Biometric based authentication using wavelets and Visual Cryptography

Biometrics is the detailed measurements of the human body. Biometrics deals with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioural characteristics. Protection of biometric data is gaining interest and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Among the various biometrics, iris is very famous in the authentication area, as they are unique to each person and are mainly used for the establishment of instant personal identity. In this paper, a novel method using wavelet decomposition and Visual Cryptography is proposed to hide an iris image and it is embedded into a cover image. Results show that the proposed system can resist various attacks while maintaining the visual quality of the cover image

[1]  Chin-Chen Chang,et al.  Sharing a secret gray image in multiple images , 2002, First International Symposium on Cyber Worlds, 2002. Proceedings..

[2]  Chin-Chen Chang,et al.  A new scheme for sharing secret color images in computer network , 2000, Proceedings Seventh International Conference on Parallel and Distributed Systems (Cat. No.PR00568).

[3]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[4]  Ching-Nung Yang,et al.  New Colored Visual Secret Sharing Schemes , 2000, Des. Codes Cryptogr..

[5]  Ching-Yung Lin Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection , 2000 .

[6]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[7]  Eric R. Verheul,et al.  Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..

[8]  John McHugh,et al.  A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[9]  R. Youmaran,et al.  An Improved Visual Cryptography Scheme for Secret Hiding , 2006, 23rd Biennial Symposium on Communications, 2006.

[10]  C. C. Chang,et al.  An Ingenious Data Hiding Scheme for Color Retinal Image , 2009 .

[11]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[12]  J. Daugman,et al.  Epigenetic randomness, complexity and singularity of human iris patterns , 2001, Proceedings of the Royal Society of London. Series B: Biological Sciences.

[13]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.