Hiding Biometric Data

نویسندگان

  • Anil K. Jain
  • Umut Uludag
چکیده

With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are possible in a biometric system, make the issue of security/integrity of biometric data extremely critical. We introduce two applications of an amplitude modulation-based watermarking method, in which we hide a user’s biometric data in a variety of images. This method has the ability to increase the security of both the hidden biometric data (e.g., eigen-face coefficients) and host images (e.g., fingerprints). Image adaptive data embedding methods used in our scheme lead to low visibility of the embedded signal. Feature analysis of host images guarantees high verification accuracy on watermarked (e.g., fingerprint) images.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

Authentication of biometric identification documents via mobile devices

In this paper, we consider the problem of authentication of biometric identification documents via mobile devices such as mobile phones or PDAs. We assume that the biometric identification document holds biometric data (e.g., face or fingerprint) in the form of an image and personal data in the form of text, both being printed directly onto the identification document. The proposed solution mak...

متن کامل

A New Biometric Template Protection Based on Secure Data Hiding Approach

Biometrics is a technology that has been widely used in many official and commercial identification applications. The extracted features from the biometric sample is called biometric template which is used during a biometric authentication process. The security of templates is the critical part of biometric system and one of the most crucial issues in designing a secure system. The proposed app...

متن کامل

Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

Identity documents, such as ID cards, passports, and driver’s licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterf...

متن کامل

Biometric Steganographic Technique Using DWT and Encryption

Steganography is the art of hiding the existence of data inanother transmission medium to achieve secret communication . Steganography method used in this paper is based on biometrics, ie biometric steganography. And the biometric feature used to implement steganography is skin tone region of images. Here secret data is embedded within skin region of image that will provide an excellent secure ...

متن کامل

Robust and Secure Data Hiding in Image Using Biometric Technique

-Steganography method used in this paper is based on biometrics. And the biometric feature used to implement steganography is skin tone region of images. Here secret data is embedded within skin region of image that will provide an excellent secure location for data hiding. For this skin tone detection is performed using HSV (Hue, Saturation and Value) color space. Additionally secret data embe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Trans. Pattern Anal. Mach. Intell.

دوره 25  شماره 

صفحات  -

تاریخ انتشار 2003