A novel image hiding approach based on correlation analysis for secure multimodal biometrics

This paper proposes a novel multimodal biometric images hiding approach based on correlation analysis, which is used to protect the security and integrity of transmitted multimodal biometric images for network-based identification. Compared with existing methods, the correlation between the biometric images and the cover image is first analyzed by partial least squares (PLS) and particle swarm optimization (PSO), aiming to make use of the abundant information of cover image to represent the biometric images. Representing the biometric images using the corresponding content of cover image results in the generation of the residual images with much less energy. Then, considering the human visual system (HVS) model, the residual images as the secret images are embedded into the cover image using middle-significant-bit (MSB) method. Extensive experimental results demonstrate that the proposed approach not only provides good imperceptibility but also resists some common attacks and assures the effectiveness of network-based multimodal biometrics identification.

[1]  Hedieh Sajedi,et al.  Cover Selection Steganography Method Based on Similarity of Image Blocks , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.

[2]  Abd Allah Mohamed Mostafa Embedded biometric data for a secure authentication watermarking , 2007 .

[3]  Jiying Zhao,et al.  Human visual system based adaptive digital image watermarking , 2008, Signal Process..

[4]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[5]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[6]  Riccardo Poli,et al.  Particle swarm optimization , 1995, Swarm Intelligence.

[7]  Te-Hsiu Sun,et al.  Applying particle swarm optimization algorithm to roundness measurement , 2009, Expert Syst. Appl..

[8]  Jun Kong,et al.  User-Specific Iris Authentication Based on Feature Selection , 2008, 2008 International Conference on Computer Science and Software Engineering.

[9]  Stefan Winkler,et al.  A vision-based masking model for spread-spectrum image watermarking , 2002, IEEE Trans. Image Process..

[10]  Richa Singh,et al.  Robust biometric image watermarking for fingerprint and face template protection , 2006, IEICE Electron. Express.

[11]  M. Jamzad,et al.  A robust steganography algorithm based on texture similarity using Gabor filter , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[12]  Tieniu Tan,et al.  Invariant texture segmentation via circular Gabor filters , 2002, Object recognition supported by user interaction for service robots.

[13]  Richa Singh,et al.  Feature based RDWT watermarking for multimodal biometric system , 2009, Image Vis. Comput..

[14]  Richa Singh,et al.  Enhancing security of fingerprints through contextual biometric watermarking. , 2007, Forensic science international.

[15]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[16]  Yuhong Li,et al.  Parameter optimization of nonlinear grey Bernoulli model using particle swarm optimization , 2009, Appl. Math. Comput..

[17]  Lei Tian,et al.  Chaotic secure content-based hidden transmission of biometric templates , 2007 .

[18]  Anil K. Jain,et al.  Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.

[19]  Yuan-Yu Tsai,et al.  A novel data hiding scheme for color images using a BSP tree , 2007, J. Syst. Softw..

[20]  Wen-Hsiang Tsai,et al.  Data hiding in grayscale images by dynamic programming based on a human visual model , 2009, Pattern Recognit..

[21]  Mohamed Mostafa Abd Allah,et al.  Embedded biometric data for a secure authentication watermarking , 2007 .

[22]  Chin-Chen Chang,et al.  A lossless data embedding technique by joint neighboring coding , 2009, Pattern Recognit..

[23]  Po-Wei Hsu,et al.  A robust associative watermarking technique based on similarity diagrams , 2007, Pattern Recognit..

[24]  Alejandro F. Frangi,et al.  Two-dimensional PCA: a new approach to appearance-based face representation and recognition , 2004 .

[25]  Ran-Zan Wang,et al.  An image-hiding method with high hiding capacity based on best-block matching and k-means clustering , 2007, Pattern Recognit..

[26]  Shantaram Vasikarla,et al.  Performance evaluation of an incorporated DCT block-based watermarking algorithm with human visual system model , 2005, Pattern Recognit. Lett..

[27]  Nalini K. Ratha,et al.  Secure data hiding in wavelet compressed fingerprint images , 2000, MULTIMEDIA '00.

[28]  Roberto Schirru,et al.  Applying particle swarm optimization algorithm for tuning a neuro-fuzzy inference system for sensor monitoring , 2009 .

[29]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[30]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.