Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 18
Page No. 7642 - 7647

Visual Cryptography and CSK for Biometric Template Security

Authors : Ashwaq T. Hashim and Zina A. Saleh

References

Abdullah, M.A., S.S. Dlay, W.L. Woo and J.A. Chambers, 2016. A framework for iris biometrics protection: A marriage between watermarking and visual cryptography. IEEE. Access, 4: 10180-10193.
CrossRef  |  Direct Link  |  

Bassham, L., A. Rukhin, J. Soto, J. Nechvatal and M. Smid et al., 2010. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Special Publication 800-22, Revision 1, National Institute of Standards and Technology (NIST), Gaithersburg, Maryland. https://csrc.nist.gov/publications/detail/sp/800-22/rev-1a/final

Chen, G., Y. Mao and C.K. Chui, 2004. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals, 21: 749-761.
Direct Link  |  

Driebe, D.J., 1999. Fully Chaotic Maps and Broken Time Symmetry. Vol. 4, Springer, Boston, ISBN: 9780792355649, Pages: 164.

George, R.M., 2013. Facial template protection using extended visual cryptography and chaotic encryption. Intl. J. Technol. Emerging Eng. Res., 1: 94-96.
Direct Link  |  

Hajare, N., A. Borage, N. Kamble and S. Shinde, 2013. Biometric template security using visual cryptography. J. Eng. Res. Appl., 3: 1320-1323.

Jacob, S. and M. Baby, 2017. Visual cryptography with chaotic encryption for biometric templates. Intl. J. Recent Innovation Trends Comput. Commun., 5: 125-130.
Direct Link  |  

James, D. and M. Philip, 2012. A novel security architecture for biometric templates using visual cryptography and chaotic image encryption. Proceedings of the 2012 International Conference on Eco-Friendly Computing and Communication Systems (ICECCS’12), August 9-11, 2012, Springer, Kochi, India, ISBN:978-3-642-32111-5, pp: 239-246.

Kisku, D.R., P. Gupta and J.K. Sing, 2016. Advances in Biometrics for Secure Human Authentication and Recognition. Taylor & Francis, Abingdon, England, UK., ISBN:9781138033771, Pages: 352.

Lau, Y., 2006. Techniques in secure chaos communication. Ph.D Thesis, RMIT University, Melbourne, Australia.

Lau, Y.S. and Z.M. Hussain, 2005. A new approach in chaos shift keying for secure communication. Proceedings of the 3rd International Conference on Information Technology and Applications (ICITA’05) Vol. 2, July 4-7, 2005, IEEE, Sydney, Australia, pp: 630-633.

Muhammed, R.P., 2011. A secured approach to visual cryptographic biometric template. Intl. J. Inf. Technol., 2: 15-17.
Direct Link  |  

Nithyakalyani, M.R., V. Palanisamy and R. Anandhajothi, 2018. Fingerprint template encryption scheme based on chaotic Map and DNA sequence. Intl. J. Pure Appl. Math., 118: 297-305.

Revenkar, P.S., A. Anjum and W.Z. Gandhare, 2010. Secure iris authentication using visual cryptography. Intl. J. Comput. Sci. Inf. Secur., 7: 217-221.
Direct Link  |  

Supriya, V.G. and S.R. Manjunatha, 2014. Chaos based cancellable biometric template protection scheme-a proposal. Intl. J. Eng. Sci. Invention, 3: 14-24.
Direct Link  |  

Verma, U. and C. Kant, 2016. Secure biometric template protection approach using chaotic maps. Intl. J. Adv. Res. Comput. Sci., 7: 121-124.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved