Secret Sharing Scheme with Fingerprint Authentication

Article Preview

Abstract:

Medical imaging is very important in medical diagnosis. X-rays, ultrasound images, CT scans, brain pictures, and patient mri images are examples of images that contain sensitive information. However, poor communication channels and loopholes in hospital and medical centre storage systems risk accessing these images by unauthorised individuals who utilise them for nefarious purposes other than diagnostics. Image encryption is a common strategy for enhancing the integrity of communication and storage channels for protecting medical images from unauthorized access. This task proposes a biometrics-based method of secret sharing. Instead of sharing secrets between participants as in encryption, the biometric properties of participants create a single biometric configuration. If the biometric vaults are verified for the required number of actual during the authentication process, participants must provide a valid encryption key from the configuration is disclosed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

719-728

Citation:

Online since:

February 2023

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2023 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Agarwal, S. Secure image transmission using fractal and 2D-chaotic maps,. Journal of Imaging, 4(1), 17. (2018).

Google Scholar

[2] Ahmad, J., Masood, F., Shah, S. A., Jamal, S. S., & Hussain, I. A novel secure occupancy monitoring scheme based on the multi-chaos mapping,. Symmetry, 12(3), 350. (2020).

DOI: 10.3390/sym12030350

Google Scholar

[3] Ali, T. S., & Ali, R. A novel medical image encryption scheme using TLTS and Henon chaotic map,. IEEE Access, 8, 71974–71992. (2020).

DOI: 10.1109/access.2020.2987615

Google Scholar

[4] Chen, G., & Ueta, T. Yet another chaotic attractor. International Journal of Bifurcation and Chaos,, 9(07), 1465–1466. (1999).

DOI: 10.1142/s0218127499001024

Google Scholar

[5] Henan M. A two-dimensional mapping with a strange attractor,. In The theory of chaotic attractors (p.94–102). Springer. (1976).

DOI: 10.1007/978-0-387-21830-4_8

Google Scholar

[6] Khan, M., Masood, F., Alghafis, A., Amin, M., & Batool Naqvi, S. I.. A novel image encryption technique using a hybrid method of discrete dynamical chaotic maps and Brownian motion., PLoS ONE, 14(12), e0225031. (2019).

DOI: 10.1371/journal.pone.0225031

Google Scholar

[7] Li, C., & Chen, G. Chaos in the fractional-order Chen system and its control., Chaos, Solitons & Fractals, 22(3), 549–554. (2004).

DOI: 10.1016/j.chaos.2004.02.035

Google Scholar

[8] Masood, F., Ahmad, J., Shah, S. A., Jamal, S. S., & Hussain, I. A novel hybrid secure image encryption based on Julia's set of fractals and 3D Lorenz chaotic map,. Entropy, 22(3), 274. (2020a).

DOI: 10.3390/e22030274

Google Scholar

[9] Masood, F., Bonilla, W., Ahmad, J., Sankar, S., Rubaiee, S., Buchanan, W. J., et al. A novel privacy approach of digital aerial images based on the Mersenne twister method with DNA genetic encoding and chaos., Remote Sensing, 12(11), 1893. (2020b).

DOI: 10.3390/rs12111893

Google Scholar

[10] Özkaynak, F. Chaos-based substitution boxes as a cryptographic primitive: Challenges and opportunities., Chaotic Modeling and Simulation, 1, 49–57. (2019).

Google Scholar

[11] Özkaynak, F. On the effect of a chaotic system in performance characteristics of chaos-based s-box designs., Physica A: Statistical Mechanics and its Applications, 550, 124072. (2020).

DOI: 10.1016/j.physa.2019.124072

Google Scholar

[12] Qayyum, A., Ahmad, J., Boulila, W., Rubaiee, S., Masood, F., Khan, F., & Buchanan, W. J. et al. Chaos-based confusion and diffusion of image pixels using dynamic substitution., IEEE Access. (2020).

DOI: 10.1109/access.2020.3012912

Google Scholar

[13] Sasikaladevi, N., Geetha, K., Sriharshini, K., & Aruna, M.D. H3-hybrid multilayered hyperchaotic hyperelliptic curve-based image encryption system., Optics & Laser Technology, 127, 106173. (2020).

DOI: 10.1016/j.optlastec.2020.106173

Google Scholar

[14] Tsafack, N., Kengne, J., Abd-El-Atty, B., Iliyasu, A. M., Hirota, K., & Abd EL-Latif. A. A. Design and implement a simple dynamical 4-D chaotic circuit with applications in image encryption., Information Sciences, 515, 191–217. (2020).

DOI: 10.1016/j.ins.2019.10.070

Google Scholar

[15] Tutueva, A.V., Nepomuceno, E.G., Karimov, A.I., Andreev, V.S., & Butusov, D.N. Adaptive chaotic maps and their application to pseudo-random numbers generation., Chaos, Solitons & Fractals, 133, 109615. (2020).

DOI: 10.1016/j.chaos.2020.109615

Google Scholar

[16] Wang, S., Wang, C., & Xu, C. An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm., Optics and Lasers in Engineering, 128, 105995. (2020a).

DOI: 10.1016/j.optlaseng.2019.105995

Google Scholar

[17] Wang, X., Wang, Y., Zhu, X., & Luo, C. A novel chaotic algorithm for image encryption utilizing a one-time pad based on pixel-level and DNA level., Optics and Lasers in Engineering, 125, 105851. (2020b).

DOI: 10.1016/j.optlaseng.2019.105851

Google Scholar

[18] Zhou, M., & Wang, C. A novel image encryption scheme based on a conservative hyperchaotic system and closed-loop diffusion between blocks., Signal Processing, 171, 107484. (2020).

DOI: 10.1016/j.sigpro.2020.107484

Google Scholar

[19] Karthik Nandakumar & Anil K. Jain & Sharath Pankanti. Fingerprint-based Fuzzy Vault: Implementation and Performance,. (2007).

Google Scholar

[20] Xuehu Yan, Ching-nung Yang, Xinpeng Zhang, Shudong Wang. A Common Method of Share Authentication in Image Secret Sharing,. (2020).

Google Scholar

[21] Huiyong Wang, Mingjun Luo, and Yong Ding Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing,. (2021).

Google Scholar

[22] Rupali S. Patil, Sonali Patil, Sudeep D. Spade Secret Sharing based Secure Authentication System International Journal of Computer Applications,. (0975 – 8887) Volume 118 – No.22, (May 2015).

DOI: 10.5120/20875-3613

Google Scholar

[23] Jiayu Wang, Xuehu Yan, Jia Chen, and Yongqiang Yu An Intragroup and Intergroup Multiple Secret Images' Sharing Scheme with Each Participant Holding One Shadow Image, (July 2021).

DOI: 10.1155/2021/9960998

Google Scholar

[24] A. Shamir, How to share a secret Communications of the ACM, 22, pp.612-613, (November 1979).

Google Scholar