A Data Hiding Method with Capabilities for Information Authentication and Face Image Recovery in E-commerce Applications

A data hiding method is proposed, which has capabilities of data authentication and recovery of the buyer's facial image for security of authentication in e-commence applications. The method embeds information of the e-commence transaction and certain authentication signals of the image and the information of the face region in the image into the higher-frequency coefficients of the DCT of the non-face image portion by us.ing an adaptive JPEG quantization table. When the system receives the buyer's image, the embedded data can be extracted to judge the truthfulness of both the transmitted image and the e-commence transaction. When the face region in the image was tempered with, the original face image can be recovered by using the extracted information. Experimental results show the feasibility of the proposed method.

[1]  Sun-Yuan Kung,et al.  Face recognition/detection by probabilistic decision-based neural network , 1997, IEEE Trans. Neural Networks.

[2]  Kirk L. Kroeker,et al.  Graphics and Security: Exploring Visual Biometrics , 2002, IEEE Computer Graphics and Applications.

[3]  Monson H. Hayes,et al.  Face detection and recognition using hidden Markov models , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[4]  Yeuan-Kuen Lee,et al.  A NOVEL QUANTITY BASED ON CLIPPING STATISTICS FOR JSTEG STEGANALYSIS , 2006 .

[5]  Patrick J. Flynn,et al.  A survey of approaches to three-dimensional face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[6]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[7]  Joseph G. Tront,et al.  E-commerce security issues , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[8]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[9]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[10]  Alex Pentland,et al.  Face Recognition for Smart Environments , 2000, Computer.