Abstract
Biometric authentication ensures user identity by means of users’ biometric traits. Though biometrics is unique and secure, it can be still stolen or misused by any adversary. In this paper we propose a secure and privacy preserving biometric authentication scheme using watermarking technique. Watermarking is used for content authentication, copyright management, tamper detection, etc. We watermark the user’s face image with finger print and encrypt the watermarked biometric to protect its privacy from adversary. The watermarked biometric technique has been used for privacy preserving authentication purpose. The analysis proves the correctness, privacy and efficiency of our scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Riha, Z.: Toward reliable user authentication through biometrics. IEEE Secur. Priv. 1(3), 45–49 (2003)
Katzenbeisser, S.: On the integration of watermarks and cryptography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 50–60. Springer, Heidelberg (2004)
Huang, X., et al.: A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390–1397 (2011)
Tuyls, P., Akkermans, A.H., Kevenaar, T.A., Schrijen, G.-J., Bazen, A.M., Veldhuis, R.N.: Practical biometric authentication with template protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 436–446. Springer, Heidelberg (2005)
Fierrez-Aguilar, J., et al.: Discriminative multimodal biometric authentication based on quality measures. Pattern Recogn. 38(5), 777–779 (2005)
Ahonen, T., Hadid, A., Pietikainen, M.: Face description with local binary patterns: application to face recognition. IEEE Trans. Pattern Anal. Mach. Intell. 28(12), 2037–2041 (2006)
Kumar, A., et al.: Personal verification using palmprint and hand geometry biometric. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 668–678. Springer, Heidelberg (2003)
Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)
Inamdar, V.S., Rege, P.P.: Face features based biometric watermarking of digital image using singular value decomposition for fingerprinting. Int. J. Secur. Appl. 6(2), 47–60 (2012)
Arya, M., Siddavatam, R.: A novel biometric watermaking approach using LWT- SVD. In: Das, V.V., Thomas, G., Lumban Gaol, F. (eds.) AIM 2011. CCIS, vol. 147, pp. 123–131. Springer, Heidelberg (2011)
Dogan, S., et al.: A robust color image watermarking with singular value decomposition method. Adv. Eng. Softw. 42(6), 336–346 (2011)
Chang, C.-C., Yih-Shin, H., Tzu-Chuen, L.: A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn. Lett. 27(5), 439–446 (2006)
Mehta, G., Dutta, M.K., Kim, P.S.: An efficient & secure encryption scheme for biometric data using holmes map & singular value decomposition. In: 2014 International Conference on Medical Imaging, m-Health and Emerging Communication Systems (MedCom). IEEE (2014)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31(4), 469–472 (1985)
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Golub, G.H., Reinsch, C.: Singular value decomposition and least squares solutions. Numer. Math. 14(5), 403–420 (1970)
Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Trans. Signal Process. 51(4), 981–995 (2003)
Cox, I.J., Doërr, G., Furon, T.: Watermarking is not cryptography. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 1–15. Springer, Heidelberg (2006)
http://www.mathworks.com/matlabcentral/fileexchange/17032-pca-based-face-recognition-system
Satish Chandra, D.V.: Digital image watermarking using singular value decomposition. In: The 2002 45th Midwest Symposium on Circuits and Systems, MWSCAS 2002, vol. 3. IEEE (2002)
Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36–54. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Pal, D., Khethavath, P., Thomas, J.P., Chen, T. (2015). Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-22915-7_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22914-0
Online ISBN: 978-3-319-22915-7
eBook Packages: Computer ScienceComputer Science (R0)