Skip to main content

A Secure Protocol for Data Hiding in Compressed Fingerprint Images

  • Conference paper
Biometric Authentication (BioAW 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3087))

Included in the following conference series:

Abstract

Data hiding techniques can be employed to enhance the security of biometrics-based authentication systems. In our previous work, we proposed a method to hide challenge responses in a WSQ-compressed fingerprint image. In this paper, we extend the work to analyze the security holes in the data hiding method and enhance the hiding technique to thwart attacks on the system. We employ several proven IT security techniques to provide a secure method of hiding responses in fingerprint images. The technique presented here can be used in hiding responses in other biometrics with minor changes to suit the domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fingerprint Verification Competition (2000), http://bias.csr.unibo.it/fvc2000

  2. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3 & 4), 313–335 (1996)

    Article  Google Scholar 

  3. Boliek, M., Christopoulos, C., Majani, E.: JPEG2000 Part I Final Draft International Standard. Number ISO/IEC FDIS 15444-1. ISO/IEC JTC1/SC29/WG1 N1855 (August 2000)

    Google Scholar 

  4. Brislawn, C.M., Bradley, J.N., Onyshezak, R.J., Hopper, T.: The FBI compression standard for digitized fingerprint images. In: Proc. SPIE, Denver, CO, August 1996, vol. 2847, pp. 344–355 (1996)

    Google Scholar 

  5. Brislawn, C.M., Bradley, J.N., Hopper, T.: The FBI Wavelet/Scalar Quantization Standard for gray-scale fingerprint image compression

    Google Scholar 

  6. FBI. WSQ Gray-Scale Fingerprint Image Compression Specification. Document No. IAFIS-IC-0110 (v2) (February 1993); Drafted by T. Hopper, C. M. Brislawn and J. N. Bradley

    Google Scholar 

  7. Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. on Image Processing 8(1), 58–68 (1999)

    Article  Google Scholar 

  8. Jain, A.K., Uludag, U.: Hiding Biometric Data. IEEE Trans. on Pattern Analysis and Machine Intelligence 25(11), 1494–1498 (2003)

    Article  Google Scholar 

  9. Kobayashi, M., Swanson, M.D., Tewfik, A.H.: Multimedia Data Embedding and Watermarking Technologies 86(6), 1064–1087 (June 1998)

    Google Scholar 

  10. Moulin, P., Mihcak, M.K.: A Framework for Evaluating the Data-Hiding Capacity of Image Sources. IEEE Trans. on Image Processing 11(9), 1029–1042 (2002)

    Article  Google Scholar 

  11. Petitcolas, F.A., Anderson, R.J., Kuhn, M.G.: Information Hiding - A Survey 87(7), 1062–1078 (July 1999)

    Google Scholar 

  12. Ramkumar, M., Akansu, A.N.: Capacity Estimates for Data-Hiding in Compressed Images. IEEE Trans. on Image Processing 10(8), 1252–1263 (2001)

    Article  MATH  Google Scholar 

  13. Ratha, N.K., Connell, J.H., Bolle, R.M.: Secure Data Hiding in Wavelet Compressed Fingerprint Images. In: Proc. ACM Multimedia, Marina del Rey, CA, October 2000, pp. 127–130 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ratha, N.K., Figueroa-Villanueva, M.A., Connell, J.H., Bolle, R.M. (2004). A Secure Protocol for Data Hiding in Compressed Fingerprint Images. In: Maltoni, D., Jain, A.K. (eds) Biometric Authentication. BioAW 2004. Lecture Notes in Computer Science, vol 3087. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25976-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25976-3_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22499-0

  • Online ISBN: 978-3-540-25976-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics