Skip to main content
Log in

A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Biometric security is a fast growing area that gains an increasing interest in the last decades. Digital encryption and hiding techniques provide an efficient solution to protect biometric data from accidental or intentional attacks. In this paper, a highly secure encryption/hiding scheme is proposed to ensure secure transmission of biometric data in multimodal biometric identification/authentication system. The secret fingerprint and iris vectors are sparsely approximated using accelerated iterative hard thresholding technique and then embedded in the host Slantlet-SVD domain of face image. Experiments demonstrate the efficiency of our technique for both encryption and hiding purpose, where the secret biometric information is well encrypted and still extractable with high fidelity even though the carrier image is seriously corrupted. Our experimental results show the efficiency of the proposed technique in term of robustness to attacks, Invisibility, and security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Agarwal H, Raman B, Venkat I (2015) Blind reliable invisible watermarking method in wavelet domain for face image watermark. Multimedia Tools and Applications 74(17):6897–6935

    Article  Google Scholar 

  2. Agrawal N, Savvides M (2009) Biometric data hiding: a 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching. In: 2009 IEEE computer society conference on computer vision and pattern recognition workshops. IEEE, pp 85–92

  3. Bala BK, Joanna JL (2014) Multi modal biometrics using cryptographic algorithm. Eur J Acad Essays 1(1):6–10

    Google Scholar 

  4. Barni M, Droandi G, Lazzeretti R (2015) Privacy protection in biometric-based recognition systems: a marriage between cryptography and signal processing. IEEE Signal Proc Mag 32(5):66–76

    Article  Google Scholar 

  5. Bhatnagar G, Wu Q (2014) Biometric inspired multimedia encryption based on dual parameter fractional fourier transform. IEEE Trans Syst Man Cybern Syst 44(9):1234–1247

    Article  Google Scholar 

  6. Bhatnagar G, Wu QJ (2015) A novel chaos-based secure transmission of biometric data. Neurocomputing 147:444–455

    Article  Google Scholar 

  7. Blumensath T (2012) Accelerated iterative hard thresholding. Signal Process 92(3):752–756

    Article  Google Scholar 

  8. CASIA-Iris Twins. National Laboratory of Pattern Recognition (NLPR) Institute of Automation, C.A.o.S.C.:

  9. Chang CC, Tsai P, Lin CC (2005) Svd-based digital image watermarking scheme. Pattern Recogn Lett 26(10):1577–1586

    Article  Google Scholar 

  10. Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727–752

    Article  MATH  Google Scholar 

  11. Chourasia J (2013) Identification and authentication using visual cryptography based fingerprint watermarking over natural image. CSI Trans ICT 1(4):343–348

    Article  Google Scholar 

  12. Chung Y, Moon D, Moon K, Pan S (2005) Hiding biometric data for secure transmission. In: Knowledge-based intelligent information and engineering systems. Springer, pp 178–178

  13. Cox IJ, Miller ML (2002) The first 50 years of electronic watermarking. EURASIP J Adv Signal Process 2002(2):1–7

    Article  MATH  Google Scholar 

  14. Dutta MK, Singh A, Burget R (2015) Digital ownership tags based on biometric features of iris and fingerprint for content protection and ownership of digital images and audio signals. Multimedia Tools and Applications:1–27

  15. Elad M, Aharon M (2006) Image denoising via sparse and redundant representations over learned dictionaries. IEEE Trans Image Process 15(12):3736–3745

    Article  MathSciNet  Google Scholar 

  16. Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724

    Article  MathSciNet  MATH  Google Scholar 

  17. George RM (2013) Facial template protection using extended visual cryptography and chaotic encryption, vol 1

  18. Georgia Tech Face Database: http://www.anefian.com/research/face_reco.htm

  19. Huang K, Aviyente S (2006) Sparse representation for signal classification. In: Advances in neural information processing systems, pp 609–616

  20. Jain A, Hong L, Bolle R (1997) On-line fingerprint verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(4):302–314

    Article  Google Scholar 

  21. Jain AK, Uludag U (2003) Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(11):1494–1498

    Article  Google Scholar 

  22. Jain AK, Uludag U, Hsu RL (2002) Hiding a face in a fingerprint image. In: Proceedings 16th international conference on pattern recognition, 2002, vol 3. IEEE, pp 756–759

  23. Kaur H, Khanna P (2015) Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimedia Tools and Applications:1–29

  24. Kester QA, Nana L, Pascu AC, Gire S, Eghan J, Quaynor NN (2014) Feature based encryption technique for securing forensic biometric image data using aes and visual cryptography. In: 2014 2nd international conference on artificial intelligence, modelling and simulation (AIMS). IEEE, pp 199– 204

  25. Koliwad S (2009) A comprehensive survey of contemporary researches in watermarking for copyright protection of digital images. IJCSNS 9(4):91

    Google Scholar 

  26. Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1-2):201–211

    Article  MathSciNet  Google Scholar 

  27. Lee H, Battle A, Raina R, Ng AY (2007) Efficient sparse coding algorithms. Advances in Neural Information Processing Systems 19:801

    Google Scholar 

  28. Liew CZ, Shaw R, Li L (2014) Protect biometric data with compound chaotic encryption. Security and Communication Networks

  29. Ma B, Wang Y, Li C, Zhang Z, Huang D (2014) Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking. Multimedia Tools and Applications 72(1):637– 666

    Article  Google Scholar 

  30. Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) Fvc2002: second fingerprint verification competition. In: Proceedings of 16th international conference on pattern recognition, 2002, vol 3. IEEE, pp 811–814

  31. Marqués I., Graña M. (2012) Image security and biometrics: a review. In: International conference on hybrid artificial intelligence systems. Springer, pp 436–447

  32. Marwaha P, Marwaha P (2010) Visual cryptographic steganography in images. In: 2010 international conference on computing communication and networking technologies (ICCCNT). IEEE, pp 1–6

  33. Mohanty SP (1999) Digital watermarking: a tutorial review. http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey1999Mohanty.pdf

  34. Nair SAH, Aruna P (2015) Comparison of dct, svd and bfoa based multimodal biometric watermarking systems. Alexandria Eng J 54(4):1161–1174

    Article  Google Scholar 

  35. Nematollahi MA, Gamboa-Rosales H, Martinez-Ruiz FJ, Jose I, Al-Haddad S, Esmaeilpour M (2016) Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition. Multimedia Tools and Applications:1–31

  36. Oliveira Filho DL, Santiago OG, Canuto AM, Bedregal BR, et al (2013) A comparative analysis of cryptographic algorithms and transformation functions for biometric data. In: 2013 12th international conference on Machine learning and applications (ICMLA), vol 2. IEEE, pp 255–260

  37. Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062–1078

    Article  Google Scholar 

  38. Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on smvq and image inpainting. IEEE Trans Image Process 23(3):969–978

    Article  MathSciNet  MATH  Google Scholar 

  39. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Article  Google Scholar 

  40. Rabil BS, Tliba S, Granger E, Sabourin R (2013) Securing high resolution grayscale facial captures using a blockwise coevolutionary ga. Expert Syst Appl 40(17):6693–6706

    Article  Google Scholar 

  41. Saini N, Sinha A (2013) Biometrics based key management of double random phase encoding scheme using error control codes. Opt Lasers Eng 51(8):1014–1022

    Article  Google Scholar 

  42. Selesnick IW (1999) The slantlet transform. IEEE Trans Signal Process 47(5):1304–1313

    Article  MathSciNet  MATH  Google Scholar 

  43. Shaw AK, Majumder S, Sarkar S, Sarkar SK (2013) A novel emd based watermarking of fingerprint biometric using gep. Procedia Technology 10:172–183

    Article  Google Scholar 

  44. Singh A, Kishore Dutta M, Travieso CM, Soni K (2014) Digital right management control for joint ownership of digital images using biometric features. In: 2014 international conference on signal processing and integrated networks (SPIN). IEEE, pp 164–167

  45. Suzuki H, Takeda M, Obi T, Yamaguchi M, Ohyama N, Nakano K (2014) Encrypted sensing for enhancing security of biometric authentication. In: 2014 13th workshop on Information optics (WIO). IEEE, pp 1–3

  46. Vatsa M, Singh R, Noore A (2009) Feature based rdwt watermarking for multimodal biometric system. Image Vis Comput 27(3):293–304

    Article  Google Scholar 

  47. Vatsa M, Singh R, Noore A, Houck MM, Morris K (2006) Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 3(2):23–28

    Article  Google Scholar 

  48. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  49. Whitelam C, Osia N, Bourlai T (2013) Securing multimodal biometric data through watermarking and steganography. In: 2013 IEEE international conference on technologies for homeland security (HST). IEEE, pp 61–66

  50. Wright J, Ma Y, Mairal J, Sapiro G, Huang TS, Yan S (2010) Sparse representation for computer vision and pattern recognition. Proc IEEE 98(6):1031–1044

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eyad Ben Tarif.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tarif, E.B., Wibowo, S., Wasimi, S. et al. A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system. Multimed Tools Appl 77, 2485–2503 (2018). https://doi.org/10.1007/s11042-016-4280-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4280-7

Keywords

Navigation