Robust Hiding of Fingerprint-Biometric Data into Audio Signals

  • Muhammad Khurram Khan
  • Ling Xie
  • Jiashu Zhang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4642)

Abstract

This paper presents a novel fingerprint-biometric template protection scheme, in which templates are concealed into audio signals. Fingerprint templates are encrypted by chaotic encryption and then hid into the chaotically selected random sampling points of the host audio signal by a new non-uniform discrete Fourier transform (NDFT)-based data hiding method. The template extraction process is completely blind and does not require original audio signal, thus the extraction depends on the secret key. Experimental results show that the proposed scheme is robust against common signal processing attacks and achieves higher verification accuracy.

Keywords

Audio Signal Watermark Scheme Authentication System Biometric Data Biometric System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Anil, K.J., Prabhakar, S., Hong, L., Pankanti, S.: Filterbank-based fingerprint matching. IEEE Transactions On Image Processing 9, 846–859 (2000)CrossRefGoogle Scholar
  2. 2.
    Anil, K.J., Pankanti, S., Bolle, R.: Biometrics: Personal Identification in Networked Society. Kluwer, USA (1999)Google Scholar
  3. 3.
    Khan, M.K., Jiashu, Z., Lei, T.: Chaotic secure content-based hidden transmission of biometrics templates. Chaos, Solitons, and Fractals, Elsevier Science 32(5), 1749–1759 (2007)CrossRefGoogle Scholar
  4. 4.
    Anil, K.J., Prabhakar, S., Hong, L.: A multichannel approach to fingerprint classification. IEEE Transactions on Pattern Analysis and Machine Intelligence 21, 348–359 (1999)CrossRefGoogle Scholar
  5. 5.
    Daugman, J.: High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15, 1148–1161 (1999)CrossRefGoogle Scholar
  6. 6.
    Anil, K.J., Umut, U.: Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 1494–1498 (2003)CrossRefGoogle Scholar
  7. 7.
    Gunsel, B., Umut, U., Tekalp, A.M.: Robust watermarking of fingerprint images. Pattern Recognition, Elsevier Science Ltd. 35, 2739–2747 (2002)MATHGoogle Scholar
  8. 8.
    Khan, M.K., Jiashu, Z., Lei, T.: Protecting biometric data for personal identification. In: Li, S.Z., Lai, J.-H., Tan, T., Feng, G.-C., Wang, Y. (eds.) SINOBIOMETRICS 2004. LNCS, vol. 3338, pp. 629–638. Springer, Heidelberg (2004)Google Scholar
  9. 9.
    Ratha, N., Connell, J., Bolle, R.: Enhancing security and privacy in biometrics-based authentication systems. IBM System Journal 40, 614–634 (2001)CrossRefGoogle Scholar
  10. 10.
    Davida, G.I., Frankel, Y., Matt, B.J.: On enabling secure applications through online biometric identification. In: IEEE Symposium on Security and Privacy, pp. 148–157 (1998)Google Scholar
  11. 11.
    Davida, G.I., Frankel, Y., Matt, B.J., Peralta, R.: On the relation of error correction and cryptography to an offline biometric based identification scheme. In: Proc. Workshop Coding and Cryptography, pp. 129–138 (1999)Google Scholar
  12. 12.
    Soutar, C., Roberge, D., Stojanov, S.A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric encryption using image processing. In: Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178–188 (1998)Google Scholar
  13. 13.
    Soutar, C., Roberge, D., Stojanov, S.A, Gilroy, R., Vijaya Kumar, B.V.K.: Biometric encryption, enrollment and verification procedures. In: Proc. SPIE, Optical Pattern Recognition IX, vol. 3386, pp. 24–35 (1998)Google Scholar
  14. 14.
    Andy, A.: Vulnerabilities in biometric encryption systems. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, Springer, Heidelberg (2005)Google Scholar
  15. 15.
    Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proc. of the 4th Int. Conf. on Audio and Video Based Biometric Person Authentication, pp. 393-402, UK (2004) Google Scholar
  16. 16.
    Verbitskiy, E., Tuyls, P., Denteneer, D., Linnartz, J.P.: Reliable biometric authentication with privacy protection. In: Proc. of the 24th Symposium on Inf. Theory, pp. 125–132 (2003)Google Scholar
  17. 17.
    Tuyls, P., Gosling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)Google Scholar
  18. 18.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92, 948–960 (2004)CrossRefGoogle Scholar
  19. 19.
    Yeung, M.M., Pankanti, S.: Verification watermarks on fingerprint recognition and retrieval. Journal of Electronic Imaging 9, 468–476 (2000)CrossRefGoogle Scholar
  20. 20.
    Sonia, J.: Digital watermarking techniques: a case study in fingerprints and faces. In: Proc. Indian Conference on Computer Vision, Graphics, and Image Processing, pp. 139–144 (2000)Google Scholar
  21. 21.
    Andrew, D.K.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12, 441–444 (2005)CrossRefGoogle Scholar
  22. 22.
    Bagchi, S., Mitra, S.K.: The Nonuniform Discrete Fourier Transform and its application in filter design. IEEE Trans. on Circuits and System: Analog and Digital Signal Processing 43, 422–433 (1996)CrossRefGoogle Scholar
  23. 23.
    Ling, X., Jiashu, Z., Hong-Jie, H.: NDFT-based Audio Watermarking Scheme with High Security. In: IEEE ICPR, vol. 4, pp. 270–273 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Muhammad Khurram Khan
    • 1
    • 2
  • Ling Xie
    • 2
  • Jiashu Zhang
    • 2
  1. 1.Research Group for Biometrics & Security Engineering, Bahria University, Dept. of Computer Science & Engineering, 13- National Stadium Road, KarachiPakistan
  2. 2.Sichuan Key Lab of Signal & Information Processing, Southwest Jiaotong University, Chengdu 610031China

Personalised recommendations