skip to main content
10.1145/357744.357902acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
Article
Free Access

Secure data hiding in wavelet compressed fingerprint images

Authors Info & Claims
Published:04 November 2000Publication History

ABSTRACT

With the rapid growth of the Internet, electronic commerce revenue now amounts to several billion US dollars. To avoid fraud and misuse, buyers and sellers desire more secure methods of authentication than today's userid and password combinations. Automated biometrics technology in general, and fingerprints in particular, provide an accurate and reliable authentication method. However, fingerprint-based authentication requires accessing fingerprint images scanned remotely at the user's workstation, a potentially weak point in the security system. Stored or synthetic fingerprint images might be fraudulently transmitted, even if the communication channel itself is encrypted. In this paper we describe an algorithm for secure data hiding in wavelet compressed fingerprint images to alleviate this problem. Assuming the image capture device is secure, then only the decompressor on the server can locate the embedded message and thereby validate the submitted image.

References

  1. 1."WSQ Gray-scale Fingerprint Image Compression Specification", U.S. Federal Bureau of Investigation, 1993.Google ScholarGoogle Scholar
  2. 2.C. M. Brislawn, J. N. Bradley, R. J. Onyshczak, and T. Hopper. "The FBI compression standard for digitized fingerprint images", in Proc. of SPIE, Vol. 2847, Denver, Aug. 1996, pages 344-355.Google ScholarGoogle Scholar
  3. 3.C. T. Hsu and J. L. Wu, "Hidden digital watermarks in images", IEEE Trans. on image processing, Vol. 8, No. 1, Jan. 1999, pp. 58-68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding", IBM Systems Journal, Vol. 35, No. 3 & 4, 1996, pp. 313-335. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.N. Memon and P. W. Wong, "Protecting digital media content", Communication of the ACM, Vol. 41, No. 7, July 1998, pp. 35-43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.S. Mallat, "Wavelets for vision", Proc. of the IEEE, Vol. 84, No. 4, April 1996, pp. 604-614.Google ScholarGoogle ScholarCross RefCross Ref
  7. 7.M. D. Swanson, M. Kobayashi and A. H. Tewfik, "Multi-media data embedding and watermarking technologies", Proc. of the IEEE, Vol. 86, No. 6, June 1998, pp. 1064-1087.Google ScholarGoogle ScholarCross RefCross Ref
  8. 8.F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information Hiding - A survey", Proc. of the IEEE, Vol. 87, No. 7, July 1999, pp. 1062-1078.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Secure data hiding in wavelet compressed fingerprint images

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                MULTIMEDIA '00: Proceedings of the 2000 ACM workshops on Multimedia
                November 2000
                248 pages
                ISBN:1581133111
                DOI:10.1145/357744

                Copyright © 2000 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 4 November 2000

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                Overall Acceptance Rate995of4,171submissions,24%

                Upcoming Conference

                MM '24
                MM '24: The 32nd ACM International Conference on Multimedia
                October 28 - November 1, 2024
                Melbourne , VIC , Australia

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader