Data Hiding in Iris Image for Privacy Protection

ABSTRACT This paper proposes a novel iris image data hiding scheme for privacy protection. Privacy personal data is embedded into the iris image such that its impact on the iris recognition is minimised. This is achieved by restricting the modifications of the embedding within the regions that seldom affects the iris recognition with the help of the STC (syndrome trellis coding) framework. We also propose a novel distortion function to measure the impact of the data embedding on iris recognition, where the regions with important iris features are assigned with high embedding cost. Experimental results show that, by using our proposed scheme, we can embed sufficient data into the iris image with high recognition accuracy maintained.

[1]  Pramodita Sharma 2012 , 2013, Les 25 ans de l’OMC: Une rétrospective en photos.

[2]  Alex ChiChung Kot,et al.  Privacy Protection of Fingerprint Database , 2011, IEEE Signal Processing Letters.

[3]  Richa Singh,et al.  Feature based RDWT watermarking for multimodal biometric system , 2009, Image Vis. Comput..

[4]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Santoso Wibowo,et al.  A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system , 2017, Multimedia Tools and Applications.

[6]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[7]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[8]  C. Martin 2015 , 2015, Les 25 ans de l’OMC: Une rétrospective en photos.

[9]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[10]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[11]  Mita Paunwala,et al.  Biometric template protection with DCT-based watermarking , 2013, Machine Vision and Applications.

[12]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.

[13]  Bin Ma,et al.  Protecting Biometric Templates Using Authentication Watermarking , 2010, PCM.

[14]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[15]  Chin-Chen Chang,et al.  A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.

[16]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[17]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[19]  Sheetal Chaudhary,et al.  A new template protection approach for iris recognition , 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions).

[20]  A. James 2010 , 2011, Philo of Alexandria: an Annotated Bibliography 2007-2016.

[21]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[22]  Xinpeng Zhang,et al.  Effective reversible data hiding in encrypted image with privacy protection for image content , 2015, J. Vis. Commun. Image Represent..

[23]  M. Sujatha,et al.  Recognition of Human Iris Patterns for Biometric Identification , 2015 .

[24]  Jessica J. Fridrich,et al.  Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.

[25]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[26]  Thirimachos Bourlai,et al.  Securing multimodal biometric data through watermarking and steganography , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).