Skip to main content

Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques

  • Conference paper
  • 1159 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2))

Abstract

As user authentication by using biometric information such as fingerprint has been widely accepted, there has been a growing interest in protecting the biometric information itself against external attackers. Especially, as the mobile handheld devices equipped with fingerprint sensors are produced, it becomes important to protect the private information of an user(i.e., fingerprint image) in the remote applications. In this paper, we propose an energy-efficient technique to transmit fingerprint images from the handheld device to a server securely using both encryption and fingerprinting. In addition to the encryption to guarantee the confidentiality of the fingerprint image transmitted, we insert the logo of the application into the fingerprint image(i.e., fingerprinting) to indicate to whom the fingerprint image is transmitted(i.e., a possible privacy violator). In particular, to lower the computational burden of the handheld device, we not only offload some heavy computation to the server without compromising the security, but also apply some techniques to the handheld device such as loop transformation and data compaction. Based on experimental results, we confirm that our technique can transmit fingerprint images from the handheld device in an energy-efficient way(by a factor of 2) and detect the intentional/unintentional leakage of the transmitted fingerprint image from the server – privacy violator.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  2. Prabhakar, S., Pankanti, S., Jain, A.: Biometric Recognition: Security and Privacy Concerns, pp. 33–42. IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  3. Stalling, W.: Cryptography and Network Security. Pearson Ed. Inc. (2003)

    Google Scholar 

  4. Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

  5. Korea Information Security Agency: A Guideline to the Security of Biometric Data (in Korean) (2005)

    Google Scholar 

  6. Moon, D., et al.: Performance Analysis of the Match-on-Card System for the Fingerprint Authentication. In: Proc. of International Workshop on Information Security Applications, pp. 449–459 (2001)

    Google Scholar 

  7. Ratha, N., Bolle, R.: Automatic Fingerprint Recognition Systems. Springer, Heidelberg (2004)

    Book  Google Scholar 

  8. Jain, A., Uludag, U.: Hiding Fingerprint Minutiae in Images. In: Proc. of AutoID, pp. 97–102 (2002)

    Google Scholar 

  9. Jain, A., Uludag, U., Hsu, R.: Hiding a Face in a Fingerprint Image. In: Proc. of ICPR, pp. 756–759 (2002)

    Google Scholar 

  10. Yeung, M., Pankanti, S.: Verification Watermarks on Fingerprint Recognition and Retrieval. Journal of Electronic Imaging 9, 468–476 (2000)

    Article  Google Scholar 

  11. Gunsel, B., Uludag, U., Tekalp, A.: Robust Watermarking of Fingerprint Images. Pattern Recognition 35, 2739–2747 (2002)

    Article  MATH  Google Scholar 

  12. Chung, Y., et al.: Hiding Biometric Data for Secure Transmission. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1049–1057. Springer, Heidelberg (2005)

    Google Scholar 

  13. Kim, T., et al.: Secure Remote Fingerprint Verification using Dual Watermarks. In: Safavi-Naini, R., Yung, M. (eds.) DRMTICS 2005. LNCS, vol. 3919, pp. 217–227. Springer, Heidelberg (2006)

    Google Scholar 

  14. Dugad, R., Ratakonda, K., Ahuja, N.: A New Wavelet-based Scheme for Watermarking Images. In: Proc. of the ICIP (1998)

    Google Scholar 

  15. Ye, W., Vijaykrishnan, N., Kandemir, M., Irwin, M.J.: The Design and Use of SimplePower: A Cycle-Accurate Energy Estimation Tool*. In: Annual ACM IEEE Design Automation Conference, pp. 340–345 (2000)

    Google Scholar 

  16. Hennessy, J., Patterson, D.: Computer Architecture – A Quantitative Approach. Morgan Kaufmann, San Francisco (2007)

    Google Scholar 

  17. Intel: Intel StrongARM* SA-1110 Microprocessor (2000)

    Google Scholar 

  18. NiGen: http://www.nitgen.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

De-Shuang Huang Laurent Heutte Marco Loog

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, H., Lee, S., Moon, D., Chung, Y. (2007). Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques. In: Huang, DS., Heutte, L., Loog, M. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques. ICIC 2007. Communications in Computer and Information Science, vol 2. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74282-1_96

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74282-1_96

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74281-4

  • Online ISBN: 978-3-540-74282-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics