A Secure Protocol for Data Hiding in Compressed Fingerprint Images

  • Nalini K. Ratha
  • Miguel A. Figueroa-Villanueva
  • Jonathan H. Connell
  • Ruud M. Bolle
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3087)


Data hiding techniques can be employed to enhance the security of biometrics-based authentication systems. In our previous work, we proposed a method to hide challenge responses in a WSQ-compressed fingerprint image. In this paper, we extend the work to analyze the security holes in the data hiding method and enhance the hiding technique to thwart attacks on the system. We employ several proven IT security techniques to provide a secure method of hiding responses in fingerprint images. The technique presented here can be used in hiding responses in other biometrics with minor changes to suit the domain.


Random Number Generator Image Compression Wavelet Packet Secure Protocol Data Hiding 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Fingerprint Verification Competition (2000),
  2. 2.
    Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3 & 4), 313–335 (1996)CrossRefGoogle Scholar
  3. 3.
    Boliek, M., Christopoulos, C., Majani, E.: JPEG2000 Part I Final Draft International Standard. Number ISO/IEC FDIS 15444-1. ISO/IEC JTC1/SC29/WG1 N1855 (August 2000)Google Scholar
  4. 4.
    Brislawn, C.M., Bradley, J.N., Onyshezak, R.J., Hopper, T.: The FBI compression standard for digitized fingerprint images. In: Proc. SPIE, Denver, CO, August 1996, vol. 2847, pp. 344–355 (1996)Google Scholar
  5. 5.
    Brislawn, C.M., Bradley, J.N., Hopper, T.: The FBI Wavelet/Scalar Quantization Standard for gray-scale fingerprint image compressionGoogle Scholar
  6. 6.
    FBI. WSQ Gray-Scale Fingerprint Image Compression Specification. Document No. IAFIS-IC-0110 (v2) (February 1993); Drafted by T. Hopper, C. M. Brislawn and J. N. BradleyGoogle Scholar
  7. 7.
    Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. on Image Processing 8(1), 58–68 (1999)CrossRefGoogle Scholar
  8. 8.
    Jain, A.K., Uludag, U.: Hiding Biometric Data. IEEE Trans. on Pattern Analysis and Machine Intelligence 25(11), 1494–1498 (2003)CrossRefGoogle Scholar
  9. 9.
    Kobayashi, M., Swanson, M.D., Tewfik, A.H.: Multimedia Data Embedding and Watermarking Technologies 86(6), 1064–1087 (June 1998)Google Scholar
  10. 10.
    Moulin, P., Mihcak, M.K.: A Framework for Evaluating the Data-Hiding Capacity of Image Sources. IEEE Trans. on Image Processing 11(9), 1029–1042 (2002)CrossRefGoogle Scholar
  11. 11.
    Petitcolas, F.A., Anderson, R.J., Kuhn, M.G.: Information Hiding - A Survey 87(7), 1062–1078 (July 1999)Google Scholar
  12. 12.
    Ramkumar, M., Akansu, A.N.: Capacity Estimates for Data-Hiding in Compressed Images. IEEE Trans. on Image Processing 10(8), 1252–1263 (2001)MATHCrossRefGoogle Scholar
  13. 13.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: Secure Data Hiding in Wavelet Compressed Fingerprint Images. In: Proc. ACM Multimedia, Marina del Rey, CA, October 2000, pp. 127–130 (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Nalini K. Ratha
    • 1
  • Miguel A. Figueroa-Villanueva
    • 1
  • Jonathan H. Connell
    • 1
  • Ruud M. Bolle
    • 1
  1. 1.IBM Thomas J. Watson Research CenterHawthorneUSA

Personalised recommendations