BIO CHAOTIC ENCRYPTION ALGORITHM FOR IRIS IMAGE

DESIGN DETAILS Enhancement in computers and communications and due to huge use of electronic media, security gains more and more importance especially the se...

VERILOG COURSE TEAM-MATLAB PROJECT146 views4:30

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Thailand under the topic 'สภาพอากาศ'.

About this video

DESIGN DETAILS Enhancement in computers and communications and due to huge use of electronic media, security gains more and more importance especially the security of biometric images become a hot issue. Biometric images are mostly used for the authentication system because of there ever living and unstable characteristics. Conventional or traditional symmetric or asymmetric cryptography is limited only to text files, but it cannot be used in case of huge files like images and videos. Image encryption techniques are extensively used to overcome the problem of secure transmission for both images and text over the electronic media by using the conventional cryptographic algorithms. But the problem is that it cannot be used in case of huge amount of data and high-resolution images. Instead of using the traditional way of cryptography for image encryption it is possible to use biometric e.g., fingerprint, iris, face, voice etc for the same purpose. The main advantage of a biometric is that it is ever living, and unstable characteristics of a human being and it cannot be compromised. However, it also suffers from some biometric specific threats and that is the privacy risk in biometric systems. An attacker can interpret a person’s biometric data, which he can use for many illegal operations such is to masquerade like a particular person or monitor the person’s private data. To improve the security of the images this Matlab design is based on an algorithm called Bio- Chaotic stream cipher algorithm (BCA) for image encryption. In this algorithm the iris images and extract their features by using the iris feature extraction code. These features are then used to generate the initial condition for the secret key using the Hamming Distance technique, which is then Xo-red to the iris extracted features to generate another secret key called biometric key. This biometric key is then used in the chaotic function to generate the biochaotic stream cipher for further encryption. REFERENCES Reference Paper-1: A Secure Iris Image Encryption Technique Using Bio-Chaotic Algorithm Author’s Name: Abdullah Sharaf Alghamdi and Hanif Ullah Source: IJCNS Year: 2010 Request source code for academic purpose, fill REQUEST FORM below, http://www.verilogcourseteam.com/request-form You may contact +91 7904568456 by WhatsApp Chat, for paid services. We are available on Telegram and Signal. Visit Website: http://www.verilogcourseteam.com/ Visit Our Social Media Like our Facebook Page: https://www.facebook.com/VerilogCourseTeam/ Subscribe: https://www.youtube.com/verilogcourseteamelectricalprojects Subscribe: https://www.youtube.com/verilogcourseteammatlabproject Subscribe: https://www.youtube.com/verilogcourseteam

Video Information

Views
146

Total views since publication

Duration
4:30

Video length

Published
Jan 31, 2021

Release date

Quality
hd

Video definition