Image Security and Biometrics: A Review

Imaging security and biometrics are two heavily connected areas. The quick evolution of biometrics has raised the need of securing biometric data. A majority of this data is visual, which has lead to intensive development of image security techniques for biometric applications. In this paper we give a fast fly over image security approaches and imaging-related biometrics. We present the current state-of-the-art of the interplay between both areas. The emphasis in this paper is the computational methods.

[1]  Po-Whei Huang,et al.  Dental biometrics: Human identification based on teeth and dental works in bitewing radiographs , 2012, Pattern Recognit..

[2]  Patrick J. Flynn,et al.  WITHDRAWN: Useful features for human verification in near-infrared periocular images☆☆☆★★★ , 2012 .

[3]  Banafshe Arbab-Zavar,et al.  On guided model-based analysis for ear biometrics , 2011, Comput. Vis. Image Underst..

[4]  Namgyu Kim,et al.  Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents , 2010, Signal Process. Image Commun..

[5]  Hsien-Wen Tseng,et al.  Prediction-based reversible data hiding , 2009, Inf. Sci..

[6]  Jun Kong,et al.  A novel image hiding approach based on correlation analysis for secure multimodal biometrics , 2010, J. Netw. Comput. Appl..

[7]  Patrick J. Flynn,et al.  Genetically identical irises have texture similarity that is not detected by iris biometrics , 2011, Comput. Vis. Image Underst..

[8]  Ching-Nung Yang,et al.  Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability , 2010, Image Vis. Comput..

[9]  Ching-Nung Yang,et al.  Colored visual cryptography scheme based on additive color mixing , 2008, Pattern Recognit..

[10]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..

[11]  Hone-Ene Hwang An optical image cryptosystem based on Hartley transform in the Fresnel transform domain , 2011 .

[12]  Vasif V. Nabiyev,et al.  Medical image security and EPR hiding using Shamir's secret sharing scheme , 2011, J. Syst. Softw..

[13]  Hong Zhao,et al.  Steganalysis for palette-based images using generalized difference image and color correlogram , 2011, Signal Process..

[14]  David Zhang,et al.  A feature extraction method for use with bimodal biometrics , 2010, Pattern Recognit..

[15]  Xiaoyang Tan,et al.  Pattern Recognition , 2016, Communications in Computer and Information Science.

[16]  Bibhudendra Acharya,et al.  Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem , 2010, Biometrics Technology.

[17]  Chao-Hung Lin,et al.  A High Capacity 3D Steganography Algorithm , 2009, IEEE Transactions on Visualization and Computer Graphics.

[18]  Shang-Juh Kao,et al.  A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..

[19]  Edmundo Hoyle,et al.  A fusion approach to unconstrained iris recognition , 2012, Pattern Recognit. Lett..

[20]  Shaogang Gong,et al.  Facial expression recognition based on Local Binary Patterns: A comprehensive study , 2009, Image Vis. Comput..

[21]  Harry Wechsler,et al.  Robust human authentication using appearance and holistic anthropometric features , 2010, Pattern Recognit. Lett..

[22]  Hualou Liang,et al.  A blind source separation-based method for multiple images encryption , 2008, Image Vis. Comput..

[23]  Patrick J. Flynn,et al.  Pupil dilation degrades iris biometric performance , 2009, Comput. Vis. Image Underst..

[24]  Jiansheng Chen,et al.  Palmprint authentication using a symbolic representation of images , 2010, Image Vis. Comput..

[25]  Richa Singh,et al.  Feature based RDWT watermarking for multimodal biometric system , 2009, Image Vis. Comput..

[26]  Rama Chellappa,et al.  Face Recognition by Computers and Humans , 2010, Computer.

[27]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[28]  Ajay Kumar,et al.  Comparison and combination of iris matchers for reliable personal authentication , 2010, Pattern Recognit..

[29]  Rémy Boyer,et al.  How quantization based schemes can be used in image steganographic context , 2011, Signal Process. Image Commun..

[30]  Tieniu Tan,et al.  Toward Accurate and Fast Iris Segmentation for Iris Biometrics , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[31]  Alain Trémeau,et al.  Recent Trends in Color Image Watermarking , 2009 .

[32]  Jianhua Wu,et al.  Image encryption algorithm based on the multi-order discrete fractional Mellin transform , 2011 .

[33]  F. A. Nennie,et al.  Thorax biometrics from millimetre-wave images , 2010, Pattern Recognit. Lett..

[34]  Vassil S. Dimitrov,et al.  Fragile watermarking using finite field trigonometrical transforms , 2009, Signal Process. Image Commun..

[35]  Chin-Chen Chang,et al.  Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[36]  Zhong Jin,et al.  Two-Dimensional Local Graph Embedding Discriminant Analysis(F2DLGEDA) with Its Application to Face and Palm Biometrics , 2009, 2009 Chinese Conference on Pattern Recognition.

[37]  Chin-Chen Chang,et al.  Adaptive watermark mechanism for rightful ownership protection , 2008, J. Syst. Softw..

[38]  Rémy Boyer,et al.  Quantized based image watermarking in an independent domain , 2011, Signal Process. Image Commun..

[39]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[40]  Gaurav Bhatnagar,et al.  Fractional dual tree complex wavelet transform and its application to biometric security during communication and transmission , 2012, Future Gener. Comput. Syst..

[41]  Bart Jacobs,et al.  Biometrics and their use in e-passports , 2009, Image Vis. Comput..

[42]  Yu-Chih Huang,et al.  Reversible Data Hiding Based on Histogram , 2009, ICIC.

[43]  Aladdin M. Ariyaeeinia,et al.  Qualitative fusion of normalised scores in multimodal biometrics , 2009, Pattern Recognit. Lett..

[44]  Ingemar J. Cox,et al.  Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[45]  Gian Luca Marcialis,et al.  Group-specific face verification using soft biometrics , 2009, J. Vis. Lang. Comput..

[46]  Madasu Hanmandlu,et al.  Score level fusion of multimodal biometrics using triangular norms , 2011, Pattern Recognit. Lett..

[47]  Mircea Nicolescu,et al.  Hand-based verification and identification using palm-finger segmentation and fusion , 2009, Comput. Vis. Image Underst..

[48]  Wei Jia,et al.  Locality preserving discriminant projections for face and palmprint recognition , 2010, Neurocomputing.

[49]  Abd Allah Mohamed Mostafa Embedded biometric data for a secure authentication watermarking , 2007 .

[50]  A. Ben Hamza,et al.  Secret sharing approaches for 3D object encryption , 2011, Expert Syst. Appl..

[51]  Sangyoun Lee,et al.  Biometric Image Authentication using Watermarking , 2006, 2006 SICE-ICASE International Joint Conference.

[52]  Babak Mahdian,et al.  A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..

[53]  William Puech,et al.  Lossless 3D steganography based on MST and connectivity modification , 2010, Signal Process. Image Commun..

[54]  Ming-Shi Wang,et al.  A fuzzy c-means clustering-based fragile watermarking scheme for image authentication , 2009, Expert Syst. Appl..

[55]  Jun Jin,et al.  A secret image sharing based on neighborhood configurations of 2-D cellular automata , 2012 .

[56]  Nicolae Duta,et al.  A survey of biometric technology based on hand shape , 2009, Pattern Recognit..

[57]  Won-gyum Kim,et al.  Multimodal biometric image watermarking using two-stage integrity verification , 2009, Signal Process..

[58]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[59]  Fabio Roli,et al.  Personal identity verification by serial fusion of fingerprint and face matchers , 2009, Pattern Recognit..

[60]  Long-Wen Chang,et al.  Secure reversible visible image watermarking with authentication , 2010, Signal Process. Image Commun..

[61]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[62]  Jicheng Wang,et al.  A novel watermarking scheme for H.264/AVC video authentication , 2011, Signal Process. Image Commun..

[63]  Ioannis A. Kakadiaris,et al.  Profile-based 3D-aided face recognition , 2012, Pattern Recognit..

[64]  Patrick J. Flynn,et al.  Image understanding for iris biometrics: A survey , 2008, Comput. Vis. Image Underst..

[65]  Xuelong Li,et al.  A local Tchebichef moments-based robust image watermarking , 2009, Signal Process..

[66]  Allen Y. Yang,et al.  Robust Face Recognition via Sparse Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[67]  Xinpeng Zhang,et al.  Fragile watermarking scheme using a hierarchical mechanism , 2009, Signal Process..

[68]  Jeng-Shyang Pan,et al.  The optimized copyright protection system with genetic watermarking , 2008, Soft Comput..

[69]  David Zhang,et al.  Combine crossing matching scores with conventional matching scores for bimodal biometrics and face and palmprint recognition experiments , 2011, Neurocomputing.

[70]  Hae-Yeoun Lee,et al.  Reversible data hiding exploiting spatial correlation between sub-sampled images , 2009, Pattern Recognit..

[71]  Manuel Graña,et al.  Face recognition with lattice independent component analysis and extreme learning machines , 2012, Soft Comput..

[72]  Ashraf Darwish,et al.  The use of computational intelligence in digital watermarking: review, challenges, and new trends , 2011 .

[73]  Patrick J. Flynn,et al.  Useful features for human verification in near-infrared periocular images , 2011, Image Vis. Comput..

[74]  Mingguang Shan,et al.  Fractional Fourier-domain random encoding and pixel scrambling technique for double image encryption , 2012 .

[75]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[76]  Chin-Chen Chang,et al.  Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector , 2010, Digit. Signal Process..

[77]  Atilla Baskurt,et al.  A Comprehensive Survey on Three-Dimensional Mesh Watermarking , 2008, IEEE Transactions on Multimedia.

[78]  Bruce J. Tromberg,et al.  Face Recognition in Hyperspectral Images , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[79]  David Zhang,et al.  A survey of palmprint recognition , 2009, Pattern Recognit..

[80]  Yuan Yan Tang,et al.  Multiscale facial structure representation for face recognition under varying illumination , 2009, Pattern Recognit..

[81]  Patrick J. Flynn,et al.  Degradation of iris recognition performance due to non-cosmetic prescription contact lenses , 2010, Comput. Vis. Image Underst..

[82]  Atilla Baskurt,et al.  A Comprehensive Survey on Three-Dimensional , 2008 .

[83]  Chin-Chen Chang,et al.  A secure fragile watermarking scheme based on chaos-and-hamming code , 2011, J. Syst. Softw..

[84]  Ramachandra Raghavendra,et al.  Designing efficient fusion schemes for multimodal biometric systems using face and palmprint , 2011, Pattern Recognit..