Skip to main content

Protecting Biometric Data for Personal Identification

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3338))

Abstract

This paper presents a new chaotic watermarking and steganography method to protect biometric data, which is sent over the networks for personal identification. Unlike other methods, we utilized two keys, one for encrypting the biometric template before embedding, which makes our method more secure and another for watermark embedding that makes our method more robust. The proposed method does not require original biometric image for the extraction of watermarked data, and can provide high accuracy of extracted watermarked data even under different noises and distortions. Experimental results show that the performance of the proposed method is encouraging comparable with other methods found in the current literature and can be used in a practical system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Muhammad, K.K., Zhang, J.: Optimizing WLAN Security by Biometrics. In: Ilyas, M. (ed.) Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards (In Press), CRC Press, Boca Raton (2004)

    Google Scholar 

  2. Daugman, J.: High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Transactions on PAMI 15(11), 1148–1161 (1993)

    Google Scholar 

  3. Jain, A.K., Uludag, U.: Hiding Biometric Data. IEEE Transaction on Pattern Analysis and Machine Intelligence 25(11), 1494–1498 (2003)

    Article  Google Scholar 

  4. Gunsel, B., Uludag, U., Tekalp, A.M.: Robust Watermarking of Fingerprint Images. Pattern Recognition 35(12), 2739–2747 (2002)

    Article  MATH  Google Scholar 

  5. Sonia, J.: Digital Watermarking Techniques: A Case Study in Fingerprints and Faces. In: Proc. Indian Conference on Computer Vision, Graphics, and Image Processing, pp. 139–144 (2000)

    Google Scholar 

  6. Pankanti, S., Yeung, M.M.: Verification Watermarks on Fingerprint Recognition and Retrieval. In: Proc. SPIE, vol. (3657), pp. 66–78 (1999)

    Google Scholar 

  7. Zhang, J., Tian, L., Tai, H.M.: A New Watermarking Method Based on Chaotic Maps. In: Proc. IEEE ICME 2004 (2004)

    Google Scholar 

  8. Zhao, D., Chen, G., Liu, W.: A Chaos-based Robust Wavelet-domain Watermarking Algorithm. Chaos, Solitons, and Fractals 22(12), 47–54 (2004)

    MATH  Google Scholar 

  9. Hong, I., Kim, I., Han, S.S.: A Blind Watermarking Technique Using Wavelet Transform. Proc. ISIE Korea (3), 1946–1950 (2001)

    Google Scholar 

  10. CASIA Iris Database Online (September 2004), http://www.sinobiometrics.com

  11. Uludag, U., Gunsel, B., Tekalp, A.M.: Robust Watermarking of Busy Images. In: Proceedings of SPIE Electronic Imaging Conference, Security and Watermarking of Multimedia Contents, vol. (4314), pp. 18–25 (2001)

    Google Scholar 

  12. Deguillaume, F., Voloshynovskiy, S., Pun, T.: Secure Hybrid Robust Watermarking Resistant Against Tampering and Copy Attack. In: Signal Processing, vol. (83), pp. 2133–2170. Elsevier Science Ltd., Amsterdam (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khan, M.K., Zhang, J., Tian, L. (2004). Protecting Biometric Data for Personal Identification. In: Li, S.Z., Lai, J., Tan, T., Feng, G., Wang, Y. (eds) Advances in Biometric Person Authentication. SINOBIOMETRICS 2004. Lecture Notes in Computer Science, vol 3338. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30548-4_72

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30548-4_72

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24029-7

  • Online ISBN: 978-3-540-30548-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics