{"title":"基于混沌系统和分数阶傅里叶变换的指纹加密新算法","authors":"Delong Cui","doi":"10.1109/MVHI.2010.38","DOIUrl":null,"url":null,"abstract":"To enhance present fingerprint encryption/ decryption algorithm security, a novel fingerprint encryption/ decryption algorithm based on chaotic system and fractional Fourier transform is proposed in this paper. The fingerprint encryption process includes two steps: first the fingerprint is encrypted by employing Fractional Fourier domain double random phase, then the confusion fingerprint is encrypted by using confusion matrix which is generated by chaotic system, and finally the cipher fingerprint is obtained. The security of the proposed algorithm depends on the sensitivity to the randomness of phase mask, the orders of FRFT and the initial conditions of chaotic system. Theoretical analysis and experimental results demonstrate that the algorithm is favorable.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":"{\"title\":\"A Novel Fingerprint Encryption Algorithm Based on Chaotic System and Fractional Fourier Transform\",\"authors\":\"Delong Cui\",\"doi\":\"10.1109/MVHI.2010.38\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To enhance present fingerprint encryption/ decryption algorithm security, a novel fingerprint encryption/ decryption algorithm based on chaotic system and fractional Fourier transform is proposed in this paper. The fingerprint encryption process includes two steps: first the fingerprint is encrypted by employing Fractional Fourier domain double random phase, then the confusion fingerprint is encrypted by using confusion matrix which is generated by chaotic system, and finally the cipher fingerprint is obtained. The security of the proposed algorithm depends on the sensitivity to the randomness of phase mask, the orders of FRFT and the initial conditions of chaotic system. Theoretical analysis and experimental results demonstrate that the algorithm is favorable.\",\"PeriodicalId\":34860,\"journal\":{\"name\":\"HumanMachine Communication Journal\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"21\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"HumanMachine Communication Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MVHI.2010.38\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"HumanMachine Communication Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MVHI.2010.38","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
A Novel Fingerprint Encryption Algorithm Based on Chaotic System and Fractional Fourier Transform
To enhance present fingerprint encryption/ decryption algorithm security, a novel fingerprint encryption/ decryption algorithm based on chaotic system and fractional Fourier transform is proposed in this paper. The fingerprint encryption process includes two steps: first the fingerprint is encrypted by employing Fractional Fourier domain double random phase, then the confusion fingerprint is encrypted by using confusion matrix which is generated by chaotic system, and finally the cipher fingerprint is obtained. The security of the proposed algorithm depends on the sensitivity to the randomness of phase mask, the orders of FRFT and the initial conditions of chaotic system. Theoretical analysis and experimental results demonstrate that the algorithm is favorable.