Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication
Numerous security issues are raised through the transmission and storage of biometric data due to its high sensitivity and extremely crucial purpose. However, it might be impossible to recover if lost, counterfeited or hacked, thereby ruining the general aim of securing it. In this paper, an 8-layered feature enhancement algorithm is proposed. A centroid based semi-fragile audio watermarking is used to conceal the enhanced fingerprint biometric data into audio signals. The algorithm starts by encrypting our enhanced/extracted fingerprint template and converting it into binary bits prior to watermarking. It hence proceeds with computing the centroid of each audio frame and once more encrypting the obtained watermark using a Logistic map operation. DWT and DCT are performed on the sub-band which carries the centroid of audio thereby embedding the encrypted watermark bits into the domain signal. ODG and SDG analysis are performed on both the original and watermarked signal and the results signify the efficiency of the proposed scheme. Moreover, some signal processing operations are finally carried out on the watermarked signal and the outcome was intriguing as all attacks are counteracted.
KeywordsBiometrics Fingerprint feature Embedding Identity authentication Watermarking
This work was supported by the National Science Foundation of China (NSFC) under the grant No. U1536110.
- 6.Mohammed, A., Fengling, H., Ron, V.: Fingerprint image watermarking approach using DTCWT without corrupting minutiae. In: IEEE 6th International Congress on Image and Signal Processing (CISP), vol. 3, pp. 1717–1723 (2013)Google Scholar
- 7.Arashdeep, K., Malay, K.D., Soni, K.M., Nidhi, T.: A secure and high payload digital audio watermarking using features from iris image. In: IEEE International Conference on Contemporary Computing and Informatics (IC3I), pp. 509–512 (2014)Google Scholar
- 8.Anil, K., Arun, A., Karthik, N.: Introduction to Biometrics. Springer, Heidelberg (2011). ISBN 978-0-387-77325-4Google Scholar
- 9.Anush, S., Mayank, V., Richa, S.: Latent fingerprint matching: a survey. IEEE Access. IEEE Biom. Compendium RFIC Virtual J. 2, 982–1004 (2014)Google Scholar
- 12.Milos, V., Brankica, M., Andelija, M., Dragan, R.: Improving minutiae extraction in fingerprint images through robust enhancement. In: IEEE Conference on 21st Telecommunication Forum (TELFOR), pp. 506–509 (2013)Google Scholar
- 13.Ravi, K., Sai, K., Rajendra, P., Subba, R., Ravi, P.: Fingerprint minutia match using bifurcation technique. Int. J. Comput. Sci. Commun. Netw. 2(4), 478–486 (2012)Google Scholar
- 17.Abraham, J., Kwan, P., Gao, J.: Fingerprint matching using a hybrid shape and orientation descriptor. State of the Art in Biometrics (2011). ISBN 978-953-307-489-4Google Scholar
- 20.International Telecommunication Union. Method for objective measurements of perceived audio quality (PAEQ) ITU-RBS.1387-1, Geneva, Switzerland (1998–2001)Google Scholar
- 21.Giang, M., Wu, X., Hua, Q.: A fast thinning algorithm for fingerprint image. In: 1st International Conference on Information Science and Engineering (ICISE), pp. 1039–1042 (2009)Google Scholar
- 22.Jianchun, H., Jinjun, B.: Normalization of fingerprint image using the local feature. In: International Conference on Computer Science and Service System, pp. 1643–1646 (2012)Google Scholar