Abstract

To advancement in security applications, for the first time, a bio-chaotic key generated from the emerging biometric trait “finger knuckle print (FKP)” has been proposed for data security and authentication. In the system, the feasibility to generate multiple keys from the single FKP image has been exploited to secure multiple information, which results in significant enhancement of the security strength. The encryption and decryption processes keep the user-specificity and perform better in reducing space for key storage and transmission. The research contribution is to facilitate a simplified optical implementation. Simulation results show the validity and effectiveness of the proposed scheme.

Highlights

  • The rapid proliferation of optical information processing systems provides several degrees of freedom for securing data, information, or images that can be processed because of advantages such as two dimensional (2D) imaging capabilities, high speed, and the parallelisms [1], [2]

  • Double random phase encoding (DRPE) scheme based on the 4-f system was first proposed in the concept of optical encryption by Refregier and Javidi [3]

  • Unnikrishnan et al [4] introduced an approach to implement optical encryption based on fractional Fourier domain

Read more

Summary

Introduction

The rapid proliferation of optical information processing systems provides several degrees of freedom for securing data, information, or images that can be processed because of advantages such as two dimensional (2D) imaging capabilities, high speed, and the parallelisms [1], [2]. Double random phase encoding (DRPE) scheme based on the 4-f system was first proposed in the concept of optical encryption by Refregier and Javidi [3]. Various extended encryption techniques based on optical transform have been proposed [2]–[6]. Unnikrishnan et al [4] introduced an approach to implement optical encryption based on fractional Fourier domain. Situ et al [5] proposed an image encoding method by using the Fresnel transform. In these schemes, some parameters (such as fractional order in FrFT, distance, angle, etc.) can be considered as additional security keys

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call