Skip to main content

Strict Authentication of Multimodal Biometric Images Using Near Sets

  • Conference paper
Soft Computing in Industrial Applications

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 96))

Abstract

In this paper, a strict authentication watermarking scheme based on multi-modal biometric images and near sets was designed and introduced. The proposed scheme has a number of stages including feature enrolment for extracting the human facial features. Three human facial features which are nose length, nose width and distance between eyes balls are extracted. The near sets approach is adapted to choose the best feature among the considered features. The watermark is generated from hashing the extracted facial features that then encrypted using Advanced Encryption Standard (AES) technique and embedding the encrypted value into the human fingerprint image in order to confirm the integrity of respective biometric data. The experimental result shows that the proposed scheme guarantees the security assurance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Andreeva, E., Preneel, B.: A Three-Property-Secure Hash Function. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 228–244. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  2. Dunkelman, O., Keller, N.: The effects of the omission of last round’s MixColumns on AES. Information Processing Letters 110, 304–308 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  3. Eastlake, D., Jones, P.: US secure hash algorithm-1 (SHA1). Network Working Group. Category: Informational, pp. 1–22 (2001)

    Google Scholar 

  4. Farhan, S.M., Khan, S.A., Jamal, H.: An 8-bit systolic AES architecture for moderate data rate applications. Microprocessors and Microsystems 33, 221–231 (2009)

    Article  Google Scholar 

  5. Federal Information Processing Standards Publication 197 Advanced encryption standard (AES). NIST (2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  6. Feng, H., Wah, C.C.: Private key generation from on-line handwritten signatures. Information Management & Computer Security, 159–164 (2002)

    Google Scholar 

  7. Haouzia, A., Noumeir, R.: Methods for image authentication: a survey. Multimed Tools Appl. 39, 1–46 (2008)

    Article  Google Scholar 

  8. Hassanien, A., Abraham, A., Kacprzyk, J., Peters, J.F.: Computational Intelligence in Multimedia Processing: Foundation and Trends. In: Computational Intelligence in Multimedia Processing: Foundation and Trends. SCI, vol. 96, pp. 3–49 (2008)

    Google Scholar 

  9. He, W., Peng, X., Qin, W., Meng, X.: The keyed optical Hash function based on cascaded phase-truncated Fourier transforms. Optics Communications 283, 2328–2332 (2010)

    Article  Google Scholar 

  10. HouZhen, W., HuanGuo1, Z., QianHong, W., Yu, Z., ChunLei, L., XinYu, Z.: Design theory and method of multivariate hash function. Information Sciences 53, 1977–1987 (2010)

    Google Scholar 

  11. Jain, A.K., Bolle, R., Pankanti, S.: Biometrics: personal identification in networked society. Kluwer Academic Publishers, Dordrecht (1999)

    Google Scholar 

  12. Jain, A.K., Pankanti, S.: Fingerprint classification and matching. In: Bovic, A. (ed.) Image and Video Processing Handbook. Academic Press, NewYork (2000)

    Google Scholar 

  13. Jain, A.K., Ross, A., Prabakhar, S.: An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology. Special Issue on Image and Video Based Biometrics 14(1) (January 2004)

    Google Scholar 

  14. Jain, A.K., Uludag, U.: Hiding Biometric Data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 1494–1498 (2003)

    Article  Google Scholar 

  15. Kermani, M.M., Masoleh, A.R.: Fault detection structures of the S-boxes and the inverse S-boxes for the advanced encryption standard. J. Electron Test 25, 225–245 (2009)

    Article  Google Scholar 

  16. Kim, W.G., Lee, H.: Multimodal biometric image watermarking using two-stage integrity verification. Signal Processing 89, 2385–2399 (2009)

    Article  MATH  Google Scholar 

  17. Lian, S., Sun, J., Wang, Z.: Secure hash function based on neural network. Neurocomputing 69, 2346–2350 (2006)

    Article  Google Scholar 

  18. Mukhopadhyay, D.: An improved fault based attack of the advanced encryption standard. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 421–434. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  19. Peters, J.F.: Fuzzy sets, near sets, and rough sets for your computational intelligence toolbox. In: Hassanien, A.-E., Abraham, A., Herrera, F. (eds.) Foundations of Computational Intelligence Volume 2. Studies in Computational Intelligence, vol. 202, pp. 3–25. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  20. Peters, J.F.: Near Sets. General Theory About Nearness of Objects. Applied Mathematical Sciences 1, 2609–2629 (2007)

    MATH  Google Scholar 

  21. Peters, J.F., Ramanna, S.: Feature Selection: Near Set Approach. In: Raś, Z.W., Tsumoto, S., Zighed, D.A. (eds.) MCD 2007. LNCS (LNAI), vol. 4944, pp. 57–71. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  22. Pongyupinpanich, S., Choomchuay, S.: An Architecture for a SHA-1 Applied for DSA. In: Proceeding of 3rd Asian International Mobile Computing Conference (AMOC), Thailand, May 26-28, 2004, pp. 8–12 (2004)

    Google Scholar 

  23. Seoa, M.S., Haitsmab, J., Kalkerb, T., Yooa, C.D.: A robust image fingerprinting system using the Radon transform. Signal Processing: Image Communication 19, 325–339 (2004)

    Article  Google Scholar 

  24. Skowron, A., Stepaniuk, J.: Generalized approximation spaces. In: Lin, T.Y., Wildberger, A.M. (eds.) Soft Computing. Simulation Councils, San Diego, pp. 18–21 (1995)

    Google Scholar 

  25. Snelick1, R., Uludag, U., Mink1, A., Indovina1, M., Jain, A.: Large scale evaluation of multimodal biometric authentication using state-of-the-art systems. IEEE Transactions on Pattern Analysis and Machine Intelligence 27, 450–455 (2005)

    Article  Google Scholar 

  26. Vatsa, M., Singh, R., Noore, A., Houck, M.M., Morris, K.: Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 2, 23–28 (2006)

    Article  Google Scholar 

  27. Wen, C.Y., Yang, K.T.: Image authentication for digital image evidence. Forensic Science Journal 5, 1–11 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

El Bakrawy, L.M., Ghali, N.I., Hassanien, A.E., Peters, J.F. (2011). Strict Authentication of Multimodal Biometric Images Using Near Sets. In: Gaspar-Cunha, A., Takahashi, R., Schaefer, G., Costa, L. (eds) Soft Computing in Industrial Applications. Advances in Intelligent and Soft Computing, vol 96. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20505-7_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20505-7_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20504-0

  • Online ISBN: 978-3-642-20505-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics