Skip to main content
Erschienen in:
Buchtitelbild

2014 | OriginalPaper | Buchkapitel

Image and Template Security for Palmprint

verfasst von : Munaga V. N. K. Prasad, B. Adinarayana

Erschienen in: Intelligent Computing, Networking, and Informatics

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The wide spread use of biometrics in real world causes more security and privacy concerns to be raised, because conventional biometric systems store biometric templates as it is in database without any security, and this may lead to the possibility of tracking personal information stored in database; moreover, biometric templates are not revocable and are unusable throughout their life time once they are lost or stolen. To overcome this non-revocability of biometrics, we proposed two methods for image security and template security in this paper (these methods are also applicable for some of the biometric traits); for image security, we used chaotic mixing with watermarking technique; first chaotic mixing is applied to the host image, and then, this resultant image is embedded in a sample (cover or carrier) image, and if the intruder gets the chaotic mixed image, he/she cannot get back the original host image, and for template security, we shuffled the palmprint template according to the input random number. This shuffling scheme increases the imposter matching score leaving genuine matching score.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Huang, D.S., Jia, W., Zang, D.: Palmprint verification based on principal lines. Pattern Recogn. 41(4) (2008) Huang, D.S., Jia, W., Zang, D.: Palmprint verification based on principal lines. Pattern Recogn. 41(4) (2008)
2.
Zurück zum Zitat Laadjel, M., Bouridane, A., Kurugollu, F., Boussakta, S.: Palmprint recognition using Fisher-Gabor feature extraction. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICSSP), pp. 1709–1712 (2008) Laadjel, M., Bouridane, A., Kurugollu, F., Boussakta, S.: Palmprint recognition using Fisher-Gabor feature extraction. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICSSP), pp. 1709–1712 (2008)
3.
Zurück zum Zitat Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. (End-to-End Security), 40 (2001) Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. (End-to-End Security), 40 (2001)
4.
Zurück zum Zitat Kong, A., Zhang, D., Kamel, M.: Three measures for secure palmprint identification. Pattern Recogn. 41 (2008) Kong, A., Zhang, D., Kamel, M.: Three measures for secure palmprint identification. Pattern Recogn. 41 (2008)
5.
Zurück zum Zitat Wu, L., Yuan, S.: A face based fuzzy vault scheme for secure online authentication. In: Second International Symposium on Data, Privacy and E-Commerce (ISDPE), Nov 2010, pp. 45–49 Wu, L., Yuan, S.: A face based fuzzy vault scheme for secure online authentication. In: Second International Symposium on Data, Privacy and E-Commerce (ISDPE), Nov 2010, pp. 45–49
6.
Zurück zum Zitat Wang, Z., Wang, S., Ding, Q.: A secure face recognition algorithm based on adaptive non-uniform quantization. In: First International Conference on Pervasive Computing, Signal Processing and Applications (PCSPA), pp. 1115–1118 (2010) Wang, Z., Wang, S., Ding, Q.: A secure face recognition algorithm based on adaptive non-uniform quantization. In: First International Conference on Pervasive Computing, Signal Processing and Applications (PCSPA), pp. 1115–1118 (2010)
7.
Zurück zum Zitat Chen, B., Chandran, V.: Biometric template security using higher order spectra. In: IEEE International Conference On Acoustics Speech and Signal Processing (ICASSP), pp. 1730–1733 (2010) Chen, B., Chandran, V.: Biometric template security using higher order spectra. In: IEEE International Conference On Acoustics Speech and Signal Processing (ICASSP), pp. 1730–1733 (2010)
8.
Zurück zum Zitat Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55, 1081–1088 (2006) Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55, 1081–1088 (2006)
9.
Zurück zum Zitat Vatsa, M., Singh, R., Mitra, P., Noore, A.: Digital watermarking based secure multimodal biometric system. In: IEEE International Conference on Systems, Man and Cybernetics, vol. 3, pp. 2983–2987 (2004) Vatsa, M., Singh, R., Mitra, P., Noore, A.: Digital watermarking based secure multimodal biometric system. In: IEEE International Conference on Systems, Man and Cybernetics, vol. 3, pp. 2983–2987 (2004)
10.
Zurück zum Zitat Teoh, A.B.J., Ong, T.S.: Secure biometric template protection via randomized dynamic quantization transformation. In: International Symposium on Biometrics and Security Technologies (ISBAST), pp. 1–6 (2008) Teoh, A.B.J., Ong, T.S.: Secure biometric template protection via randomized dynamic quantization transformation. In: International Symposium on Biometrics and Security Technologies (ISBAST), pp. 1–6 (2008)
11.
Zurück zum Zitat Yang, S., Verbauwhede, I.: Secure IRIS verification. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 133–136 (2007) Yang, S., Verbauwhede, I.: Secure IRIS verification. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 133–136 (2007)
12.
Zurück zum Zitat Barni, M., Bartolini, F., Cappllini, V., Piva, A.: Copyright protection of digital images by embedded unperceivable marks. Image Vis. Comput. 16 (1998) Barni, M., Bartolini, F., Cappllini, V., Piva, A.: Copyright protection of digital images by embedded unperceivable marks. Image Vis. Comput. 16 (1998)
13.
Zurück zum Zitat Pereira, S.: Robust digital image watermarking. Doctoral Thesis, University of Geneva (2000) Pereira, S.: Robust digital image watermarking. Doctoral Thesis, University of Geneva (2000)
14.
Zurück zum Zitat Pitas, I.: A method for watermark casting on digital image. IEEE Trans. Circuits Syst. Video Technol. 8, 775–780 (2002)CrossRef Pitas, I.: A method for watermark casting on digital image. IEEE Trans. Circuits Syst. Video Technol. 8, 775–780 (2002)CrossRef
15.
Zurück zum Zitat Voyatzis, G., Pitas, I.: Digital image watermarking using mixing systems. Comput. Graph. 22, 405–416 (1998) Voyatzis, G., Pitas, I.: Digital image watermarking using mixing systems. Comput. Graph. 22, 405–416 (1998)
16.
Zurück zum Zitat Tefas, A., Pitas, L.: Image authentication using chaotic mixing systems. In: IEEE International Symposium on Circuits and Systems (ISCAS), vol. 1, pp. 216–219 (2000) Tefas, A., Pitas, L.: Image authentication using chaotic mixing systems. In: IEEE International Symposium on Circuits and Systems (ISCAS), vol. 1, pp. 216–219 (2000)
17.
Zurück zum Zitat Shu, Z., Li, G., Gan, L., Zhan, L., Fang, W.: Image watermarking based on wavelet-based contourlet packet transform with best tree. In: Second International Symposium on Electronic Commerce and Security (ISECS), vol. 1, pp. 203–207 (2009) Shu, Z., Li, G., Gan, L., Zhan, L., Fang, W.: Image watermarking based on wavelet-based contourlet packet transform with best tree. In: Second International Symposium on Electronic Commerce and Security (ISECS), vol. 1, pp. 203–207 (2009)
18.
Zurück zum Zitat Zhao, H.: Algorithm of digital image watermarking technique combined with HVS. In: IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 774–777 (2010) Zhao, H.: Algorithm of digital image watermarking technique combined with HVS. In: IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 774–777 (2010)
19.
Zurück zum Zitat Zhang, C., Wang, J.: Digital image watermarking algorithm with double encryption by Arnold transform and logistic. In: Fourth International Conference on Network Computing and Advanced Information Management, vol. 1, pp. 329–334 (2008) Zhang, C., Wang, J.: Digital image watermarking algorithm with double encryption by Arnold transform and logistic. In: Fourth International Conference on Network Computing and Advanced Information Management, vol. 1, pp. 329–334 (2008)
20.
Zurück zum Zitat Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25, 1494–1498 (2003)CrossRef Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25, 1494–1498 (2003)CrossRef
21.
Zurück zum Zitat Cao, J., Li, A., Lv, G.: Study on multiple watermarking scheme for GIS vector data. In: 18th International Conference on Geoinformatics, pp. 1–6 (2010) Cao, J., Li, A., Lv, G.: Study on multiple watermarking scheme for GIS vector data. In: 18th International Conference on Geoinformatics, pp. 1–6 (2010)
22.
Zurück zum Zitat Kanade, S., Petrovska-Delacretaz, D., Dorizzi, B.: Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 120–127 (2009) Kanade, S., Petrovska-Delacretaz, D., Dorizzi, B.: Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 120–127 (2009)
23.
Zurück zum Zitat Fan, L., Duan, H., Long, F.: Face recognition by subspace analysis of 2D Log-Gabor wavelets features. In: Third International Conference on Intelligent system and Knowledge Engineering (ISKE), vol. 1, pp. 1167–1172 (2008) Fan, L., Duan, H., Long, F.: Face recognition by subspace analysis of 2D Log-Gabor wavelets features. In: Third International Conference on Intelligent system and Knowledge Engineering (ISKE), vol. 1, pp. 1167–1172 (2008)
Metadaten
Titel
Image and Template Security for Palmprint
verfasst von
Munaga V. N. K. Prasad
B. Adinarayana
Copyright-Jahr
2014
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-1665-0_1