A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system

Biometric security is a fast growing area that gains an increasing interest in the last decades. Digital encryption and hiding techniques provide an efficient solution to protect biometric data from accidental or intentional attacks. In this paper, a highly secure encryption/hiding scheme is proposed to ensure secure transmission of biometric data in multimodal biometric identification/authentication system. The secret fingerprint and iris vectors are sparsely approximated using accelerated iterative hard thresholding technique and then embedded in the host Slantlet-SVD domain of face image. Experiments demonstrate the efficiency of our technique for both encryption and hiding purpose, where the secret biometric information is well encrypted and still extractable with high fidelity even though the carrier image is seriously corrupted. Our experimental results show the efficiency of the proposed technique in term of robustness to attacks, Invisibility, and security.

[1]  Reena Mary George Facial Template Protection Using Extended Visual Cryptography And Chaotic Encryption , 2013 .

[2]  Krunal P Rane,et al.  SVD-Based Digital Image Watermarking , 2013 .

[3]  Anushikha Singh,et al.  Digital right management control for joint ownership of digital images using biometric features , 2014, 2014 International Conference on Signal Processing and Integrated Networks (SPIN).

[4]  Ingemar J. Cox,et al.  The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..

[5]  Kazuya Nakano,et al.  Encrypted sensing for enhancing security of biometric authentication , 2014, 2014 13th Workshop on Information Optics (WIO).

[6]  Guillermo Sapiro,et al.  Sparse Representation for Computer Vision and Pattern Recognition , 2010, Proceedings of the IEEE.

[7]  B. Kiran Bala,et al.  Multi Modal Biometrics using Cryptographic Algorithm , 2014 .

[8]  Pritee Khanna,et al.  Biometric template protection using cancelable biometrics and visual cryptography techniques , 2016, Multimedia Tools and Applications.

[9]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  Anil K. Jain,et al.  Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.

[11]  Anil K. Jain,et al.  FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.

[12]  Syed Abdul Rahman Al-Haddad,et al.  Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition , 2016, Multimedia Tools and Applications.

[13]  Gaurav Bhatnagar,et al.  Biometric Inspired Multimedia Encryption Based on Dual Parameter Fractional Fourier Transform , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[14]  Robert Sabourin,et al.  Securing high resolution grayscale facial captures using a blockwise coevolutionary GA , 2013, Expert Syst. Appl..

[15]  P. Aruna,et al.  Comparison of DCT, SVD and BFOA based multimodal biometric watermarking systems , 2015 .

[16]  Richa Singh,et al.  Robust biometric image watermarking for fingerprint and face template protection , 2006, IEICE Electron. Express.

[17]  Richa Singh,et al.  Feature based RDWT watermarking for multimodal biometric system , 2009, Image Vis. Comput..

[18]  Anushikha Singh,et al.  Digital ownership tags based on biometric features of iris and fingerprint for content protection and ownership of digital images and audio signals , 2015, Multimedia Tools and Applications.

[19]  Cheng-Chi Lee,et al.  A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2013 .

[20]  Nirmala Saini,et al.  Biometrics based key management of double random phase encoding scheme using error control codes , 2013 .

[21]  Marios Savvides,et al.  Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching , 2009, 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[22]  Ivan W. Selesnick The slantlet transform , 1999, IEEE Trans. Signal Process..

[23]  Anil K. Jain,et al.  On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[24]  Michael Elad,et al.  Image Denoising Via Sparse and Redundant Representations Over Learned Dictionaries , 2006, IEEE Transactions on Image Processing.

[25]  Paresh Marwaha,et al.  Visual cryptographic steganography in images , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.

[26]  Jaishri Chourasia Identification and authentication using visual cryptography based fingerprint watermarking over natural image , 2013, CSI Transactions on ICT.

[27]  Rajat Raina,et al.  Efficient sparse coding algorithms , 2006, NIPS.

[28]  Sung Bum Pan,et al.  Hiding Biometric Data for Secure Transmission , 2005, KES.

[29]  Gaurav Bhatnagar,et al.  A novel chaos-based secure transmission of biometric data , 2015, Neurocomputing.

[30]  Thirimachos Bourlai,et al.  Securing multimodal biometric data through watermarking and steganography , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[31]  Ke Huang,et al.  Sparse Representation for Signal Classification , 2006, NIPS.

[32]  Anne M. P. Canuto,et al.  A Comparative Analysis of Cryptographic Algorithms and Transformation Functions for Biometric Data , 2013, 2013 12th International Conference on Machine Learning and Applications.

[33]  Thomas Blumensath,et al.  Accelerated iterative hard thresholding , 2012, Signal Process..

[34]  Bin Ma,et al.  Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking , 2013, Multimedia Tools and Applications.

[35]  Manuel Graña,et al.  Image Security and Biometrics: A Review , 2012, HAIS.

[36]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[37]  Chin-Chen Chang,et al.  SVD-based digital image watermarking scheme , 2005, Pattern Recognit. Lett..

[38]  Chin-Chen Chang,et al.  A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.

[39]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[40]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[41]  Mauro Barni,et al.  Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing , 2015, IEEE Signal Processing Magazine.

[42]  Balasubramanian Raman,et al.  Blind reliable invisible watermarking method in wavelet domain for face image watermark , 2014, Multimedia Tools and Applications.

[43]  Lanlan Li,et al.  Protect biometric data with compound chaotic encryption , 2016, Secur. Commun. Networks.

[44]  Xinpeng Zhang,et al.  Effective reversible data hiding in encrypted image with privacy protection for image content , 2015, J. Vis. Commun. Image Represent..

[45]  K. Harshika Image Quality Assessment for Fake Biometric Detection : Application to Iris , Fingerprint , and Face Recognition , 2017 .

[46]  Laurent Nana,et al.  Feature Based Encryption Technique for Securing Forensic Biometric Image Data Using AES and Visual Cryptography , 2014, 2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation.

[47]  Swanirbhar Majumder,et al.  A Novel EMD based Watermarking of Fingerprint Biometric Using GEP , 2013 .