Image and Template Security for Palmprint | SpringerLink
Skip to main content

Image and Template Security for Palmprint

  • Conference paper
Intelligent Computing, Networking, and Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 243))

  • 1287 Accesses

Abstract

The wide spread use of biometrics in real world causes more security and privacy concerns to be raised, because conventional biometric systems store biometric templates as it is in database without any security, and this may lead to the possibility of tracking personal information stored in database; moreover, biometric templates are not revocable and are unusable throughout their life time once they are lost or stolen. To overcome this non-revocability of biometrics, we proposed two methods for image security and template security in this paper (these methods are also applicable for some of the biometric traits); for image security, we used chaotic mixing with watermarking technique; first chaotic mixing is applied to the host image, and then, this resultant image is embedded in a sample (cover or carrier) image, and if the intruder gets the chaotic mixed image, he/she cannot get back the original host image, and for template security, we shuffled the palmprint template according to the input random number. This shuffling scheme increases the imposter matching score leaving genuine matching score.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 34319
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 42899
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Huang, D.S., Jia, W., Zang, D.: Palmprint verification based on principal lines. Pattern Recogn. 41(4) (2008)

    Google Scholar 

  2. Laadjel, M., Bouridane, A., Kurugollu, F., Boussakta, S.: Palmprint recognition using Fisher-Gabor feature extraction. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICSSP), pp. 1709–1712 (2008)

    Google Scholar 

  3. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. (End-to-End Security), 40 (2001)

    Google Scholar 

  4. Kong, A., Zhang, D., Kamel, M.: Three measures for secure palmprint identification. Pattern Recogn. 41 (2008)

    Google Scholar 

  5. Wu, L., Yuan, S.: A face based fuzzy vault scheme for secure online authentication. In: Second International Symposium on Data, Privacy and E-Commerce (ISDPE), Nov 2010, pp. 45–49

    Google Scholar 

  6. Wang, Z., Wang, S., Ding, Q.: A secure face recognition algorithm based on adaptive non-uniform quantization. In: First International Conference on Pervasive Computing, Signal Processing and Applications (PCSPA), pp. 1115–1118 (2010)

    Google Scholar 

  7. Chen, B., Chandran, V.: Biometric template security using higher order spectra. In: IEEE International Conference On Acoustics Speech and Signal Processing (ICASSP), pp. 1730–1733 (2010)

    Google Scholar 

  8. Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55, 1081–1088 (2006)

    Google Scholar 

  9. Vatsa, M., Singh, R., Mitra, P., Noore, A.: Digital watermarking based secure multimodal biometric system. In: IEEE International Conference on Systems, Man and Cybernetics, vol. 3, pp. 2983–2987 (2004)

    Google Scholar 

  10. Teoh, A.B.J., Ong, T.S.: Secure biometric template protection via randomized dynamic quantization transformation. In: International Symposium on Biometrics and Security Technologies (ISBAST), pp. 1–6 (2008)

    Google Scholar 

  11. Yang, S., Verbauwhede, I.: Secure IRIS verification. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 133–136 (2007)

    Google Scholar 

  12. Barni, M., Bartolini, F., Cappllini, V., Piva, A.: Copyright protection of digital images by embedded unperceivable marks. Image Vis. Comput. 16 (1998)

    Google Scholar 

  13. Pereira, S.: Robust digital image watermarking. Doctoral Thesis, University of Geneva (2000)

    Google Scholar 

  14. Pitas, I.: A method for watermark casting on digital image. IEEE Trans. Circuits Syst. Video Technol. 8, 775–780 (2002)

    Article  Google Scholar 

  15. Voyatzis, G., Pitas, I.: Digital image watermarking using mixing systems. Comput. Graph. 22, 405–416 (1998)

    Google Scholar 

  16. Tefas, A., Pitas, L.: Image authentication using chaotic mixing systems. In: IEEE International Symposium on Circuits and Systems (ISCAS), vol. 1, pp. 216–219 (2000)

    Google Scholar 

  17. Shu, Z., Li, G., Gan, L., Zhan, L., Fang, W.: Image watermarking based on wavelet-based contourlet packet transform with best tree. In: Second International Symposium on Electronic Commerce and Security (ISECS), vol. 1, pp. 203–207 (2009)

    Google Scholar 

  18. Zhao, H.: Algorithm of digital image watermarking technique combined with HVS. In: IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 774–777 (2010)

    Google Scholar 

  19. Zhang, C., Wang, J.: Digital image watermarking algorithm with double encryption by Arnold transform and logistic. In: Fourth International Conference on Network Computing and Advanced Information Management, vol. 1, pp. 329–334 (2008)

    Google Scholar 

  20. Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25, 1494–1498 (2003)

    Article  Google Scholar 

  21. Cao, J., Li, A., Lv, G.: Study on multiple watermarking scheme for GIS vector data. In: 18th International Conference on Geoinformatics, pp. 1–6 (2010)

    Google Scholar 

  22. Kanade, S., Petrovska-Delacretaz, D., Dorizzi, B.: Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 120–127 (2009)

    Google Scholar 

  23. Fan, L., Duan, H., Long, F.: Face recognition by subspace analysis of 2D Log-Gabor wavelets features. In: Third International Conference on Intelligent system and Knowledge Engineering (ISKE), vol. 1, pp. 1167–1172 (2008)

    Google Scholar 

  24. IITD Touchless Palmprint Database: http://web.iitd.ac.in/~ajaykr/Database_Palm.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Munaga V. N. K. Prasad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Prasad, M.V.N.K., Adinarayana, B. (2014). Image and Template Security for Palmprint. In: Mohapatra, D.P., Patnaik, S. (eds) Intelligent Computing, Networking, and Informatics. Advances in Intelligent Systems and Computing, vol 243. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1665-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1665-0_1

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1664-3

  • Online ISBN: 978-81-322-1665-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics