2020
DOI: 10.1080/09500340.2020.1760384
|View full text |Cite
|
Sign up to set email alerts
|

Double image encryption scheme for iris template protection using 3D Lorenz system and modified equal modulus decomposition in hybrid transform domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 70 publications
0
9
0
Order By: Relevance
“…Barrero et al [7] proposed a shared substructure for various biometric template protection based on a homomorphic probabilistic transform approach that only manipulates changed data. An iris template based double image encryption technique was suggested by Rakheja et al [8]. In the frequency domain of the hybrid transform (HT), this technique used a 3D-Lorenz chaotic approach and modified equal modulus decomposition were utilised in this methodology.…”
Section: A Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Barrero et al [7] proposed a shared substructure for various biometric template protection based on a homomorphic probabilistic transform approach that only manipulates changed data. An iris template based double image encryption technique was suggested by Rakheja et al [8]. In the frequency domain of the hybrid transform (HT), this technique used a 3D-Lorenz chaotic approach and modified equal modulus decomposition were utilised in this methodology.…”
Section: A Related Workmentioning
confidence: 99%
“…A comparative analysis against existing methods was performed to check the authenticity, accuracy, and originality of the presented biometric templates encryption technique for real-time applications. We have compared our presented technique with other existing techniques [8], [20], [27], [28], [34]. The type of data, applied process, transform domain, permutation and substitution methods, the number of keys, sensitivity to secret keys, keyspace, entropy, PSNR of the decrypted image, and attack analysis are among the parameters considered for comparison, as described in Table 12.…”
Section: Comparison With the Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…To improve the security of the DRPE Scheme, Sharma et al [16] adopted the 3-D Lorenz system in the Fourier domain. Many other encryption schemes using chaotic maps in different ways to make more secure encryption schemes are discussed in [18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%