BIO CHAOTIC ENCRYPTION ALGORITHM FOR IRIS IMAGE
DESIGN DETAILS Enhancement in computers and communications and due to huge use of electronic media, security gains more and more importance especially the se...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
DESIGN DETAILS
Enhancement in computers and communications and due to huge use of electronic media, security gains more and more importance especially the security of biometric images become a hot issue. Biometric images are mostly used for the authentication system because of there ever living and unstable characteristics. Conventional or traditional symmetric or asymmetric cryptography is limited only to text files, but it cannot be used in case of huge files like images and videos. Image encryption techniques are extensively used to overcome the problem of secure transmission for both images and text over the electronic media by using the conventional cryptographic algorithms. But the problem is that it cannot be used in case of huge amount of data and high-resolution images. Instead of using the traditional way of cryptography for image encryption it is possible to use biometric e.g., fingerprint, iris, face, voice etc for the same purpose. The main advantage of a biometric is that it is ever living, and unstable characteristics of a human being and it cannot be compromised. However, it also suffers from some biometric specific threats and that is the privacy risk in biometric systems. An attacker can interpret a person’s biometric data, which he can use for many illegal operations such is to masquerade like a particular person or monitor the person’s private data.
To improve the security of the images this Matlab design is based on an algorithm called Bio- Chaotic stream cipher algorithm (BCA) for image encryption. In this algorithm the iris images and extract their features by using the iris feature extraction code. These features are then used to generate the initial condition for the secret key using the Hamming Distance technique, which is then Xo-red to the iris extracted features to generate another secret key called biometric key. This biometric key is then used in the chaotic function to generate the biochaotic stream cipher for further encryption.
REFERENCES
Reference Paper-1: A Secure Iris Image Encryption Technique Using Bio-Chaotic Algorithm
Author’s Name: Abdullah Sharaf Alghamdi and Hanif Ullah
Source: IJCNS
Year: 2010
Request source code for academic purpose, fill REQUEST FORM below,
http://www.verilogcourseteam.com/request-form
You may contact +91 7904568456 by WhatsApp Chat, for paid services.
We are available on Telegram and Signal.
Visit Website: http://www.verilogcourseteam.com/
Visit Our Social Media
Like our Facebook Page: https://www.facebook.com/VerilogCourseTeam/
Subscribe: https://www.youtube.com/verilogcourseteamelectricalprojects
Subscribe: https://www.youtube.com/verilogcourseteammatlabproject
Subscribe: https://www.youtube.com/verilogcourseteam
Video Information
Views
146
Total views since publication
Duration
4:30
Video length
Published
Jan 31, 2021
Release date
Quality
hd
Video definition