Image and Template Security for Palmprint

  • Munaga V. N. K. Prasad
  • B. Adinarayana
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 243)


The wide spread use of biometrics in real world causes more security and privacy concerns to be raised, because conventional biometric systems store biometric templates as it is in database without any security, and this may lead to the possibility of tracking personal information stored in database; moreover, biometric templates are not revocable and are unusable throughout their life time once they are lost or stolen. To overcome this non-revocability of biometrics, we proposed two methods for image security and template security in this paper (these methods are also applicable for some of the biometric traits); for image security, we used chaotic mixing with watermarking technique; first chaotic mixing is applied to the host image, and then, this resultant image is embedded in a sample (cover or carrier) image, and if the intruder gets the chaotic mixed image, he/she cannot get back the original host image, and for template security, we shuffled the palmprint template according to the input random number. This shuffling scheme increases the imposter matching score leaving genuine matching score.


Chaotic mixing Watermarking Cryptography Log-Gabor filter Pearson correlation coefficient 


  1. 1.
    Huang, D.S., Jia, W., Zang, D.: Palmprint verification based on principal lines. Pattern Recogn. 41(4) (2008)Google Scholar
  2. 2.
    Laadjel, M., Bouridane, A., Kurugollu, F., Boussakta, S.: Palmprint recognition using Fisher-Gabor feature extraction. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICSSP), pp. 1709–1712 (2008)Google Scholar
  3. 3.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. (End-to-End Security), 40 (2001)Google Scholar
  4. 4.
    Kong, A., Zhang, D., Kamel, M.: Three measures for secure palmprint identification. Pattern Recogn. 41 (2008)Google Scholar
  5. 5.
    Wu, L., Yuan, S.: A face based fuzzy vault scheme for secure online authentication. In: Second International Symposium on Data, Privacy and E-Commerce (ISDPE), Nov 2010, pp. 45–49Google Scholar
  6. 6.
    Wang, Z., Wang, S., Ding, Q.: A secure face recognition algorithm based on adaptive non-uniform quantization. In: First International Conference on Pervasive Computing, Signal Processing and Applications (PCSPA), pp. 1115–1118 (2010)Google Scholar
  7. 7.
    Chen, B., Chandran, V.: Biometric template security using higher order spectra. In: IEEE International Conference On Acoustics Speech and Signal Processing (ICASSP), pp. 1730–1733 (2010)Google Scholar
  8. 8.
    Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55, 1081–1088 (2006)Google Scholar
  9. 9.
    Vatsa, M., Singh, R., Mitra, P., Noore, A.: Digital watermarking based secure multimodal biometric system. In: IEEE International Conference on Systems, Man and Cybernetics, vol. 3, pp. 2983–2987 (2004)Google Scholar
  10. 10.
    Teoh, A.B.J., Ong, T.S.: Secure biometric template protection via randomized dynamic quantization transformation. In: International Symposium on Biometrics and Security Technologies (ISBAST), pp. 1–6 (2008)Google Scholar
  11. 11.
    Yang, S., Verbauwhede, I.: Secure IRIS verification. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 133–136 (2007)Google Scholar
  12. 12.
    Barni, M., Bartolini, F., Cappllini, V., Piva, A.: Copyright protection of digital images by embedded unperceivable marks. Image Vis. Comput. 16 (1998)Google Scholar
  13. 13.
    Pereira, S.: Robust digital image watermarking. Doctoral Thesis, University of Geneva (2000)Google Scholar
  14. 14.
    Pitas, I.: A method for watermark casting on digital image. IEEE Trans. Circuits Syst. Video Technol. 8, 775–780 (2002)CrossRefGoogle Scholar
  15. 15.
    Voyatzis, G., Pitas, I.: Digital image watermarking using mixing systems. Comput. Graph. 22, 405–416 (1998)Google Scholar
  16. 16.
    Tefas, A., Pitas, L.: Image authentication using chaotic mixing systems. In: IEEE International Symposium on Circuits and Systems (ISCAS), vol. 1, pp. 216–219 (2000)Google Scholar
  17. 17.
    Shu, Z., Li, G., Gan, L., Zhan, L., Fang, W.: Image watermarking based on wavelet-based contourlet packet transform with best tree. In: Second International Symposium on Electronic Commerce and Security (ISECS), vol. 1, pp. 203–207 (2009)Google Scholar
  18. 18.
    Zhao, H.: Algorithm of digital image watermarking technique combined with HVS. In: IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 774–777 (2010)Google Scholar
  19. 19.
    Zhang, C., Wang, J.: Digital image watermarking algorithm with double encryption by Arnold transform and logistic. In: Fourth International Conference on Network Computing and Advanced Information Management, vol. 1, pp. 329–334 (2008)Google Scholar
  20. 20.
    Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25, 1494–1498 (2003)CrossRefGoogle Scholar
  21. 21.
    Cao, J., Li, A., Lv, G.: Study on multiple watermarking scheme for GIS vector data. In: 18th International Conference on Geoinformatics, pp. 1–6 (2010)Google Scholar
  22. 22.
    Kanade, S., Petrovska-Delacretaz, D., Dorizzi, B.: Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 120–127 (2009)Google Scholar
  23. 23.
    Fan, L., Duan, H., Long, F.: Face recognition by subspace analysis of 2D Log-Gabor wavelets features. In: Third International Conference on Intelligent system and Knowledge Engineering (ISKE), vol. 1, pp. 1167–1172 (2008)Google Scholar
  24. 24.
    IITD Touchless Palmprint Database:

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.IDRBTHyderabadIndia

Personalised recommendations