Skip to main content
Log in

Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Numerous issues are raised through the enhancement, transmission and storage of biometric data due to its high sensitivity and extremely crucial purpose. However, it might be impossible to recover if corrupted, counterfeited or hacked, thereby ruining the general aim of enhancing and securing it. In this paper, an 8-layered feature enhancement algorithm is proposed. The fingerprint image was enhanced and extracted using minutiae-based recognition system with the aim of eliminating all anomalies that comes with the image. The EQF (Effectiveness Quality Factor) and matching accuracy of the system all signifies efficiency and robustness of the enhancement scheme. In the other hand, a centroid-based audio watermarking is used to conceal the enhanced fingerprint biometric data into audio signals. The embedding algorithm starts by encrypting our enhanced image using chaotic logistic map prior to watermarking. It then proceeds with computing the centroid of the audio signal. DWT and DCT are performed on the sub-band which carries the centroid of each audio frame, thereby embedding the encrypted watermark bits into their domain. Achieved results from the performance evaluation of both contributions signify the efficiency of our proposed schemes. Moreover, some signal processing operations are also carried out on the watermarked signal and the outcome was intriguing as they were all counteracted.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Figure 14

Similar content being viewed by others

References

  1. Al-haj A (2014) An imperceptible and robust audio watermarking algorithm. EURASIP J Audio Speech Music Process. https://doi.org/10.1186/s13636-014-0037-2

  2. Anil KJ, Arus R, Sharath P (2006) Biometrics: a tool for information security. IEEE Transactions on Information Forensics and Security 1(2):125–143

    Article  Google Scholar 

  3. Anil K, Arun A, Karthik N (2011) Introduction to Biometrics. Springer, New York Dordrecht Heidelberg London ISBN 978-0-387-77325-4

    Google Scholar 

  4. Anush S, Mayank V, Richa S (2014) Latent fingerprint matching: a survey. IEEE access. IEEE Biometric Conpendium RFIC Vitual J 2:982–1004

    Google Scholar 

  5. Arashdeep K, Malay KD, Soni KM, Nidhi T (2014) A secure and high payload digital audio watermarking using features from iris image. IEEE International Conference on Contemporary Computing and Informatics(IC3I). pp. 509-512

  6. Bhat KV, Sengupta I, Das A (2011) An audio watermarking scheme using singular value decomposition and dither-modulation quantization. Multimed Tools Appl. 52(2):369–383

    Article  Google Scholar 

  7. Chunlei L, Ruimin Y, Zhoufeng L, Jianjun L, Zhenduo G (2016) Semi-fragile self-recoverable watermarking scheme for face image protection. Computers and Electrical Engineering 54(8):484–493

    Google Scholar 

  8. Cui J, Liu Y, Xu Y, Zhao H, Zha H (2013) Tracking Generic Human Motion via Fusion of Low-and High-Dimensional Approaches. IEEE Trans on Systems, Man and Cybernetics. pp. 996-1002

  9. El Bakrawy LM, Ghali NI, Hassanien AE, Peters JF (2011) Strict Authentication of Multimodal Biometric Images Using Near Sets. Springer, Heidelberg. In: Soft Computing in Industrial Applications. AISC 96:249–258

    Google Scholar 

  10. El-Khamy SE, Korany NO, El-Sherif MH (2016) A security enhanced audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption. Multimed Tools Appl. doi:10.1007/s11042-016-4113-8, 1–16

  11. Fallahpour M, Megias D (2011) High capacity audio watermarking using the high frequency band of the wavelet domain. Multimed Tools Appl. 52(2):485–498

    Article  Google Scholar 

  12. Gaurav B, Jonathan WQM (2012) Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission. IEEE Transactions on Instrumentation and Measurement 61(4):876–887

    Article  Google Scholar 

  13. Giang M, Wu X, Hu AQ (2009) A fast thinning algorithm for fingerprint image. The 1st International Conference on Information Science and Engineering (ICISE), pp. 1039-1042

  14. Gnanasivam P, Muttan S (2010) An efficient Algorithm for fingerprint preprocessing and feature extraction. Procedia Computer Science 2:133–142

    Article  Google Scholar 

  15. Hua G, Huang J, Shi YQ, Goh J, Vrizlynn LLT (2016) Twenty years of digital audio watermarking-a comprehensive review. Signal processing. 128:222–242

    Article  Google Scholar 

  16. International Telecommunication Union (1998-2001) Method for objective measurements of perceived audio quality (PAEQ) ITU-RBS.1387-1, Geneva, Switzerland

  17. Jianchun H, Jinjun B (2012a) Normalization of fingerprint image using the local feature. International Conference on Computer Science and Service System, pp. 1643-1646

  18. Jianchun H, Jinjun B (2012b) Normalization of Fingerprint Image Using the Local Feature. International Conference on Computer Science and Service System, pp. 1643-1646

  19. Jin Z, Teoh ABJ, Goi BM, Yay YH (2016a) A New Biometric Cryptosystems and Its Implementation for Fingerprint Minutiae-based Representation. Pattern Recognition, Elsevier 56:50–62

    Article  Google Scholar 

  20. Jin Z, Lim MH, Teoh ABJ, Goi BM, Yay YH (2016b) Generating Fixed-length Representation from Minutiae Using Kernel Methods for Fingerprint Authentication. IEEE Transactions on Systems, Man and Cybernetics: Systems 46(10):1415–1428

    Article  Google Scholar 

  21. Jing-Wein W, Ngoc TL, Chou-Chein W, Jiann-Shu L (2015) Enhanced Ridge Structure for Improving Fingerprint Image Quality Based on a Wavelet Domain. IEEE Signal Processing. 22(4):390–394

    Article  Google Scholar 

  22. Josef S, Mikael N, Benny S, Ingvar C (2013) Adaptive Fingerprint Image Enhancement with Emphasis on Preprocessing of Data. IEEE Transaction on Image Processing 22(2):644–656

    Article  MathSciNet  MATH  Google Scholar 

  23. Joshi M, Joshi V, Raval M (2013) Multilevel semi-fragile watermarking technique for improving biometric system security. Springer, Heidelberg In: Communication in Computer and Information Science, 276, pp. 272-283

  24. Joshi M, Joshi V, Raval M (2015) A multiple reversible technique for fingerprint authentication. Springer, Heidelberg. In: Multiple Systems, 22(3), pp. 367-378

  25. Joshua A, Paul K, Junbin G (2011) Fingerprint Matching using A Hybrid Shape and Orientation Descriptor, State of the art in Biometrics, ISBN: 978-953-307-489-4

  26. Kai C, Eryun L, Anil K (2014) Segmentation and Enhancement of Latent Fingerprint. IEEE Transactions on Pattern Analysis and Machine Intelligence 36(9):1847–1859

    Article  Google Scholar 

  27. Khan MK, Xie L, Zhang J (2009) Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals. Digit Sign Process 20(1):179–170

    Article  Google Scholar 

  28. Liu Y, Zhang X, Cui J, Wu C, Aghajan H, Zha H (2010) Visual Analysis of Child-Adult Interactive Behaviors in Video Sequences. IEEE International Conference on Visual Systems and Multimedia. pp. 26-33

  29. Liu Y, Cui J, Zhao H, Zha H (2012) Fusion of Low-and High-Dimensional Approach by Trackers Sampling for Generic Human Motion Tracking. Proceedings of the 21st International Conference of Pattern Recognition. pp. 898-901

  30. Liu X, Pedersen M, Charrier C, Cheikh FA, Bours P (2016a) An improved 3-step contactless fingerprint image enhancement approach for minutiae detection. 6th European Workshop on Visual Information Processing (EUVIP), pp. 1-6

  31. Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2016b) Action2Activity: Recognizing Complex Activities from Sensor Data. Computer Vision and Pattern Recognition, arXiv:1611.01872 [cs.CV]

  32. Liu Y, Nie L, Liu L, Rosenblum DS (2016c) From Action to Activity: Sensor-based Activity Recognition. Neurocomputing. 181:108–115

    Article  Google Scholar 

  33. Liu L, Cheng L, Liu Y, Jia Y, Rosenblum DS (2016d) Recognizing Complex Activities by a Probabilistic Interval-Based Model. Proceedings of 30th AAAI Conference on Artificial Intelligence (AAAI-16). pp. 1266-1272

  34. Liu Y, Zheng Y, Liang Y, Liu S, Rosenblum DS (2016e) Urban water quality prediction based on multi-task multi-view learning. Proceedings of 25th International Joint Conference on Artificial Intelligence (IJCAI’16). pp. 2576-2582

  35. Liu Y, Liang Y, Liu S, Rosenblum DS (2016f) Predicting urban water quality with ubiquitous data. Computers and Society. arxiv.org/abs/1610.09462

  36. Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016g) Fortune Teller: Predicting Your Career Path. Proceedings of 30th AAAI Conference on Artificial Intelligence (AAAI-16)

  37. Lu Y, Wei Y, Liu L, Zhong J, Sun L, Liu Y (2017) Towards unsupervised physical activity recognition using smartphone accelerometers. Multimedia Tools & Applications. 76:10701–10719

    Article  Google Scholar 

  38. Maltoni D, Maio D, Jain A, Prabhakar S (2003) Handbook of fingerprint recognition. Springer, New York, pp 141–144

    MATH  Google Scholar 

  39. Milos V, Brankica M, Andelija M, Dragan R (2013) Improving Minutiae Extraction in Fingerprint Images through Robust Enhancement. IEEE Conference on 21st Telecommunication forum (TELFOR), pp. 506-509

  40. Mohammed A, Fengling H, Ron V (2013) Fingerprint Image Watermarking approach using DTCWT without Corrupting Minutiae. IEEE 6th International Congress on Image and Signal Processing (CISP) 3:1717–1723

    Google Scholar 

  41. Nixon M, Aguado A (2008) Feature extraction and image processing. Elsevier Linacre House, Jordan Hill, Oxford ISBN: 978-0-12372-538-7

    Google Scholar 

  42. Patrick B, Teddy F (2013) A new measure of watermarking security: the effective key length. IEEE Transactions on Information Forensics and Security 8(8):1306–1317

    Article  Google Scholar 

  43. Preotiuc-Pietro D, Hopkins DJ, Liu Y, Ungar L (2017) Beyond Binary Labels: Political Ideology Prediction of Twitter Users. Proceedings of 55th Annual Meeting of the Association of Computational Linguistics. pp. 1052-1064

  44. Qin C, Zhang X (2015) Effective Reversible Data Hiding in Encrypted Image with Privacy Protection for Image Content. Journal of Visual Communication and Image Representation 31:154–164

    Article  Google Scholar 

  45. Qin C, Chen X, Ye D, Wang J, Sun X (2016) A Novel Image Hashing Scheme with Perceptual Robustness Using Block Truncation Coding. Information Sciences 361-362:84–99

    Article  Google Scholar 

  46. Ravi K, Sai K, Rajendra P, Subba R, Ravi P (2012) Fingerprint Minutia Match using Bifurcation Technique. International Journal of Computer Science and Communication Networks 2(4):478–486

    Google Scholar 

  47. Semwal VB, Raji M, Nandi CG (2015) “Biometric Gait Identification Based on Multilayer Perceptron.” Robotics and Autonomous Systems (65), pp 65-70

  48. Semwal VB, Kumar C, Mishra PK, Nandi CG (2016a) Design of Vector Field for Different Subphrases of Gait and Regeneration of Gait Pattern IEEE Transaction on Automation Science and Engineering, PP(99), pp. 1-7

  49. Semwal VB, Singha J, Sharma PK, Chauhan A, Behera B (2016b) An Optimized Feature Selection Technique Based on Incremental Feature Analysis for Biometric Gait Data Classification. Multimed Tools Appl. pp. (1-19)

  50. Semwal VB, Mondal K, Nandi CG (2017) Robust and Accurate Feature Selection for Humanoid Push Recovery and Classification: Deep Learning Approach. Neural Computing and Applications 28:565–574

    Article  Google Scholar 

  51. Wang H, Fan M (2010) Centroid-based semi-fragile audio watermarking in hybrid domain. Chin Sci Inform Sci 53(3):619–633

    Article  MathSciNet  Google Scholar 

  52. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(11):2594–2608

    Article  Google Scholar 

  53. Xiang Y, Natgunanathan I, Rong Y, Guo S (2015) Spread Spectrum-Based High Embedding Capacity Watermarking Method for Audio Signals. IEEE/ACM Trans Audio, Speech Language Process 23(12):2228–2237

    Article  Google Scholar 

  54. Xie X, Livermore C (2015) A high-force out-of-plane actuator with a MEMS-enabled micro scissor motion amplifier. J Phys: Conf Ser 660. https://doi.org/10.1088/1742-6596/660/1/012026

  55. Xie X, Livermore C (2016) A Pivot-Hinged, Multilayer SU-8 Micro Motion Amplifier Assembled by a Self-Aligned Approach. IEEE International Conference on Micro Electro Mechanical Systems. pp. 75-78

  56. Xie X, Livermore C (2017) Passively Self-Aligned Assembly of Compact Barrel Hinges for High-Performance, Out-of-plane Mems Actuators. IEEE International Conference on Micro Electro Mechanical Systems. pp. 813-816

  57. Xie X, Zaitsev Y, Velasquez-Garcia LF, Teller SJ, Livermore C (2014a) Scalable, MEMS-enabled, Vibrational Tactile Actuators for High Resolution Tactile Displays. Journal of Micromech. Microeng 24:–11

  58. Xie X, Zaitsev Y, Velasquez-Garcia LF, Teller SJ, Livermore C (2014b) Compact, Scalable, High-resolution, MEMs-enabled Tactile Displays. In Proc. of Solid-Sate Sensors, Actuators, and Microsystems Workshop. pp. 127-130

  59. Yuan C, Sun X, Rui LV (2016) Fingerprint Liveness Detection Based on Multi-Scale LPQ and PCA. China Communications 13(7):60–65

    Article  Google Scholar 

  60. Zhou Z, Wang Y, Wu QMJ, Yang C-N, Sun X (2017) Effective and Efficient Global Context Verification for Image Copy Detection. IEEE Transactions on Information Forensics and Security 12(1):48–63

    Article  Google Scholar 

Download references

Acknowledgements

The authors are grateful for the anonymous reviewers’ insightful comments and valuable suggestions sincerely, which substantially improve the quality of this manuscript. Many thanks to Dr. Hong Zhao for his participation in technical editing of the manuscript. Our sincere appreciation also goes to Yi Chen for his valuable suggestion on improving the manuscript simulation based on reviewers’ comments. This work is supported by the National Science Foundation of China (NSFC) under the grant Nos. U1536110, 61402219.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongxia Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abdullahi, S.M., Wang, H. Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals. Multimed Tools Appl 77, 20753–20782 (2018). https://doi.org/10.1007/s11042-017-5509-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5509-9

Keywords

Navigation