Abstract
Numerous issues are raised through the enhancement, transmission and storage of biometric data due to its high sensitivity and extremely crucial purpose. However, it might be impossible to recover if corrupted, counterfeited or hacked, thereby ruining the general aim of enhancing and securing it. In this paper, an 8-layered feature enhancement algorithm is proposed. The fingerprint image was enhanced and extracted using minutiae-based recognition system with the aim of eliminating all anomalies that comes with the image. The EQF (Effectiveness Quality Factor) and matching accuracy of the system all signifies efficiency and robustness of the enhancement scheme. In the other hand, a centroid-based audio watermarking is used to conceal the enhanced fingerprint biometric data into audio signals. The embedding algorithm starts by encrypting our enhanced image using chaotic logistic map prior to watermarking. It then proceeds with computing the centroid of the audio signal. DWT and DCT are performed on the sub-band which carries the centroid of each audio frame, thereby embedding the encrypted watermark bits into their domain. Achieved results from the performance evaluation of both contributions signify the efficiency of our proposed schemes. Moreover, some signal processing operations are also carried out on the watermarked signal and the outcome was intriguing as they were all counteracted.
Similar content being viewed by others
References
Al-haj A (2014) An imperceptible and robust audio watermarking algorithm. EURASIP J Audio Speech Music Process. https://doi.org/10.1186/s13636-014-0037-2
Anil KJ, Arus R, Sharath P (2006) Biometrics: a tool for information security. IEEE Transactions on Information Forensics and Security 1(2):125–143
Anil K, Arun A, Karthik N (2011) Introduction to Biometrics. Springer, New York Dordrecht Heidelberg London ISBN 978-0-387-77325-4
Anush S, Mayank V, Richa S (2014) Latent fingerprint matching: a survey. IEEE access. IEEE Biometric Conpendium RFIC Vitual J 2:982–1004
Arashdeep K, Malay KD, Soni KM, Nidhi T (2014) A secure and high payload digital audio watermarking using features from iris image. IEEE International Conference on Contemporary Computing and Informatics(IC3I). pp. 509-512
Bhat KV, Sengupta I, Das A (2011) An audio watermarking scheme using singular value decomposition and dither-modulation quantization. Multimed Tools Appl. 52(2):369–383
Chunlei L, Ruimin Y, Zhoufeng L, Jianjun L, Zhenduo G (2016) Semi-fragile self-recoverable watermarking scheme for face image protection. Computers and Electrical Engineering 54(8):484–493
Cui J, Liu Y, Xu Y, Zhao H, Zha H (2013) Tracking Generic Human Motion via Fusion of Low-and High-Dimensional Approaches. IEEE Trans on Systems, Man and Cybernetics. pp. 996-1002
El Bakrawy LM, Ghali NI, Hassanien AE, Peters JF (2011) Strict Authentication of Multimodal Biometric Images Using Near Sets. Springer, Heidelberg. In: Soft Computing in Industrial Applications. AISC 96:249–258
El-Khamy SE, Korany NO, El-Sherif MH (2016) A security enhanced audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption. Multimed Tools Appl. doi:10.1007/s11042-016-4113-8, 1–16
Fallahpour M, Megias D (2011) High capacity audio watermarking using the high frequency band of the wavelet domain. Multimed Tools Appl. 52(2):485–498
Gaurav B, Jonathan WQM (2012) Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission. IEEE Transactions on Instrumentation and Measurement 61(4):876–887
Giang M, Wu X, Hu AQ (2009) A fast thinning algorithm for fingerprint image. The 1st International Conference on Information Science and Engineering (ICISE), pp. 1039-1042
Gnanasivam P, Muttan S (2010) An efficient Algorithm for fingerprint preprocessing and feature extraction. Procedia Computer Science 2:133–142
Hua G, Huang J, Shi YQ, Goh J, Vrizlynn LLT (2016) Twenty years of digital audio watermarking-a comprehensive review. Signal processing. 128:222–242
International Telecommunication Union (1998-2001) Method for objective measurements of perceived audio quality (PAEQ) ITU-RBS.1387-1, Geneva, Switzerland
Jianchun H, Jinjun B (2012a) Normalization of fingerprint image using the local feature. International Conference on Computer Science and Service System, pp. 1643-1646
Jianchun H, Jinjun B (2012b) Normalization of Fingerprint Image Using the Local Feature. International Conference on Computer Science and Service System, pp. 1643-1646
Jin Z, Teoh ABJ, Goi BM, Yay YH (2016a) A New Biometric Cryptosystems and Its Implementation for Fingerprint Minutiae-based Representation. Pattern Recognition, Elsevier 56:50–62
Jin Z, Lim MH, Teoh ABJ, Goi BM, Yay YH (2016b) Generating Fixed-length Representation from Minutiae Using Kernel Methods for Fingerprint Authentication. IEEE Transactions on Systems, Man and Cybernetics: Systems 46(10):1415–1428
Jing-Wein W, Ngoc TL, Chou-Chein W, Jiann-Shu L (2015) Enhanced Ridge Structure for Improving Fingerprint Image Quality Based on a Wavelet Domain. IEEE Signal Processing. 22(4):390–394
Josef S, Mikael N, Benny S, Ingvar C (2013) Adaptive Fingerprint Image Enhancement with Emphasis on Preprocessing of Data. IEEE Transaction on Image Processing 22(2):644–656
Joshi M, Joshi V, Raval M (2013) Multilevel semi-fragile watermarking technique for improving biometric system security. Springer, Heidelberg In: Communication in Computer and Information Science, 276, pp. 272-283
Joshi M, Joshi V, Raval M (2015) A multiple reversible technique for fingerprint authentication. Springer, Heidelberg. In: Multiple Systems, 22(3), pp. 367-378
Joshua A, Paul K, Junbin G (2011) Fingerprint Matching using A Hybrid Shape and Orientation Descriptor, State of the art in Biometrics, ISBN: 978-953-307-489-4
Kai C, Eryun L, Anil K (2014) Segmentation and Enhancement of Latent Fingerprint. IEEE Transactions on Pattern Analysis and Machine Intelligence 36(9):1847–1859
Khan MK, Xie L, Zhang J (2009) Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals. Digit Sign Process 20(1):179–170
Liu Y, Zhang X, Cui J, Wu C, Aghajan H, Zha H (2010) Visual Analysis of Child-Adult Interactive Behaviors in Video Sequences. IEEE International Conference on Visual Systems and Multimedia. pp. 26-33
Liu Y, Cui J, Zhao H, Zha H (2012) Fusion of Low-and High-Dimensional Approach by Trackers Sampling for Generic Human Motion Tracking. Proceedings of the 21st International Conference of Pattern Recognition. pp. 898-901
Liu X, Pedersen M, Charrier C, Cheikh FA, Bours P (2016a) An improved 3-step contactless fingerprint image enhancement approach for minutiae detection. 6th European Workshop on Visual Information Processing (EUVIP), pp. 1-6
Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2016b) Action2Activity: Recognizing Complex Activities from Sensor Data. Computer Vision and Pattern Recognition, arXiv:1611.01872 [cs.CV]
Liu Y, Nie L, Liu L, Rosenblum DS (2016c) From Action to Activity: Sensor-based Activity Recognition. Neurocomputing. 181:108–115
Liu L, Cheng L, Liu Y, Jia Y, Rosenblum DS (2016d) Recognizing Complex Activities by a Probabilistic Interval-Based Model. Proceedings of 30th AAAI Conference on Artificial Intelligence (AAAI-16). pp. 1266-1272
Liu Y, Zheng Y, Liang Y, Liu S, Rosenblum DS (2016e) Urban water quality prediction based on multi-task multi-view learning. Proceedings of 25th International Joint Conference on Artificial Intelligence (IJCAI’16). pp. 2576-2582
Liu Y, Liang Y, Liu S, Rosenblum DS (2016f) Predicting urban water quality with ubiquitous data. Computers and Society. arxiv.org/abs/1610.09462
Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016g) Fortune Teller: Predicting Your Career Path. Proceedings of 30th AAAI Conference on Artificial Intelligence (AAAI-16)
Lu Y, Wei Y, Liu L, Zhong J, Sun L, Liu Y (2017) Towards unsupervised physical activity recognition using smartphone accelerometers. Multimedia Tools & Applications. 76:10701–10719
Maltoni D, Maio D, Jain A, Prabhakar S (2003) Handbook of fingerprint recognition. Springer, New York, pp 141–144
Milos V, Brankica M, Andelija M, Dragan R (2013) Improving Minutiae Extraction in Fingerprint Images through Robust Enhancement. IEEE Conference on 21st Telecommunication forum (TELFOR), pp. 506-509
Mohammed A, Fengling H, Ron V (2013) Fingerprint Image Watermarking approach using DTCWT without Corrupting Minutiae. IEEE 6th International Congress on Image and Signal Processing (CISP) 3:1717–1723
Nixon M, Aguado A (2008) Feature extraction and image processing. Elsevier Linacre House, Jordan Hill, Oxford ISBN: 978-0-12372-538-7
Patrick B, Teddy F (2013) A new measure of watermarking security: the effective key length. IEEE Transactions on Information Forensics and Security 8(8):1306–1317
Preotiuc-Pietro D, Hopkins DJ, Liu Y, Ungar L (2017) Beyond Binary Labels: Political Ideology Prediction of Twitter Users. Proceedings of 55th Annual Meeting of the Association of Computational Linguistics. pp. 1052-1064
Qin C, Zhang X (2015) Effective Reversible Data Hiding in Encrypted Image with Privacy Protection for Image Content. Journal of Visual Communication and Image Representation 31:154–164
Qin C, Chen X, Ye D, Wang J, Sun X (2016) A Novel Image Hashing Scheme with Perceptual Robustness Using Block Truncation Coding. Information Sciences 361-362:84–99
Ravi K, Sai K, Rajendra P, Subba R, Ravi P (2012) Fingerprint Minutia Match using Bifurcation Technique. International Journal of Computer Science and Communication Networks 2(4):478–486
Semwal VB, Raji M, Nandi CG (2015) “Biometric Gait Identification Based on Multilayer Perceptron.” Robotics and Autonomous Systems (65), pp 65-70
Semwal VB, Kumar C, Mishra PK, Nandi CG (2016a) Design of Vector Field for Different Subphrases of Gait and Regeneration of Gait Pattern IEEE Transaction on Automation Science and Engineering, PP(99), pp. 1-7
Semwal VB, Singha J, Sharma PK, Chauhan A, Behera B (2016b) An Optimized Feature Selection Technique Based on Incremental Feature Analysis for Biometric Gait Data Classification. Multimed Tools Appl. pp. (1-19)
Semwal VB, Mondal K, Nandi CG (2017) Robust and Accurate Feature Selection for Humanoid Push Recovery and Classification: Deep Learning Approach. Neural Computing and Applications 28:565–574
Wang H, Fan M (2010) Centroid-based semi-fragile audio watermarking in hybrid domain. Chin Sci Inform Sci 53(3):619–633
Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(11):2594–2608
Xiang Y, Natgunanathan I, Rong Y, Guo S (2015) Spread Spectrum-Based High Embedding Capacity Watermarking Method for Audio Signals. IEEE/ACM Trans Audio, Speech Language Process 23(12):2228–2237
Xie X, Livermore C (2015) A high-force out-of-plane actuator with a MEMS-enabled micro scissor motion amplifier. J Phys: Conf Ser 660. https://doi.org/10.1088/1742-6596/660/1/012026
Xie X, Livermore C (2016) A Pivot-Hinged, Multilayer SU-8 Micro Motion Amplifier Assembled by a Self-Aligned Approach. IEEE International Conference on Micro Electro Mechanical Systems. pp. 75-78
Xie X, Livermore C (2017) Passively Self-Aligned Assembly of Compact Barrel Hinges for High-Performance, Out-of-plane Mems Actuators. IEEE International Conference on Micro Electro Mechanical Systems. pp. 813-816
Xie X, Zaitsev Y, Velasquez-Garcia LF, Teller SJ, Livermore C (2014a) Scalable, MEMS-enabled, Vibrational Tactile Actuators for High Resolution Tactile Displays. Journal of Micromech. Microeng 24:–11
Xie X, Zaitsev Y, Velasquez-Garcia LF, Teller SJ, Livermore C (2014b) Compact, Scalable, High-resolution, MEMs-enabled Tactile Displays. In Proc. of Solid-Sate Sensors, Actuators, and Microsystems Workshop. pp. 127-130
Yuan C, Sun X, Rui LV (2016) Fingerprint Liveness Detection Based on Multi-Scale LPQ and PCA. China Communications 13(7):60–65
Zhou Z, Wang Y, Wu QMJ, Yang C-N, Sun X (2017) Effective and Efficient Global Context Verification for Image Copy Detection. IEEE Transactions on Information Forensics and Security 12(1):48–63
Acknowledgements
The authors are grateful for the anonymous reviewers’ insightful comments and valuable suggestions sincerely, which substantially improve the quality of this manuscript. Many thanks to Dr. Hong Zhao for his participation in technical editing of the manuscript. Our sincere appreciation also goes to Yi Chen for his valuable suggestion on improving the manuscript simulation based on reviewers’ comments. This work is supported by the National Science Foundation of China (NSFC) under the grant Nos. U1536110, 61402219.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Abdullahi, S.M., Wang, H. Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals. Multimed Tools Appl 77, 20753–20782 (2018). https://doi.org/10.1007/s11042-017-5509-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5509-9