Image and Video Security Using Fractional Transform and Multimodal Biometric Keys

Loading...
Thumbnail Image

Journal Title

Journal ISSN

Volume Title

Publisher

Thapar University

Abstract

In today's world, as the use of internet has facilitates humans in several areas such as transferring information, instant messaging, video conferencing etc. It also adds on need of security techniques to protect these multimedia contents in communication from intruders. To fulfill this security need, this thesis work has been proposed to secure images and videos transferred in the open channel. For the security of multimedia contents (i.e. images and videos) several techniques have been invented, but encryption is used in proposed work to create chaos in the transmitted information. Due to presence of uncertainty in the ciphered information, it became difficult for the hacker to differentiate between random noise and ciphered data. Further, encryption can be performed with several techniques AES (Advanced Encryption Standard), chaotic mapping, Arnold transforms, matrix transformation and fractional transforms etc. The proposed work is about "Image and video security using fractional transform and multimodal biometric keys". The fractional transforms are preferred for the encryption because it provides extra degree of freedom, due to presence of non-integer fractional order. To add on more security features to the algorithm combination of fractional transform and scrambling has been used in proposed algorithm. Due to unique and untraceable features of biometrics, the threat of tracing key has been conquered. After implementing encryption algorithm for the security of images and videos, performance parameters like PSNR (peak signal to noise ratio), MSE (mean square error), SSIM (structural similarity index measure), correlation between adjacent pixels and histogram analysis have been computed to improve capability of the proposed algorithm. The proposed algorithm provides infinite PSNR and zero MSE that shows better performance of proposed algorithm than existing ones. The various attacks like differential attacks, brute force attacks, known plaintext attacks etc. have been applied on the encrypted information to check the attacks resistance power of proposed algorithm. Hence, the use of biometric keys provides attack resistance power to the algorithm. Thus, the comparison between the parameters of proposed and existing algorithms verifies the improvement in proposed algorithm. In future scope, even more secured and complex transform can be invented to improve the efficiency of proposed algorithm.

Description

Master of Engineering -ECE

Citation

Endorsement

Review

Supplemented By

Referenced By