computing based image processing applications for agro informatics using ‘self learning system’ approach. In: Proceedings of AIPA, pp 1–4

  • Cabeen K, Gent P (2019) Image compression and the discrete cosine transform. Math 45, pp 1–11 (unpublished report)

  • Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: Proceeding of the International Conference on Computer Science and Electronics Engineering, pp 647–651

  • Chnag CC, Hwang MS, Chen TS (2001) A new encryption algorithm for image cryptosystems. J Syst Softw 58:83–91

    Google Scholar 

  • Chowdhury MMH, Khatun A (2012) Image compression using discrete wavelet transform. Int J Comput Sci 9(4):327–330

    Google Scholar 

  • Deen AETE, El-Badawy ESA, Gobran SN (2014) Digital image encryption based on RSA algorithm. IOSR J Electron Commun Eng 9(1):69–73

    Google Scholar 

  • Delac K, Grgic M (2004) A survey of biometric recognition methods. In: 46th International Symposium Electronics in Marine, pp 184–193

  • Deshpande SD (2015) Advances in computational research review paper on introduction of various biometric areas. Adv Comput Res 7(1):212–214

    MathSciNet  Google Scholar 

  • Deshpande NT, Ravishankar S (2017) Face detection and recognition using Viola-Jones algorithm and fusion of PCA and ANN. Adv Comput Sci Technol 10(5):1173–1189

    Google Scholar 

  • Dongare AS, Alvi AS, Tarbani NM (2017) An efficient technique for image encryption and decryption for secured multimedia application. Int Res J Eng Technol 4(4):3186–3190

    Google Scholar 

  • Duarte T, Piementao JP, Sousa P, Onofre S (2016) Biometric access control systems: a review on technologies to improve their efficiency. In: Power Electronics and Motion Control Conference (PEMC), IEEE, pp 795–800

  • Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(6):125901284

    MathSciNet  MATH  Google Scholar 

  • Ghoradkar S, Shinde A (2015) Review on image encryption and decryption using AES algorithm. Int J Comput Appl 11–13

  • Gore A, Meena SS, Purohit P (2016) Hybrid cryptosystem using modified blowfish algorithm and SHA algorithm on public cloud. Int J Comput Appl 155(3):6–10

    Google Scholar 

  • Guan ZH, Huang FJ, Guan WJ (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1–3):153–157

    MATH  Google Scholar 

  • Gupta D, Choubey S (2015) Discrete wavelet transform for image processing. Int J Emerg Technol Adv Eng 4(3):598–602

    Google Scholar 

  • Hsu CY, Lu CS, Pei SC (2011) Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction. SPIE-IS&T/ 7880:1–17

    Google Scholar 

  • Huang D, Shan C, Ardabilian M, Wang Y, Chen L (2011) Local binary patterns and its application to facial image analysis: a survey. IEEE Trans Syst Man Cyberns Part C Appl Rev 41(6):765–781

    Google Scholar 

  • Kalyani C (2017) Various biometric authentication techniques: a review. J Biom Biostat 8(5):1–5

    Google Scholar 

  • Katharotiya A, Patel S, Goyani M (2011) Comparative analysis between DCT & DWT techniques of image compression. J Inform Eng Appl 1(2):9–18

    Google Scholar 

  • Kaware PC, Yadav DM (2016) Iris recognition for mobile security. Int Res J Eng Technol 3(6):2000–2005

    Google Scholar 

  • Kim MG, Moon HM, Chung Y, Pan SB (2012) A survey and proposed framework on the soft biometrics technique for human identification in intelligent video surveillance system. J Biomed Biotechnol 2012:1–7

    Google Scholar 

  • Kisku DR, Rana S (2016) Multithread face recognition in cloud. J Sens. https://doi.org/10.1155/2016/2575904

    Article  Google Scholar 

  • Madhu B, Holi G, Murthy SK (2016) An overview of image security techniques. Int J Comp Appl 154(6):37–46

    Google Scholar 

  • Mahalakshmi J, Kuppusamy K (2016) An efficient image encryption method based on improved cipher block chaining in cloud computing as a security service. Aust J Basic Appl Sci 10(2):297–306

    Google Scholar 

  • Mannapur SJ, Raj S, Kumar S, Kiran B (2018) IoT based home security through image processing algorithms. Int J Adv Res Ideas Innov Technol 4(3):1598–1602

    Google Scholar 

  • Maraghy ME, Hesham S, Ghany MAAE (2013) Real-time efficient FPGA implementation of AES algorithm. In: IEEE International SOC Conference (SOCC), pp 203–208

  • Monrose F, Rubin AD (2000) Keystroke dynamics as a biometric for authentication. Future Gener Comput Syst 16:351–359

    Google Scholar 

  • Murty MS, Veeraiah D, Rao AS (2011) Digital signature and watermark methods for image authentication using cryptography analysis. Signal Image Process 2(2):170–179

    Google Scholar 

  • Pandey A, Tugnayat RM, Tiwari AK (2013) Data security framework for cloud computing networks. Int J Comput Eng Technol 4(1):178–181

    Google Scholar 

  • Parmar PV, Padhar SB, Patel SN, Bhatt NI, Jhaveri RH (2014) Survey of various homomorphic encryption algorithms and schemes. Int J Comput Appl 91(8):26–32

    Google Scholar 

  • Patil RA, Renke AL (2016) Keystroke dynamics for user authentication and identification by using typing rhythm. Int J Comput Appl 144(9):27–33

    Google Scholar 

  • Patterson DA, Hennessy JL (1994) Computer organization and design: the hardware/software interface. Morgan Kaufmann Inc, San Francisco

    MATH  Google Scholar 

  • Pawle AA, Pawar VP (2013) Face recognition system (FRS) on cloud computing for user authentication. Int J Soft Comput Eng 3(4):189–193

    Google Scholar 

  • Potisepp K (2013) Large-scale image processing using MapReduce. M.Sc. Thesis, Tartu University, Faculty of Mathematics and Computer Science, Institute of Computer Science, pp 1–56

  • Rajput AS, Sharma V (2015) Survey and analysis of chaotic image encryption schemes. Int J Commun Syst Netw Technol 4(1):24–27

    Google Scholar 

  • Rani D, Ranjan RK (2014) A comparative study of SaaS, PaaS and IaaS in cloud computing. Int J Adv Res Comput Sci Softw Eng 4(6):458–461

    Google Scholar 

  • Rathi P, Dubey S (2013) Hand geometry recognition system using feature extraction. Int J Adv Res Comput Eng Technol 2(6):2064–2067

    Google Scholar 

  • Rathi R, Choudhary M, Chandra B (2012) An application of face recognition system using image processing and neural networks. Int J Comp Tech 3(1):45–49

    Google Scholar 

  • Reza MS, Khan MSA, Alam MGR, Islam S (2012) An approach of digital image copyright protection by using watermarking technology. Cornell University Library, Cornell, pp 1–7

    Google Scholar 

  • Shelly Bawa RK (2015) Secure image transmission for cloud storage system using hybrid scheme. Int J Eng Res Dev 11(9):18–26

    Google Scholar 

  • Shubh T, Sharma S (2016) Man-in-the-middle-attack prevention using HTTPS and SSL. Int J Comput Sci Mobile Comput 5(6):569–579

    Google Scholar 

  • Singh RK, Kumar B, Shaw DK, Khan DA (2018) Level by level image compression-encryption algorithm based on quantum chaos map. J King Saud Univ Comput Inform Sci. https://doi.org/10.1016/j.jksuci.2018.05.012

    Article  Google Scholar 

  • Suryani D, Irwansyah E, Chindra R (2017) Offline signature recognition and verification system using efficient fuzzy kohonen clustering network (EFKCN) algorithm. Procedia Comput Sci 116:621–628. https://doi.org/10.1016/j.procs.2017.10.025

    Article  Google Scholar 

  • Teh PS, Teoh ABJ, Yue S (2013) A survey on keystroke dynamics and biometrics. Sci World J. https://doi.org/10.1155/2013/408280

    Article  Google Scholar 

  • Thieling L, Schuer A, Hartung G, Buchel G (2014) Embedded image processing system for cloud-based applications. In: International Conference on ssytems, signals and image processing, pp 1–4

  • Tiwari P, Saklani A (2013) Role of biometric cryptography in cloud computing. Int J Comput Appl 7(9):34–38

    Google Scholar 

  • Valmik NK, Kshirsagar VK (2014) Blowfish algorithm. IOSR J Comput Eng 16(2):80–83

    Google Scholar 

  • Varsha D, Wadhwa A, Gupta S (2015) Study of security issues in cloud computing. Int J Comput Sci Mobile Comput 4(6):230–234

    Google Scholar 

  • Vaudenay S (1996) On the weak keys in blowsh. In: Gollmann D (ed) Fast software encryption. International workshop on fast software encryption, FSE 1996. Lecture notes in computer science, vol 1039. Springer, Berlin, Heidelberg, pp 27–32

    Google Scholar 

  • Wang P, Wang J, Chen Y, Ni G (2013a) Rapid processing of remote sensing images based on cloud computing. Future Gener Comp Syst 29(8):1963–1968

    Google Scholar 

  • Wang S, Nassar M, Atallah M, Malluhi Q (2013b) Secure and private outsourcing of shape-based feature extraction. In: International conference on information and communications security, pp 90–99

    Google Scholar 

  • Wangsuk K, Amornkul TA (2013) Trajectory mining for keystroke dynamics authentication. In: 17th Asia Pacific Symposium on Intelligent and Evolutionary Systems. vol 24, pp 175–183

    Google Scholar 

  • Xia Z, Ma X, Shen Z, Sun X, Xiong NN, Jeon B (2018) Secure image LBP feature extraction in cloud-based smart campus. IEEE Access 6:30392–30401

    Google Scholar 

  • Yang P, Gui X, An J, Tian F (2017) An efficient secret key homomorphic encryption used in image processing service. Secur Commun Netw. https://doi.org/10.1155/2017/7695751

    Article  Google Scholar 

  • Yassin AA, Yao J, Han S (2016a) Strong authentication scheme based on hand geometry and smart card factors. Computers 5:15

    Google Scholar 

  • Yassin AA, Yao J, Han S (2016b) Strong authentication scheme based on hand geometry and smart card factors. Computers 5:1–17

    Google Scholar 

  • Zefreh EZ, Rajaee R, Farivary M (2011) Image security system using recursive cellular automata substitution and its parallelization. In: IEEE, pp 77–86

  • Zhang L, Shen P, Song J, Dong L, Wang G, Cai Y (2014) An image processing system based on heterogeneous embedded multicore processors. In: 2014 Second International Conference on Advanced Cloud and Big Data, pp 1–6

Download references

Acknowledgements

The authors are grateful to School of Technology, Pandit Deendayal Petroleum University and Vishwakarma Government Engineering College for the permission to publish this research.

Funding

All relevant data and material are presented in the main paper.

Author information

Authors and Affiliations

Authors

Contributions

All the authors make substantial contribution in this manuscript. VK, MP and MS participated in drafting the manuscript. VK and MP wrote the main manuscript, all the authors discussed the results and implication on the manuscript at all stages.

Corresponding author

Correspondence to Manan Shah.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kakkad, V., Patel, M. & Shah, M. Biometric authentication and image encryption for image security in cloud framework. Multiscale and Multidiscip. Model. Exp. and Des. 2, 233–248 (2019). https://doi.org/10.1007/s41939-019-00049-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41939-019-00049-y

Keywords

Navigation