ANovel Chaotic Encryption Framework for Securing Palmprint Data
نویسندگان
چکیده
منابع مشابه
ANovel Chaotic Encryption Framework for Securing Palmprint Data
In this paper, a chaotic encryption framework based on fractional wavelet packet transform (FrWPT) is proposed for securing palmprint data. The palmprint image is first transformed into FrWPT domain with chaotically generated transform orders followed by the alteration of FrWPT coefficients using Hessenberg decomposition. Finally, a reliable decryption scheme is presented to reconstruct origina...
متن کاملChaotic algorithms for data encryption
A system of encryption based on chaotic algorithms is described. The system is used for encrypting text and image files for the purpose of creating secure data bases and for sending secure email messages. The system is also implemented on an FPGA for real-time applications. Levels of security several orders of magnitude better than published systems have been achieved.
متن کاملA stack-based chaotic algorithm for encryption of colored images
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...
متن کاملSecuring Data in Cloud Using Homomorphic Encryption
Security and privacy in cloud computing is one of the most challenging ongoing research areas because data owner stores their sensitive data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. Since cloud computing is rest on internet, various security issues like privacy, data integrity, confidentiality, authentica...
متن کاملA Palmprint Based Cryptosystem using Double Encryption
The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprints in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2012
ISSN: 1877-0509
DOI: 10.1016/j.procs.2012.06.057