A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
In this paper, a Lorenz-like chaotic system was developed to encrypt the dorsal hand patterns on a microcomputer. First, the dorsal hand vein images were taken from the subjects via an infrared camera. These were subjected to two different processes called contrast enhancement and segmentation of ve...
Gespeichert in:
Veröffentlicht in: | IEEE access 2019, Vol.7, p.60850-60867 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In this paper, a Lorenz-like chaotic system was developed to encrypt the dorsal hand patterns on a microcomputer. First, the dorsal hand vein images were taken from the subjects via an infrared camera. These were subjected to two different processes called contrast enhancement and segmentation of vein regions. Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. For the encryption process, random numbers were generated by the chaotic system. These random numbers were subjected to NIST-800-22 test which is the most widely accepted statistical test suite. The speeded up robust feature (SURF) matching algorithm was utilized in the initial condition sensitivity analysis of the encrypted images. The results of the analysis have shown that the proposed encryption algorithm can be used in identification and verification systems. The encrypted images were analyzed with histogram, correlation, entropy, pixel change rate (NPCR), initial condition sensitivity, data loss, and noise attacks which are frequently used for security analyses in the literature. In addition, the images were analyzed after noise attacks by means of peak signal-to-noise ratio (PSNR), mean square error (MSE), and the structural similarity index (SSIM) tests. It has been shown that the dorsal hand vein images can be used in identification systems safely with the help of the proposed method on microcomputers. |
---|---|
ISSN: | 2169-3536 2169-3536 |
DOI: | 10.1109/ACCESS.2019.2914721 |