Abstract
In this paper, a strict authentication watermarking scheme based on multi-modal biometric images and near sets was designed and introduced. The proposed scheme has a number of stages including feature enrolment for extracting the human facial features. Three human facial features which are nose length, nose width and distance between eyes balls are extracted. The near sets approach is adapted to choose the best feature among the considered features. The watermark is generated from hashing the extracted facial features that then encrypted using Advanced Encryption Standard (AES) technique and embedding the encrypted value into the human fingerprint image in order to confirm the integrity of respective biometric data. The experimental result shows that the proposed scheme guarantees the security assurance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Andreeva, E., Preneel, B.: A Three-Property-Secure Hash Function. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 228–244. Springer, Heidelberg (2009)
Dunkelman, O., Keller, N.: The effects of the omission of last round’s MixColumns on AES. Information Processing Letters 110, 304–308 (2010)
Eastlake, D., Jones, P.: US secure hash algorithm-1 (SHA1). Network Working Group. Category: Informational, pp. 1–22 (2001)
Farhan, S.M., Khan, S.A., Jamal, H.: An 8-bit systolic AES architecture for moderate data rate applications. Microprocessors and Microsystems 33, 221–231 (2009)
Federal Information Processing Standards Publication 197 Advanced encryption standard (AES). NIST (2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Feng, H., Wah, C.C.: Private key generation from on-line handwritten signatures. Information Management & Computer Security, 159–164 (2002)
Haouzia, A., Noumeir, R.: Methods for image authentication: a survey. Multimed Tools Appl. 39, 1–46 (2008)
Hassanien, A., Abraham, A., Kacprzyk, J., Peters, J.F.: Computational Intelligence in Multimedia Processing: Foundation and Trends. In: Computational Intelligence in Multimedia Processing: Foundation and Trends. SCI, vol. 96, pp. 3–49 (2008)
He, W., Peng, X., Qin, W., Meng, X.: The keyed optical Hash function based on cascaded phase-truncated Fourier transforms. Optics Communications 283, 2328–2332 (2010)
HouZhen, W., HuanGuo1, Z., QianHong, W., Yu, Z., ChunLei, L., XinYu, Z.: Design theory and method of multivariate hash function. Information Sciences 53, 1977–1987 (2010)
Jain, A.K., Bolle, R., Pankanti, S.: Biometrics: personal identification in networked society. Kluwer Academic Publishers, Dordrecht (1999)
Jain, A.K., Pankanti, S.: Fingerprint classification and matching. In: Bovic, A. (ed.) Image and Video Processing Handbook. Academic Press, NewYork (2000)
Jain, A.K., Ross, A., Prabakhar, S.: An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology. Special Issue on Image and Video Based Biometrics 14(1) (January 2004)
Jain, A.K., Uludag, U.: Hiding Biometric Data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 1494–1498 (2003)
Kermani, M.M., Masoleh, A.R.: Fault detection structures of the S-boxes and the inverse S-boxes for the advanced encryption standard. J. Electron Test 25, 225–245 (2009)
Kim, W.G., Lee, H.: Multimodal biometric image watermarking using two-stage integrity verification. Signal Processing 89, 2385–2399 (2009)
Lian, S., Sun, J., Wang, Z.: Secure hash function based on neural network. Neurocomputing 69, 2346–2350 (2006)
Mukhopadhyay, D.: An improved fault based attack of the advanced encryption standard. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 421–434. Springer, Heidelberg (2009)
Peters, J.F.: Fuzzy sets, near sets, and rough sets for your computational intelligence toolbox. In: Hassanien, A.-E., Abraham, A., Herrera, F. (eds.) Foundations of Computational Intelligence Volume 2. Studies in Computational Intelligence, vol. 202, pp. 3–25. Springer, Heidelberg (2009)
Peters, J.F.: Near Sets. General Theory About Nearness of Objects. Applied Mathematical Sciences 1, 2609–2629 (2007)
Peters, J.F., Ramanna, S.: Feature Selection: Near Set Approach. In: Raś, Z.W., Tsumoto, S., Zighed, D.A. (eds.) MCD 2007. LNCS (LNAI), vol. 4944, pp. 57–71. Springer, Heidelberg (2008)
Pongyupinpanich, S., Choomchuay, S.: An Architecture for a SHA-1 Applied for DSA. In: Proceeding of 3rd Asian International Mobile Computing Conference (AMOC), Thailand, May 26-28, 2004, pp. 8–12 (2004)
Seoa, M.S., Haitsmab, J., Kalkerb, T., Yooa, C.D.: A robust image fingerprinting system using the Radon transform. Signal Processing: Image Communication 19, 325–339 (2004)
Skowron, A., Stepaniuk, J.: Generalized approximation spaces. In: Lin, T.Y., Wildberger, A.M. (eds.) Soft Computing. Simulation Councils, San Diego, pp. 18–21 (1995)
Snelick1, R., Uludag, U., Mink1, A., Indovina1, M., Jain, A.: Large scale evaluation of multimodal biometric authentication using state-of-the-art systems. IEEE Transactions on Pattern Analysis and Machine Intelligence 27, 450–455 (2005)
Vatsa, M., Singh, R., Noore, A., Houck, M.M., Morris, K.: Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 2, 23–28 (2006)
Wen, C.Y., Yang, K.T.: Image authentication for digital image evidence. Forensic Science Journal 5, 1–11 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
El Bakrawy, L.M., Ghali, N.I., Hassanien, A.E., Peters, J.F. (2011). Strict Authentication of Multimodal Biometric Images Using Near Sets. In: Gaspar-Cunha, A., Takahashi, R., Schaefer, G., Costa, L. (eds) Soft Computing in Industrial Applications. Advances in Intelligent and Soft Computing, vol 96. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20505-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-20505-7_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20504-0
Online ISBN: 978-3-642-20505-7
eBook Packages: EngineeringEngineering (R0)