Abstract
Data hiding techniques can be employed to enhance the security of biometrics-based authentication systems. In our previous work, we proposed a method to hide challenge responses in a WSQ-compressed fingerprint image. In this paper, we extend the work to analyze the security holes in the data hiding method and enhance the hiding technique to thwart attacks on the system. We employ several proven IT security techniques to provide a secure method of hiding responses in fingerprint images. The technique presented here can be used in hiding responses in other biometrics with minor changes to suit the domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fingerprint Verification Competition (2000), http://bias.csr.unibo.it/fvc2000
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3 & 4), 313–335 (1996)
Boliek, M., Christopoulos, C., Majani, E.: JPEG2000 Part I Final Draft International Standard. Number ISO/IEC FDIS 15444-1. ISO/IEC JTC1/SC29/WG1 N1855 (August 2000)
Brislawn, C.M., Bradley, J.N., Onyshezak, R.J., Hopper, T.: The FBI compression standard for digitized fingerprint images. In: Proc. SPIE, Denver, CO, August 1996, vol. 2847, pp. 344–355 (1996)
Brislawn, C.M., Bradley, J.N., Hopper, T.: The FBI Wavelet/Scalar Quantization Standard for gray-scale fingerprint image compression
FBI. WSQ Gray-Scale Fingerprint Image Compression Specification. Document No. IAFIS-IC-0110 (v2) (February 1993); Drafted by T. Hopper, C. M. Brislawn and J. N. Bradley
Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. on Image Processing 8(1), 58–68 (1999)
Jain, A.K., Uludag, U.: Hiding Biometric Data. IEEE Trans. on Pattern Analysis and Machine Intelligence 25(11), 1494–1498 (2003)
Kobayashi, M., Swanson, M.D., Tewfik, A.H.: Multimedia Data Embedding and Watermarking Technologies 86(6), 1064–1087 (June 1998)
Moulin, P., Mihcak, M.K.: A Framework for Evaluating the Data-Hiding Capacity of Image Sources. IEEE Trans. on Image Processing 11(9), 1029–1042 (2002)
Petitcolas, F.A., Anderson, R.J., Kuhn, M.G.: Information Hiding - A Survey 87(7), 1062–1078 (July 1999)
Ramkumar, M., Akansu, A.N.: Capacity Estimates for Data-Hiding in Compressed Images. IEEE Trans. on Image Processing 10(8), 1252–1263 (2001)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Secure Data Hiding in Wavelet Compressed Fingerprint Images. In: Proc. ACM Multimedia, Marina del Rey, CA, October 2000, pp. 127–130 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ratha, N.K., Figueroa-Villanueva, M.A., Connell, J.H., Bolle, R.M. (2004). A Secure Protocol for Data Hiding in Compressed Fingerprint Images. In: Maltoni, D., Jain, A.K. (eds) Biometric Authentication. BioAW 2004. Lecture Notes in Computer Science, vol 3087. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25976-3_19
Download citation
DOI: https://doi.org/10.1007/978-3-540-25976-3_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22499-0
Online ISBN: 978-3-540-25976-3
eBook Packages: Springer Book Archive