Abstract
This paper presents a new chaotic watermarking and steganography method to protect biometric data, which is sent over the networks for personal identification. Unlike other methods, we utilized two keys, one for encrypting the biometric template before embedding, which makes our method more secure and another for watermark embedding that makes our method more robust. The proposed method does not require original biometric image for the extraction of watermarked data, and can provide high accuracy of extracted watermarked data even under different noises and distortions. Experimental results show that the performance of the proposed method is encouraging comparable with other methods found in the current literature and can be used in a practical system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Muhammad, K.K., Zhang, J.: Optimizing WLAN Security by Biometrics. In: Ilyas, M. (ed.) Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards (In Press), CRC Press, Boca Raton (2004)
Daugman, J.: High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Transactions on PAMI 15(11), 1148–1161 (1993)
Jain, A.K., Uludag, U.: Hiding Biometric Data. IEEE Transaction on Pattern Analysis and Machine Intelligence 25(11), 1494–1498 (2003)
Gunsel, B., Uludag, U., Tekalp, A.M.: Robust Watermarking of Fingerprint Images. Pattern Recognition 35(12), 2739–2747 (2002)
Sonia, J.: Digital Watermarking Techniques: A Case Study in Fingerprints and Faces. In: Proc. Indian Conference on Computer Vision, Graphics, and Image Processing, pp. 139–144 (2000)
Pankanti, S., Yeung, M.M.: Verification Watermarks on Fingerprint Recognition and Retrieval. In: Proc. SPIE, vol. (3657), pp. 66–78 (1999)
Zhang, J., Tian, L., Tai, H.M.: A New Watermarking Method Based on Chaotic Maps. In: Proc. IEEE ICME 2004 (2004)
Zhao, D., Chen, G., Liu, W.: A Chaos-based Robust Wavelet-domain Watermarking Algorithm. Chaos, Solitons, and Fractals 22(12), 47–54 (2004)
Hong, I., Kim, I., Han, S.S.: A Blind Watermarking Technique Using Wavelet Transform. Proc. ISIE Korea (3), 1946–1950 (2001)
CASIA Iris Database Online (September 2004), http://www.sinobiometrics.com
Uludag, U., Gunsel, B., Tekalp, A.M.: Robust Watermarking of Busy Images. In: Proceedings of SPIE Electronic Imaging Conference, Security and Watermarking of Multimedia Contents, vol. (4314), pp. 18–25 (2001)
Deguillaume, F., Voloshynovskiy, S., Pun, T.: Secure Hybrid Robust Watermarking Resistant Against Tampering and Copy Attack. In: Signal Processing, vol. (83), pp. 2133–2170. Elsevier Science Ltd., Amsterdam (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khan, M.K., Zhang, J., Tian, L. (2004). Protecting Biometric Data for Personal Identification. In: Li, S.Z., Lai, J., Tan, T., Feng, G., Wang, Y. (eds) Advances in Biometric Person Authentication. SINOBIOMETRICS 2004. Lecture Notes in Computer Science, vol 3338. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30548-4_72
Download citation
DOI: https://doi.org/10.1007/978-3-540-30548-4_72
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24029-7
Online ISBN: 978-3-540-30548-4
eBook Packages: Computer ScienceComputer Science (R0)