Advertisement

Abstract

This paper presents an effective video steganography method to protect the transmitted biometric data for secure personal identification. Unlike the most of existing biometric data hiding methods, the hiding content in this work is an image set for guaranteeing the valid identification, but not a single image or feature vector. On the basis of human visual system (HVS) model, both inter-frame and intra-frame motion information are considered to make the hiding method more invisible and robust. Instead of embedding the data redundantly for resisting attacks, the biometric image set is embedded into the video sequence discretely using discrete wavelet transform (DWT). Specially, the sequence number of each frame is embedded into the corresponding frame as a watermark for detecting the integrity of stego-video and guaranteeing the exactly extraction of the biometric image set. Finally, the extracted image set is identified by the biometrics system. Extensive experimental results demonstrate that the proposed method can achieve perfect imperceptibility and good robustness, and guarantee the secure biometrics.

Keywords

Video Steganography Human Visual System Discrete Wavelet Transform Biometrics 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: Secure data hiding in wavelet compressed fingerprint images. In: Proceedings of the 2000 ACM Workshop on Multimedia, pp. 127–130 (2000)Google Scholar
  2. 2.
    Jain, A.K., Uludag, U., Hsu, R.L.: Hiding a face in a fingerprint image. In: Proceeding of the International Conference on Pattern Recognition, vol. 3, pp. 756–759 (2002)Google Scholar
  3. 3.
    Vatsa, M., Singh, R., Noore, A.: Feature based RDWT watermarking for multimodal biometric system. Image and Vision Computing 27, 293–304 (2009)CrossRefGoogle Scholar
  4. 4.
    Noore, A., Singh, R., Vatsa, M., Houck, M.M.: Enhancing security of fingerprints through contextual biometric watermarking. Forensic Science International 169, 188–194 (2007)CrossRefGoogle Scholar
  5. 5.
    Ratha, N.K.: Hiding Biometric Data. IEEE Transaction on Pattern Analysis and Machine Intelligence 25, 1494–1498 (2003)CrossRefGoogle Scholar
  6. 6.
    Khan, M.K., Zhang, J., Tian, L.: Chaotic secure content-based hidden transmission of biometric templates. Chaos, Solitons and Fractal 32, 1749–1759 (2007)CrossRefGoogle Scholar
  7. 7.
    Jung, S., Lee, D., Lee, S., Paik, J.: Biometric Data-based Robust Watermarking Scheme of Video Streams. In: ICICS, pp. 1–5 (2007)Google Scholar
  8. 8.
    Lu, Z., Ge, Q., Niu, X.: Robust adaptive video watermarking in the spatial domain. In: The 5th international symposium on test and measurement, pp. 1875–1880 (2003)Google Scholar
  9. 9.
    Ye, D.P., Zou, C.F., Dai, Y.W., Wang, Z.Q.: A new adaptive watermarking for real-time MPEG videos. Applied Mathematics and Computation 185, 907–918 (2007)zbMATHCrossRefGoogle Scholar
  10. 10.
    Cerin, O., Ozcerit, A.T.: A new steganography algorithm based on color histograms for data embedding into raw video streams. Computers Security 28, 670–682 (2009)CrossRefGoogle Scholar
  11. 11.
    Anderson, C., Burt, P., van der Wal, G.: Change detection and tracking using pyramid transformation techniques. In: Proceedings of SPIE—Intelligent Robots and Computer Vision, vol. 579, pp. 72–78 (1985)Google Scholar
  12. 12.
    Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. IBM Systems J. 35, 3–336 (1996)Google Scholar
  13. 13.
    Tao, P.N., Eskicioglu, A.M.: A robust multiple watermarking scheme in the Discrete Wavelet Transform domai. In: Proc. SPIE, vol. 5601, pp. 133–144 (2004)Google Scholar
  14. 14.
    Li, B., Zheng, C.-H., Huang, D.-S.: Locally linear discriminant embedding: An efficient method for face recognition. Pattern Recognition 41, 3813–3821 (2008)zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Yingqi Lu
    • 1
  • Cheng Lu
    • 1
  • Miao Qi
    • 2
  1. 1.School of Computer Science and TechnologyJilin UniversityChina
  2. 2.School of Computer Science and Information TechnologyNortheast Normal UniversityChina

Personalised recommendations