Cellular Automata based Encrypted ECG-hash Code Generation: An Application in Inter-human Biometric Authentication System

Full Text (PDF, 718KB), PP.1-12

Views: 0 Downloads: 0


Subrata Nandi 1,* Satyabrata Roy 1 Jayanti Dansana 1 Wahiba Ben Abdessalem Karaa 2 Ruben Ray 3 Shatadru Roy Chowdhury 4 Sayan Chakraborty 4 Nilanjan Dey 4

1. Computer Science and Engineering Department, KIIT University, Bhubaneswar, 751024, India

2. Computer Science and Engineering Department, High Institute of Management, 41, Rue de la Liberté, Cité Bouchoucha 2000 Le Bardo, Tunis, TUNISIA

3. Department of IT, Government College of Engineering and Leather Technology, Kolkata, 700098, India

4. Department of CSE, JIS College of Engineering, Kalyani, 741235, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2014.11.01

Received: 4 May 2014 / Revised: 2 Jul. 2014 / Accepted: 15 Aug. 2014 / Published: 8 Oct. 2014

Index Terms

Inimitable, electrocardiogram, dot product, cellular automata, ECG-hash code, randomness, cipher text


In this modern era, biometrics incorporate various mechanisms to recognize inimitable features of human beings by utilizing their biological and evident features. This paper proposes a novel technique for constructing a resilient and secure biometric recognition system. In this paper, an ECG-hash code of two distinct individuals has been formed by taking dot product of electrocardiogram (ECG) feature matrices of two persons located at two different sites at respective databases. The validity of the system increases as samples from both persons, between whom the transmission takes place, are essential. Besides, electrocardiogram is such a unique feature of an individual that could not be compromised at any circumstance as contradictory to other features like fingerprints, face recognition etc. Moreover, the ECG-hash code is encrypted using rule vector of cellular automata that gives better security in terms of randomness of generated cipher text.

Cite This Paper

Subrata Nandi, Satyabrata Roy, Jayanti Dansana, Wahiba Ben Abdessalem Karaa, Ruben Ray, Shatadru Roy Chowdhury, Sayan Chakraborty, Nilanjan Dey, "Cellular Automata based Encrypted ECG-hash Code Generation: An Application in Inter human Biometric Authentication System", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.11, pp.1-12, 2014. DOI:10.5815/ijcnis.2014.11.01


[1]M. Dey, N. Dey, S. K. Mahata, S. Chakraborty, S. Acharjee and A. Das, “Electrocardiogram Feature based Inter-human Biometric Authentication System”, International Conference on Electronic Systems, Signal Processing and Computing Technologies, 2014.
[2]S Latifi, N Solayappan, “A Survey of Unimodal Biometric Methods”, in International Conference on Security & Management, SAM, 2006, pp. 57-63.
[3]S. S. Parvinder, I. Kaur, A. Verma, S. Jindal, S. Singh. (2009, Nov.). Biometric Methods and Implementation of Algorithms. International Journal of Electrical & Electronics Engineering [Online].3,(8),pp.3-8.
[4]S. M. Rahal, H. A. Aboalsamah, K. N. Muteb, “Multimodal Biometric Authentication System – MBAS”, in 2nd IEEE Conference on Information and Communication Technologies, 2006, pp. 1026-1030.
[5]M. I. Ahmad, W. L. Woo, S. S. Dlay, “Multimodal biometric fusion at feature level: Face and palm print”, in 7th International Symposium on Communication Systems Networks and Digital Signal Processing, 2010, pp. 801-805.
[6]P. Lacharme, A. Plateaux. PIN-based cancelable biometrics, GREYC Research lab, Ensicaen - UCBN – CNRS [Online].3(2),. Available: http://www.ecole.ensicaen.fr/~lacharme/IJAIT2011.pdf. 2011, pp. 75-79
[7]N. Radha1 and S. Karthikeyan, “An Evaluation of Fingerprint Security using Noninvertible Biohash”, International Journal of Network Security & Its Applications (IJNSA), 2011, Vol.3, No.4.
[8]N. Dey, B. Nandi, M. Dey , D. Biswas, A. Das, S. S. Chaudhuri, “Generation of Bio Hash Code from Electrocardiogram Features”, in 3rd IEEE International Advance Computing Conference, 2013, pp. 724-728.
[9]F. Maleki, A. Mohades, M. E. Shiri, A. Bijari, " A CA randomizers based on parallem CAs with balanced rules", International conference on Computational Science, ICCS, 2010, pp. 417-425.
[10]L. Kotoulas, D. Tsarouchis, G. Ch. Sirakoulis, I. Andreadis, "1-d cellular automata for pseudo random number generation and its reconfigurable hardware implementation", Proceedings of IEEE international symposium on circuits and systems, 2006.
[11]S. Roy, S. Nandi, J. Dasnasa, P. K. Pattnaik, "Application of cellular automata in symmetric key cryptography", Proceedings of IEEE International Conference on Communication and Signal Processing (ICCSP), 2014.
[12]J. V. Neumann, Theory of Self Reproducing Automata, edited and completed by Burks, A.W. (Ed.), Univ. of Illinois press, London, 1966.
[13]S. Wolfram, A new kind of science, Wolfram Media Inc., ISBN: 1-57955-008-8, 2002.
[14]S. Nandi, B. K. Kar, Pabitra Pal Chaudhuri, “Theory and applications of cellular automata in cryptography”, IEEE Transactions on Computers, 1994, 43(12), pp. 1346-1356.
[15]D. Mukhopadhyay, "Design and analysis of cellular automata based cryptographic algorithms", Doctoral thesis, Indian Institute of Technology, Kharagpur, 2007.
[16]N. Dey, S. Mukhopadhyay, A. Das, S. S. Chaudhuri, “Analysis of P-QRS-T Components Modified by Blind Watermarking Technique Within the Electrocardiogram Signal for Authentication in Wireless Telecardiology Using DWT”, in IJIGSP, 2012, vol.4, no.7, pp.33-46.
[17]N. Dey, S. Samanta, X-S Yang, A. Das, and S. S. Chaudhuri, “Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search’, Int. J. Bio-Inspired Computation, 2013, Vol. 5, No. 5, pp.315–326
[18]S. M. Ross, Introductory Statistics, Second edition, Academic Press, Elsevier, pp. 659-664.
[19]N. Dey, A. B. Roy, A. Das and S. S. Chaudhuri, “Recent Trends in Computer Networks and Distributed Systems Security”, published in Springer Berlin / Heidelberg in Communications in Computer and Information Science, 2012, ISBN 978-3-642-34134-2, Volume 335, Part 2, Pages 347-357, DOI: 10.1007/978-3-642-34135-9_35.
[20]N. Dey, S. Biswas , A. B. Roy, A. Das and S.S. Chaudhuri, “Analysis Of Photoplethysmographic Signals Modified by Reversible Watermarking Technique using Prediction-Error in Wireless Telecardiology”, International Conference of Intelligent Infrastructure, 47th Annual National Convention of CSI, 2012, McGraw-Hill Proceeding .
[21]N. Dey, P. Das, A. Das and S.S. Chaudhuri, “DWT-DCT-SVD Based Blind Watermarking Technique of Gray Scale Image in Electrooculogram Signal”, International Conference on Intelligent Systems Design and Applications (ISDA-2012), pp. 680-685, 2012.
[22]N. Dey, S. Biswas, P. Das, A. Das, and S. S. Chaudhuri, “Feature Analysis for the Reversible Watermarked Electrooculography Signal using Low Distortion Prediction-error Expansion”, 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS), pp.624-627, 2012.