Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA … · 2018-03-15 ·...

10
Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA sequence MR. Nithyakalyani 1 , V. Palanisamy 2 , R. Anandhajothi 3 1,3 Research Scholar, 2 Professor & Head 1,2,3 Department of Computer Applications, Alagappa University Karaikudi-600 003, Tamilnadu, India 1 [email protected] , 2 [email protected] , 3 [email protected] AbstractA growth in the field of digital technology, conserving the privacy of biometric data has become an inseparable issue. In the proposed work, fingerprint image encryption scheme based on DNA encoding and chaotic Logistic map is presented. Initially, using the Logistic map chaotic sequences are generated and scrambled them by performing route cipher method. Further, shuffle the original image pixels with regarding to location map of permuted chaotic sequences then key masks are generated using original chaotic sequences. Finally, XOR the two DNA sequence matrix which are obtained by DNA encoded the permuted image and masks will gain the encrypted image. Moreover, experimental analyses, image quality evaluation and sensitivity analysis shown that it is improved the encryption scheme along with the capability of resisting exhaustive attack and statistical attack and differential attack. KeywordsBiometrics; Fingerprint; Security; Encryption; DNA (Deoxyribonucleic acid); Nucleotide; Logistic map; I. INTRODUCTION Biometrics makes highest level of security over traditional methods like Passwords and PIN numbers. Biometric is the study of automated identification by use of physical (Fingerprint, Iris, Hand, DNA, Face, etc.,) or behavioral (Voice, Signature, Keystroke, etc.,) traits. Thus, the Biometrics has no risk of forgetting it. Among all the Biometric traits, Fingerprint is an essential proven technology for verifying personal identity. In fact, a fingerprint template is the most universal, constant and distinctive. While fingerprint systems have several advantages than traditional security systems, there are some issues of fingerprint data are arises which is vulnerable to attack. Thus, template security is very essential in the development of biometric system because unauthorized person can access this template, can be replaced or altered in the communication channel between the database and matcher [1]. Encrypting the templates (image) is the remedy to this susceptible attack. In practices, cryptography approach is used for encryption. In the area of cryptography, various algorithms such as DES, AES, IDEA, Rabin, Elgamal, RC4, ECC and Blow Fish etc., were designed in past years which is not efficient for practical image encryption due to high processing power and time complexity of encryption/ decryption is high, high in data capacity and also high correlation among the adjacent pixels. The new research algorithms of image encryption are proposed aims to reduce image content‘s redundancy by special operations, e.g., the chaos-based ciphers [2-4] and DNA based encryption operations [5]. Chaotic system is aperiodic long-term behavior in a deterministic system that exhibits high sensitive dependence on initial criterion which is also used to expand the shuffling and substitution in an image. In the shuffling phase, permutations of image pixels are prepared in a secret demand, deprived of varying their values. The substitution phase is used to alter the pixel values in sequence so that a little alteration in one pixel is blowout to several pixels, with looking forward to the whole image. This chaos system possesses astonishing characteristics such as sensitivity to initial conditions, the pseudo random number , ergodicity [6], topological mixing [8], self-similarity [10], perodicity [9], dynamic instability [7], dense periodic orbits. Therefore, these characteristics make chaos based encryption is to be suitable for constructing cryptosystems with high level of secure. Pareek et al. [11] have proficiently put forward the algorithm based on chaotic 1D logistic map inorder to encrypt the original secret image. However, the algorithm has smaller key space and lower security. Ren and Ren et al. [12] came out with chaotic algorithm on the basis of dispersion sampling for enciphering image and attained better confusion effect but it has smaller key space. Y.H.Zhang et al. [13] utilize the logistic and standard systems to shuffling the location and pixel values from the original image which is leads to better results but security analysis of the algorithm is not performed. Thus some efficient schemes for encrypting digital images have been recommended. Multidimensional chaotic maps was used by Lian et al. [14-16] for image encryption and analysis the security of the proposed algorithm in detailed manner to ensure that the algorithm have adequate security along with a less cost. A.N. Pisarchik et al. [39] have suggested algorithm with chaotically coupled chaotic maps. For encrypting image, the International Journal of Pure and Applied Mathematics Volume 118 No. 7 2018, 297-305 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu 297

Transcript of Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA … · 2018-03-15 ·...

Page 1: Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA … · 2018-03-15 · Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA sequence MR. Nithyakalyani

Fingerprint Template Encryption Scheme Based on

Chaotic Map and DNA sequence

MR. Nithyakalyani1, V. Palanisamy

2, R. Anandhajothi

3

1,3Research Scholar,

2Professor & Head

1,2,3 Department of Computer Applications, Alagappa University

Karaikudi-600 003, Tamilnadu, India [email protected] ,

[email protected] ,

[email protected]

Abstract— A growth in the field of digital technology,

conserving the privacy of biometric data has become an

inseparable issue. In the proposed work, fingerprint image

encryption scheme based on DNA encoding and chaotic Logistic

map is presented. Initially, using the Logistic map chaotic

sequences are generated and scrambled them by performing

route cipher method. Further, shuffle the original image pixels

with regarding to location map of permuted chaotic sequences

then key masks are generated using original chaotic sequences.

Finally, XOR the two DNA sequence matrix which are obtained

by DNA encoded the permuted image and masks will gain the

encrypted image. Moreover, experimental analyses, image

quality evaluation and sensitivity analysis shown that it is

improved the encryption scheme along with the capability of

resisting exhaustive attack and statistical attack and differential

attack.

Keywords—Biometrics; Fingerprint; Security; Encryption;

DNA (Deoxyribonucleic acid); Nucleotide; Logistic map;

I. INTRODUCTION

Biometrics makes highest level of security over traditional methods like Passwords and PIN numbers. Biometric is the study of automated identification by use of physical (Fingerprint, Iris, Hand, DNA, Face, etc.,) or behavioral (Voice, Signature, Keystroke, etc.,) traits. Thus, the Biometrics has no risk of forgetting it. Among all the Biometric traits, Fingerprint is an essential proven technology for verifying personal identity. In fact, a fingerprint template is the most universal, constant and distinctive. While fingerprint systems have several advantages than traditional security systems, there are some issues of fingerprint data are arises which is vulnerable to attack. Thus, template security is very essential in the development of biometric system because unauthorized person can access this template, can be replaced or altered in the communication channel between the database and matcher [1]. Encrypting the templates (image) is the remedy to this susceptible attack. In practices, cryptography approach is used for encryption. In the area of cryptography, various algorithms such as DES, AES, IDEA, Rabin, Elgamal, RC4, ECC and Blow Fish etc., were designed in past years which is not

efficient for practical image encryption due to high processing power and time complexity of encryption/ decryption is high, high in data capacity and also high correlation among the adjacent pixels. The new research algorithms of image encryption are proposed aims to reduce image content‘s redundancy by special operations, e.g., the chaos-based ciphers [2-4] and DNA based encryption operations [5].

Chaotic system is aperiodic long-term behavior in a deterministic system that exhibits high sensitive dependence on initial criterion which is also used to expand the shuffling and substitution in an image. In the shuffling phase, permutations of image pixels are prepared in a secret demand, deprived of varying their values. The substitution phase is used to alter the pixel values in sequence so that a little alteration in one pixel is blowout to several pixels, with looking forward to the whole image. This chaos system possesses astonishing characteristics such as sensitivity to initial conditions, the pseudo random number , ergodicity [6], topological mixing [8], self-similarity [10], perodicity [9], dynamic instability [7], dense periodic orbits. Therefore, these characteristics make chaos based encryption is to be suitable for constructing cryptosystems with high level of secure.

Pareek et al. [11] have proficiently put forward the algorithm based on chaotic 1D logistic map inorder to encrypt the original secret image. However, the algorithm has smaller key space and lower security. Ren and Ren et al. [12] came out with chaotic algorithm on the basis of dispersion sampling for enciphering image and attained better confusion effect but it has smaller key space. Y.H.Zhang et al. [13] utilize the logistic and standard systems to shuffling the location and pixel values from the original image which is leads to better results but security analysis of the algorithm is not performed. Thus some efficient schemes for encrypting digital images have been recommended. Multidimensional chaotic maps was used by Lian et al. [14-16] for image encryption and analysis the security of the proposed algorithm in detailed manner to ensure that the algorithm have adequate security along with a less cost. A.N. Pisarchik et al. [39] have suggested algorithm with chaotically coupled chaotic maps. For encrypting image, the

International Journal of Pure and Applied MathematicsVolume 118 No. 7 2018, 297-305ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)url: http://www.ijpam.euSpecial Issue ijpam.eu

297

Page 2: Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA … · 2018-03-15 · Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA sequence MR. Nithyakalyani

novelty algorithm based on the multiple chaos system was proposed by both Zuo et al. [18] and Liu et al. [19]. Their algorithms have large key space, strong sensitivity to keys and potential to resist against conventional attacks. Generally, scholars use complex chaotic behavior system or use the combination of new algorithm with previous chaotic algorithm inorder to enhance the security. Nevertheless, some chaotic algorithm was proved to be insecure [20-22].

In 1994, L.Adleman et al. [40] have been credited for introduced DNA (Deoxyribonucleic acid) Computing. After that, features such as massive parallelism, huge storage, ultra-low power consumption of DNA computing is employed in cryptography and many researchers being research on DNA cryptography. DNA cryptography is born as new emerging research topic in cryptographic area in which DNA used as an information carrier. Ashish Gehani et al. [5] proposed first experimental model of DNA Cryptography in which use two methods are substitution and bitwise XOR OTP cryptosystem for encrypt messages and also give the solution for OTP storage problem. C.T. Celland et al. [24] hid the secret message by using DNA microdots. Each character is encoded as three nucleotides i.e. ‗A‘ is denoted by CGA. However, it is tedious to implement and also not have a potential choice for encrypting image. Kang Ning et al. [25] have been proposed pseudo DNA cryptography. This scheme has better in encryption and moreover, real biological operation is not required but it is only applicable to enciphering the character information. Recently, Qiang Zhang et al. [26] have been credited with development of another novel algorithm for image encryption by using the DNA sequence addition combined with chaotic maps. The superior algorithm is developed by Lili Liu et al. [27] for encoding color image in which not need to biological experiment and provide high level of security than other DNA based algorithms. Hongjun Liu et al. [28] have suggested novel method based confusion and diffusion for encrypting images. The method based DNA and chaotic map technique for securing the Iris was suggested by Anil Johny et al. [29]. The novel hybrid method based DNA, Genetic algorithm and logistic map is suggested by Rasul Enayatifar et al. [30] and reduce correlation, increase entropy are the merits of this novel scheme. Babaei et al. [31] also proposed novel algorithm using the combination of chaos theory and DNA coding for encoding text and image. Saranya et al. [36] have been developed method in which use the hybrid combination of chaos and DNA to secure the image.

II. BASIC THEORY OF THE PROPOSED ALGORITHM

A. DNA Coding

This modern technique has the capability of vast storage capacity than traditional approach and the aim of the DNA coding is to encrypting secret data in DNA strands.

TABLE I. EIGHT KINDS OF DNA MAP RULES

1 2 3 4 5 6 7 8

A 00 00 01 01 10 10 11 11

G 01 10 00 11 00 11 01 10

C 10 01 11 00 11 00 10 01

T 11 11 10 10 01 01 00 00

DNA is composed of four nucleotides such as ‗A‘ terms Adenine, ‗C‘ terms Cytosine, ‗T‘ terms Thymine, and ‗G‘ terms Guanine [32, 33]. In Encryption process, two bit binary is converted into DNA sequences with regarding 8 encoding rules.

Table 1 introduces 8 encoding mapping rules of DNA sequence. Anyone of the rule could be employed to this proposed encryption scheme. For example: Fig.1. illustrated that suppose pixel value with a gray level of an image is 160, then it is represented in binary form 10100000 and encoded into DNA sequence is GGAA using Rule 2

Fig. 1. Example

B. DNA XOR operation

As the development of DNA computing, researchers have been proposed a lot of algebraic operations such as XOR based on DNA sequences with regarding to conventional XOR in the binary sequences. Corresponding to eight kinds of DNA encoding schemes, there also exist eight kinds of DNA XOR rules. In this proposed algorithm, XOR Operation is used to diffuse the original gray level fingerprint image pixels because of it‘s better for randomness and less correlation between adjacent pixels. For example: Assume that two DNA sequences are [AACT] and[GATC], use one kind of XOR operation is shown in Table.2 and produce the resultant sequence is [GAGG] . This XOR operation is reflexive and possesses the traditional property such as two inputs are same then output is 0. Otherwise it is 1. i.e. 00 01 = 01, 10 10 = 00. Thus, any one base in every row or column is unique, in other words, the results of XOR operation is one and only.

TABLE II. XOR OPERATION FOR DNA SEQUENCE

A G C T

A A G C T

G G A T C

C C T A G

T T C G A

C. Logistic map function

Recently, in image encryption schemes, one of the simple and most widely applied chaotic is 1D non linear logistic map because of low hardware complexity, low computation cost, simplicity and better pseudo random number generation which was recommended by R.M.May [38]. Mathematical

160

G G A A

10 10 00 00

International Journal of Pure and Applied Mathematics Special Issue

298

Page 3: Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA … · 2018-03-15 · Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA sequence MR. Nithyakalyani

representation for this definition is given in the following equation:

𝑥𝑖+1 = 𝜆𝑥𝑖(1 − 𝑥𝑖)

where, λ ∈ 0,4 , xi ∈ 0,1 , ‗i‘ is the number of iterations and x0 is set initially. The output chaotic sequence is produced by this logistic map function is regulated by the control parameter (λ) which is a positive real value sequence and the initial value respectively.

The system exhibits chaotic under the condition 3.569945< λ ≤ 4 as shown in Fig. 2 and chaotic sequences are highly sensitivity to initial value. When λ=4, the map is surjection and meanwhile xi is in the range of 0 and 1, the chaotic series of values have ergodicity.

Fig. 2. Logistic Map Function

The system exhibits chaotic under the condition 3.569945< λ ≤ 4 as showrn in Fig. 2. and chaotic sequences are highly sensitivity to initial value. When λ=4, the map is surjection and meanwhile xi is in the range of 0 and 1, the chaotic series of values have ergodicity.

D. Route Cipher

Route ciphers are transposition ciphers that begin by first writing the original secret data on a grid of given dimensions then read off in a pattern by a given key. The key would specify a direction ―spiral inward‖, ―clockwise‖, ―starting from the bottom right‖ that the route should follow when writing out the cipher data. Following Fig.3 is the illustration of route cipher.

R E I N F

O R C E M

E N T S A

R R I V I

N G N O W

Fig. 3. Route cipher example

Example: Encrypt ―REINFORCEMENTS ARRIVING NOW‖, Key: ―spiral from top right‖.

III. ALGORITHM DESCRIPTION

This section focusing the step by step procedure of a fingerprint template encryption algorithm incorporating DNA Encoding, DNA XOR operation, Chaotic Logistic Map and Route cipher. Initially, the chaotic sequences are generated through 1D Logistic map then route cipher is applied for transform the order of chaotic sequences. Further, secret

grayscale fingerprint image pixels are disturbed with regarding to the index of permuted chaotic. Then, using the chaotic sequences, each value of key mask is calculated by multiplying of X with 255. Finally, XOR the two DNA sequence matrix which are obtained by DNA encoding the permuted image pixels and key masks to obtained the encrypted image. The flow chart of the proposed algorithm is shown in Fig. 4.

Fig. 4. Flowchart for the proposed algorithm

Algorithm: Proposed Fingerprint Template Encryption

Step 1: Input Gray level fingerprint image, say, Fi.

Step 2: Generated the chaotic sequence of length M×N as the same size of the original image under the 1D Logistic map. Each number is used to encrypt each pixel.

Step 3: Route cipher is applied on this chaotic sequences to reorder the values.

Step 4: Then permuted chaotic sequence and Original chaotic sequence are compared and tabulated the index changes. Using this index, the secret image pixels are permuted.

Step 5: Using the original chaotic sequence, member of the key mask is created by following equation,

Kmask = Xi × 255

Step 6: Permuted image pixels is transformed into 8-bit binary sequences, Fbinary , as well as all member of the

aforementioned key mask, Kmask _binary .

Step 7: According to the table 1 DNA encoding rules, the binary sequences of image and masks are mapping into nucleotide base

FDNA = Fbinary DNA Nucleotide Table

Kmask _DNA = Kmask _binary DNA Nucleotide Table

Step 8: Finally, inorder to encrypt the fingerprint image, FEnc , regarding the DNA sequence XOR operation described in section 2.2 is performed between the DNA Encoded Mask and DNA Encoded image pixels.

FEnc = FDNA Kmask _DNA

Step 9: To decrypt the fingerprint image, DNA and chaotic based cryptography image is taken as an input and processing all encryption steps in reverse order.

International Journal of Pure and Applied Mathematics Special Issue

299

Page 4: Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA … · 2018-03-15 · Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA sequence MR. Nithyakalyani

A. Step by Step Illustration

Following is the illustration of proposed algorithm to understand crystal clearly.

1. Generate Chaotic Sequence and read fingerprint image pixels

ChaoticSeq [X1= 0.9750, X2= 0.2841, X3= 0.1760, X4=

0.3780, X5= 0.1280, X6= 0.5460, X7= 0.8900, X8= 0.7250,

X9= 0.4321] Original Image Pixels

Fi = 190 54 130120 150 11072 180 170

2. It is arranged into grid and performs route cipher on this chaotic sequences,

3. Now, values in the grid are reordered and the encoded sequence is

Chaoticper =

0.4321 0.7250 0.8900 0.3780 0.9750 0.2841

4 1 2 3 6 5

Location Map

After that, permuted chaotic sequence and Original chaotic sequence are compared and the index change is noted.

4. Using the location map, the image is permuted and encoded into DNA bases

Fi = 170 180 72120 190 54130 110 150

Fbinary = 10101010 10110100 0100100001111000 10111110 0011011010000010 01101110 10010110

Confusion Matrix

FDNA = GGGG GTCA CAGACTGA GTTG ATCGGAAG CGTG GCCG

Mapping original image binary values of pixels into

nucleotide base according to the DNA Rule 2.

5. Now, Original chaotic sequence numbers are multiplied by 255,

6. Above Key is arranged in to matrix format and encoded into DNA bases according to Rule 2.

Kmask = 249 72 4596 33 139

227 185 110

Kmask binary = 11111001 01001000 0010110111000000 00100001 1000101111100011 10111001 01101110

Kmask _DNA =

TTGC CAGA AGTCTAAA AGAC GAGTTGAT GTGC CGTG

7. Finally, Perform XOR operation between KeyDNA and FDNA sequences according to the following table,

FEnc = CCAT TTTA CGCCGTGA GCTT GTTCCGAC TCCT TTGA

8. Now DNA code is transform back into decimal pixel to acquire encrypted fingerprint.

FEnc = 83 252 101

184 159 18997 215 248

IV. SIMULATION RESULTS AND ANALYSIS

The proposed method for fingerprint image encryption is implemented in Visual Studio 2010, C# language under the configuration of windows 7 operating system with Core-i3 and 3 GB RAM. In order to demonstrate the security and efficiency of the proposed algorithm, tested four fingerprint image samples from [36] which is composed of unique users‘ fingerprint images and set parameters x0= 0.25, λ=3.905. Table 3 shows that the experimental results of the original fingerprint images, enciphered images and deciphered images.

TABLE III. EXPERIMENTAL RESULTS ON FINGERPRINT IMAGE SAMPLES

Fingerprint Original

Image Encrypted Image Decrypted Image

International Journal of Pure and Applied Mathematics Special Issue

300

Page 5: Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA … · 2018-03-15 · Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA sequence MR. Nithyakalyani

V. SECURITY ANALYSIS

An ideal image cipher algorithm that should has ability of resist against all kinds of attacks such as exhaustive, statistical and differential attacks. In this section, security analysis has been performed on the proposed algorithm.

A. Resistance to exhaustive attack

In order to prove the encryption algorithm that resist against exhaustive attacks, it should have a large key space and high enough sensitive to the secret keys.

1) Secret key space analysis: In this algorithm, the initial

value and control parameter of the logistic map where 𝜆 ∈ 0,4 and 𝑥𝑖 ∈ 0,1 , DNA coding and XOR rules can be

seen as secret keys. For the logistic chaotic system, if the

precision is taken as 10-15 then 1015×1015 = 1030. Also,

there are eight kinds of DNA encoding and XOR rules so the

total key space is 1030×8×8 = 1030×64, which is sufficient to

resisting exhaustive attack.

2) Secret key's sensitivity analysis: A secure image

encryption algorithm should be sensitive to the secret key, i.e.

the tiny changes in the secret key causes significantly different

ciphered images are produced. The Logistic chaotic system is

sensitive to the control parameter and initial value. In order to

test the key sensitivity, using the secret key in Section 4 to

encode the fingerprint image, obtained encoded image as

shown in Table 3., then utilize the secret key (0.001 is added to

x0 so that equates to 0.251, 𝜆=3.905) to decode the encoded

image. The result of decoding is shown the Fig.5 (c) shows the

decoded image which can be concluded if encoding and

decoding keys are consistent then correctly retrieve the original

image.. The sensitivity of the other secret keys are equivalent

as ―x0―, we have not shown examples of them here. On the

basis of above argument, it is proved that proposed algorithm

has ability of resist exhaustive attack and strong sensitive to the

secret keys.

(a) (b) (c)

Fig. 5. Experimental result of secret key‘s sensitivity a) original image b)

encrypted image c) the decrypted image with x0 add 0.001

B. Resistance to statistical attack

Histogram and Information Entropy are investigated inorder to prove the proposed algorithm has capability of resisting against statistical attacks.

1) The grey histogram analysis: The histogram illustrates

distribution of pixel intensities of an image [34]. Here, Table 4

depicted the grey histogram of the fingerprint image1 on the

basis of statistical analysis of original image and encrypted

image. Unlike the uniformity of the encrypted image, the grey

histogram of the original image fluctuated can be seen as in

Table4. Thereby, proposed encryption algorithm should be

robust against statistical attack.

TABLE IV. HISTOGRAMS OF ORIGINAL IMAGE AND THE ENCRYPTED

IMAGE

Original Fingerprint

Histogram

Encrypted Fingerprint

Histogram

2) Correlation Coefficient Analysis: It is well known that

in image the less correlation among adjoining pixels the more

potent ability of resist against statistical attack. In order to

test the correlation among two adjacent pixels, randomly

select 4000 pairs of adjoining pixels (vertical, horizontal and

diagonal) in fingerprint‘s image with 256 ×256 dimension and

calculate their Correlation coefficient by employing the

following equation.

𝑟𝑥𝑦 =𝐶𝑜𝑣(𝑥, 𝑦)

𝐷(𝑥) × 𝐷(𝑦)

International Journal of Pure and Applied Mathematics Special Issue

301

Page 6: Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA … · 2018-03-15 · Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA sequence MR. Nithyakalyani

where,

𝐶𝑜𝑣 𝑥, 𝑦 =1

𝑁 (𝑥𝑖

𝑁𝑖=1 − 𝐸 𝑥 )(𝑦𝑖 − 𝐸 𝑦 ) is the

covariance of x and y,

𝐸 𝑥 =1

𝑁 𝑥𝑖

𝑁𝑖=1 is the mean,

𝐷 𝑥 =1

𝑁 (𝑥𝑖

𝑁𝑖=1 − 𝐸(𝑥))2 is the variance

Fig.6,7,8,9 illustrated correlation of adjacent pixels

(horizontally, vertically, diagonally) in the original fingerprint image and in the encrypted image, respectively. Achieved outcomes are listed in Table 5, we can see that correlation coefficient of the adjoining pixels of encryption image is near to 0 and hence, the proposed algorithm can effectively robust against correlation statistical attack.

Fig. 6. Correlation of adjacent pixels in the original and its encrypted images of Fingerprint Sample1

Fig. 7. Correlation of adjacent pixels in the original and its encrypted images of Fingerprint Sample2

Fig. 8. Correlation of adjacent pixels in the original and its encrypted images

of Fingerprint Sample3

Fig. 9. Correlation of adjacent pixels in the original and its encrypted images

of Fingerprint Sample4

TABLE V. CORRELATION COEFFICIENT OF ENCRYPTED IMAGE

Image Name Horizontal Vertical Diagonal

Fingerprint1 0.0017 0.0007 0.0001

Fingerprint2 0.0025 0.0015 0.0006

Fingerprint3 0.0019 0.0021 0.0008

Fingerprint4 0.0023 0.00012 0.0012

From the Table 5, we can see that the entropy values of encrypted various Fingerprint images get close to ideal value which ensures that proposed scheme highly resist against statistical attacks.

C. Resistance to differential attack

In general, enciphered image is completely differing from plain image. Such difference could be calculated by two criterions such as NPCR and UACI [35].

International Journal of Pure and Applied Mathematics Special Issue

302

Page 7: Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA … · 2018-03-15 · Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA sequence MR. Nithyakalyani

NPCR: Number of Pixels Changing Rate (NPCR) which means change rate of the no of pixels in image. If NPCR get close to 100% then plain image is highly encrypted.

100%NM

j)D(i,

NPCRji,

UACI: Unified Average Changing Intensity which is used to measuring the average intensity of pixels difference between the plain image and enciphered image. If UACI around 33% then it is more sensitive resist differential attack.

%100255

j)(i,Fj)(i,F

NM

1UACI

ji,

ENCi

Table 6 shows NPCR of original and encrypted Fingerprint images gets nearly to 99.68 and UACI values are around 33.38 respectively. This result ensures that the proposed algorithm should be vigorous against differential attack.

TABLE VI. NPCR AND UACI VALUES OF FINGERPRINT IMAGE SAMPLES

Image Name NPCR (%) UACI (%)

Fingerprint1 99.60 28.79

Fingerprint2 99.61 30.45

Fingerprint3 99.61 29.54

Fingerprint4 99.59 27.96

VI. CONCLUSION

Since the authentication of biometrics techniques over open network occurs more and more, security of such techniques is more important. In this proposed scheme, human fingerprint is encrypted by using the properties of DNA code and chaotic logistic map with route cipher which ensures preserving the privacy of the template. From the above discussing, 1D logistic map chaotic sequences are scrambled by using route cipher operation and original image pixels are scrambled according to the index of permuted chaotic sequences. Then, using the original chaotic sequence, key masks are generated. Then, XOR the two DNA sequence matrix which are obtained by DNA encoding the permuted image and key masks to obtained the encrypted image.

Through the numerical experiment and security analysis, it is proved that proposed algorithm has better encryption effect, large key space and high enough sensitive to the secret keys. Moreover, the proposed algorithm has ability of resist against all kinds of attacks such as exhaustive, statistical and differential attacks. All these prominent aspects depicts that the combination of 1D chaotic map with route cipher and DNA Cryptography could be suitable for authentication of fingerprint template efficiently and securely.

REFERENCES

[1] Jain, Anil K., Arun Ross, and Umut Uludag. ―Biometric template security: Challenges and solutions.‖ Signal Processing Conference, 2005 13th European. IEEE, 2005.

[2] S.G. Lian, Multimedia Content Encryption: Techniques and Applications, ISBN:1420065270, Auerbach Publication Taylor & Francis Group, Boca Raton, 2008.

[3] K. Wong, B. Kwok, W. Law, A fast image encryption scheme based on chaotic standard map, Phys. Lett. A 372 (2008) 2645–2652.

[4] Y. Wang, K. Wong, X. Liao, T. Xiang, G. Chen, A chaos-based image encryption algorithm with variable control parameters, Chaos Solitons Fractals 41 (2009) 1773–1783.

[5] Gehani, Ashish, Thomas LaBean, and John Reif. ―DNA-based cryptography.‖ Aspects of Molecular Computing. Springer Berlin Heidelberg, 2003. 167-188.

[6] Tong X, Cui M. Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vision Computing 2008;6:843–50.

[7] Boguta, K.. (2011). Sensitivity To Peturbation in Elementary Cellular Automata, from the Wolfram Demonstrations Project

http://demonstrations.wolfram.com/SensitivityToPeturbationInElementaryCellularAutomata/

[8] Mahieu, E. (2011). Bifurcation Diagram of the Hénon Map from the Wolfram Demonstrations Project

http://demonstrations.wolfram.com/BifurcationDiagramOfTheHenonMap/

[9] Zech, A., Donges, J. F., Marwan, N. & Kurths, J. (2011). Frequency Distribution of the Logistic Map, from the Wolfram Demonstrations Project,

http://demonstrations.wolfram.com/FrequencyDistributionOfTheLogisticMap/

[10] Fabre, C. (2011). Chaos Game 2D/3D, from the Wolfram Demonstrations Project

http://demonstrations.wolfram.com/ChaosGame2D3D/

[11] N.K. Pareek, V. Patidar, K.K. Sud, Image encryption using chaotic logistic map, Image and Vision Computing 24 (9) (2006) 926934.

[12] H. Ren, Z. Shang, Y. Wang, and J. Zhang, ―A chaotic algorithm of image encryption based on dispersion sampling,‖in Proceedings of the 8th International Conference on Electronic Measurement and Instruments (ICEMI ‘07), vol. 2, pp. 836–839, August 2007.

[13] Y.H.Zhang,B.S.Kang,andX.F.Zhang,―Image encryption algorithm based on chaotic sequence,‖ in Proceedings of the 16th International Conference on Artificial Reality and Telexistence—Workshops (ICAT ‘06), vol. 29, pp. 221–223, December 2006.

[14] S. Lian, ―Efficient image or video encryption based on spatiotemporal chaos system,‖ Chaos, Solitons and Fractals, vol. 40, no. 5, pp. 2509–2519, 2009.

[15] S. Lian, J. Sun, and Z. Wang, ―A block cipher based on a suitable use of the chaotic standard map,‖Chaos, Solitons and Fractals, vol. 26, no. 1, pp. 117–129, 2005.

[16] S. Lian, ―A block cipher based on chaotic neural networks,‖Neurocomputing, vol. 72, no. 4–6, pp. 1296–1301, 2009.

[17] Shankar, K., and P. Eswaran. ―An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm.‖ Artificial Intelligence and Evolutionary Computations in Engineering Systems. Springer, New Delhi, 2016. 705-714.

[18] Y. Z. F. Zuo, Z. Zhai, and C. Xiaobin, ―A new image encryption algorithm based on multiple chaos system,‖ in Proceedings of the International Symposium on Electronic Commerce and Security (ISECS ‘08), vol. 142, pp. 347–350, August 2008.

[19] J.M.Liu, S.S.Qiu, F.Xiang,and H.J.Xiao,―A cryptosystem based on multiple chaotic maps,‖ in Proceedings of the International Symposium on Information Processing (ISIP ‘08) and International Pacific Workshop on Web Mining and WebBased Application (WMWA ‘08), vol. 99, pp. 740–743, May 2008.

[20] G. Jakimoski and L. Kocarev, ―Analysis of some recently proposed chaos-based encryption algorithms,‖Physics Letters A, vol. 291, no. 6, pp. 381–384, 2001.

[21] G.Alvarez, F. Montoya, M. Romera, and G. Pastor, ―Cryptanalysis of an ergodic chaotic cipher,‖ Physics Letters A, vol. 311, no. 2-3, pp. 172–179, 2003.

International Journal of Pure and Applied Mathematics Special Issue

303

Page 8: Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA … · 2018-03-15 · Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA sequence MR. Nithyakalyani

[22] I. S. Mohamed and R. S. Alaa-eldin, ―Methods of attacking chaotic encryption and countermeasures,‖ in Proceedings of the IEEE Interntional Conference on Acoustics, Speech, and Signal Processing, pp. 1001–1004, Salt Lake, Utah, USA, May 2001.

[23] Shankar, K., and P. Eswaran. "Sharing a secret image with encapsulated shares in visual cryptography." Procedia Computer Science 70 (2015): 462-468.

[24] C.T. Celland, V. Risca, C. Bancroft, Hiding messages in DNA microdots, Nature 399 (1999) 533-534.

[25] Kang Ning, A pseudo DNA cryptography method, arXiv:0903.2693.

[26] Zhang, Qiang, Ling Guo, and Xiaopeng Wei. ―Image encryption using DNA addition combining with chaotic maps.‖ Mathematical and Computer Modelling 52.11 (2010): 2028-2035.

[27] Liu, Lili, Qiang Zhang, and Xiaopeng Wei. ―A RGB image encryption algorithm based on DNA encoding and chaos map.‖ Computers & Electrical Engineering 38.5 (2012): 1240-1248.

[28] Liu, Hongjun, and Xingyuan Wang. ―Image encryption using DNA complementary rule and chaotic maps.‖ Applied Soft Computing 12.5 (2012): 1457-1466.

[29] Johny, Anil, and Siyamol Chirakkarottu. ―Secure Encryption Method for Biometric Iris Pattern.‖

[30] Enayatifar, Rasul, Abdul Hanan Abdullah, and Ismail Fauzi Isnin. ―Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence.‖ Optics and Lasers in Engineering 56 (2014): 83-93.

[31] M. Babaei, A novel text and image encryption method based on chaos theory and DNA computing, Nat. Comput. 12 (1) (2013) 101–107.

[32] Zhang, Mingjun, et al. ―Interactive DNA sequence and structure design for DNA nano applications." NanoBioscience, IEEE Transactions on 3.4 (2004): 286-292.

[33] Watson, J. D., and F. H. C. Crick. ―A structure for deoxyribose nucleic acid.‖ A century of Nature: twenty-one discoveries that changed science and the world (2003): 82.

[34] Shankar, K., and P. Eswaran. ―RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography.‖ China Communications 14.2 (2017): 118-130.

[35] Shankar, K., and P. Eswaran.‖A new k out of n secret image sharing scheme in visual cryptography.‖ Intelligent Systems and Control (ISCO), 2016 10th International Conference on. IEEE, 2016.Shankar, K., and P. Eswaran. "A new k out of n secret image sharing scheme in visual cryptography." Intelligent Systems and Control (ISCO), 2016 10th International Conference on. IEEE, 2016.

[36] http://www.nist.gov/srd/nistsd4.cfm

[37] Saranya M R, Arun K Mohan, K Anusudha,‖ A Hybrid Algorithm for Enhanced Image Security Using Chaos and DNA theory‖, 2015 International Conference on Computer Communication and Informatics, Jan. 08 – 10, 2015.

[38] R.M. May, ―Simple mathematical model with very complicated dynamics‖, Nature 261,459(1976).

[39] A.N. Pisarchik, M. Zanin, Image encryption with chaotically coupled chaotic maps, Physica D 237 (2008) 26382648.

[40] Adleman, Leonard M. ―Molecular computation of solutions to combinatorial problems.‖ Science 266.5187 (1994): 1021-1024.

International Journal of Pure and Applied Mathematics Special Issue

304

Page 9: Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA … · 2018-03-15 · Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA sequence MR. Nithyakalyani

305

Page 10: Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA … · 2018-03-15 · Fingerprint Template Encryption Scheme Based on Chaotic Map and DNA sequence MR. Nithyakalyani

306