Abstract
This paper presents a novel fingerprint-biometric template protection scheme, in which templates are concealed into audio signals. Fingerprint templates are encrypted by chaotic encryption and then hid into the chaotically selected random sampling points of the host audio signal by a new non-uniform discrete Fourier transform (NDFT)-based data hiding method. The template extraction process is completely blind and does not require original audio signal, thus the extraction depends on the secret key. Experimental results show that the proposed scheme is robust against common signal processing attacks and achieves higher verification accuracy.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Anil, K.J., Prabhakar, S., Hong, L., Pankanti, S.: Filterbank-based fingerprint matching. IEEE Transactions On Image Processing 9, 846–859 (2000)
Anil, K.J., Pankanti, S., Bolle, R.: Biometrics: Personal Identification in Networked Society. Kluwer, USA (1999)
Khan, M.K., Jiashu, Z., Lei, T.: Chaotic secure content-based hidden transmission of biometrics templates. Chaos, Solitons, and Fractals, Elsevier Science 32(5), 1749–1759 (2007)
Anil, K.J., Prabhakar, S., Hong, L.: A multichannel approach to fingerprint classification. IEEE Transactions on Pattern Analysis and Machine Intelligence 21, 348–359 (1999)
Daugman, J.: High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15, 1148–1161 (1999)
Anil, K.J., Umut, U.: Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 1494–1498 (2003)
Gunsel, B., Umut, U., Tekalp, A.M.: Robust watermarking of fingerprint images. Pattern Recognition, Elsevier Science Ltd. 35, 2739–2747 (2002)
Khan, M.K., Jiashu, Z., Lei, T.: Protecting biometric data for personal identification. In: Li, S.Z., Lai, J.-H., Tan, T., Feng, G.-C., Wang, Y. (eds.) SINOBIOMETRICS 2004. LNCS, vol. 3338, pp. 629–638. Springer, Heidelberg (2004)
Ratha, N., Connell, J., Bolle, R.: Enhancing security and privacy in biometrics-based authentication systems. IBM System Journal 40, 614–634 (2001)
Davida, G.I., Frankel, Y., Matt, B.J.: On enabling secure applications through online biometric identification. In: IEEE Symposium on Security and Privacy, pp. 148–157 (1998)
Davida, G.I., Frankel, Y., Matt, B.J., Peralta, R.: On the relation of error correction and cryptography to an offline biometric based identification scheme. In: Proc. Workshop Coding and Cryptography, pp. 129–138 (1999)
Soutar, C., Roberge, D., Stojanov, S.A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric encryption using image processing. In: Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178–188 (1998)
Soutar, C., Roberge, D., Stojanov, S.A, Gilroy, R., Vijaya Kumar, B.V.K.: Biometric encryption, enrollment and verification procedures. In: Proc. SPIE, Optical Pattern Recognition IX, vol. 3386, pp. 24–35 (1998)
Andy, A.: Vulnerabilities in biometric encryption systems. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, Springer, Heidelberg (2005)
Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proc. of the 4th Int. Conf. on Audio and Video Based Biometric Person Authentication, pp. 393-402, UK (2004)
Verbitskiy, E., Tuyls, P., Denteneer, D., Linnartz, J.P.: Reliable biometric authentication with privacy protection. In: Proc. of the 24th Symposium on Inf. Theory, pp. 125–132 (2003)
Tuyls, P., Gosling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92, 948–960 (2004)
Yeung, M.M., Pankanti, S.: Verification watermarks on fingerprint recognition and retrieval. Journal of Electronic Imaging 9, 468–476 (2000)
Sonia, J.: Digital watermarking techniques: a case study in fingerprints and faces. In: Proc. Indian Conference on Computer Vision, Graphics, and Image Processing, pp. 139–144 (2000)
Andrew, D.K.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12, 441–444 (2005)
Bagchi, S., Mitra, S.K.: The Nonuniform Discrete Fourier Transform and its application in filter design. IEEE Trans. on Circuits and System: Analog and Digital Signal Processing 43, 422–433 (1996)
Ling, X., Jiashu, Z., Hong-Jie, H.: NDFT-based Audio Watermarking Scheme with High Security. In: IEEE ICPR, vol. 4, pp. 270–273 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khan, M.K., Xie, L., Zhang, J. (2007). Robust Hiding of Fingerprint-Biometric Data into Audio Signals. In: Lee, SW., Li, S.Z. (eds) Advances in Biometrics. ICB 2007. Lecture Notes in Computer Science, vol 4642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74549-5_74
Download citation
DOI: https://doi.org/10.1007/978-3-540-74549-5_74
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74548-8
Online ISBN: 978-3-540-74549-5
eBook Packages: Computer ScienceComputer Science (R0)