Advertisement

A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition

  • Guorong Xuan
  • Junxiang Zheng
  • Chengyun Yang
  • Yun Q. Shi
  • Dekun Zou
  • Liu Liansheng
  • Bai Weichao
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3304)

Abstract

This paper proposes an internet-based personal identity verification system using lossless data hiding and fingerprint recognition technologies. At the client side, the SHA-256 hash of the original fingerprint image and sensitive personal information are encrypted and embedded into the fingerprint image using an advanced lossless data hiding scheme. At the service provider side, after the hidden data are extracted out, the fingerprint image can be recovered without any distortion due to the usage of the lossless data hiding scheme. Hence, the originality of the fingerprint image can be ensured via hash check. The extracted personal information can be used to obtain the correct fingerprint feature from the database. The fingerprint matching can finally verify the client’s identity. The experimental results demonstrate that our proposed system is effective. It can find wide applications in e-banking and e-government systems to name a few.

Keywords

Image Watermark Watermark Scheme Data Hiding Marked Image Fingerprint Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Xuan, G., Chen, J., Zhu, J., Shi, Y.Q., Ni, Z., Su, W.: Distortionless data hiding based on integer wavelet transform. In: Proceedings of IEEE Workshop on Multimedia Signal Processing (MMSP 2002). US Virgin Islands, December 2002, vol. 38(25), pp. 1646–1648 (2002); IEE Electronics Letters 38(25), 1646–1648 (December 2002)Google Scholar
  2. 2.
    Veridicom Authentication Software Development Kit: Users Manual (For Evaluation) Version 3.0.0Google Scholar
  3. 3.
  4. 4.

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Guorong Xuan
    • 1
  • Junxiang Zheng
    • 1
  • Chengyun Yang
    • 1
  • Yun Q. Shi
    • 2
  • Dekun Zou
    • 2
  • Liu Liansheng
    • 3
  • Bai Weichao
    • 3
  1. 1.Tongji UniversityShanghaiChina
  2. 2.New Jersey Institute of TechnologyNew JerseyUSA
  3. 3.Baojia Electronic Equipments, Co. LtdShenzhenChina

Personalised recommendations