4.5 Article

A novel key and image concealing with static-dynamic pattern using modified periodic table

Journal

Publisher

ELSEVIER
DOI: 10.1016/j.jisa.2021.103019

Keywords

Secret key; Encryption; Image slice; Decryption; Scrambling; Security analysis

Funding

  1. RUSA -phase 2.0 grant, Policy (TNMulti-Gen), Dept. of Edn. Govt. of India [F.24-51/2014-U]

Ask authors/readers for more resources

This research introduces a new symmetric encryption algorithm for ciphering unique identification numbers and biometric images in India. By utilizing existing unique numbers, the algorithm generates secret keys and cipher images, improving security measures.
This research contribution reports a new symmetric encryption algorithm for ciphering the unique identification numbers (12-digit Aadhaar, Ration, Mobile, and region numbers in India) and biometric images. In this algo-rithm, existing unique number identifying a particular person are fully and partially utilized to produce secret key and cipher image respectively. For verification and authentication, person unique numbers are divided into two parts in the secret key generation. In the first part, the Aadhaar number is preprocessed with out-shuffle and coupling methods. In the second part, the remaining unique numbers are used for authentication. Finally, both parts are replaced with atomic symbols of periodic table property and extended ASCII values select depends on the day of the week to generate the complete secret key. On the other hand, biometric images split as small images and shuffle them with the dynamic pattern. Scrambling the pixel positions of shuffled images are accomplished by tree traversal algorithm and a novel technique. Meanwhile, 8-bit binary conversion of shuffled image values and cyclic shift process is performed. Even though the key space is less, the authentication and verification process eliminates the prediction of secret keys. Experimental result of the proposed encryption e has shown that various attacks and security is assured. The performance of the proposed encryption scheme is better than existing approaches.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available