Abstract
The wide spread use of biometrics in real world causes more security and privacy concerns to be raised, because conventional biometric systems store biometric templates as it is in database without any security, and this may lead to the possibility of tracking personal information stored in database; moreover, biometric templates are not revocable and are unusable throughout their life time once they are lost or stolen. To overcome this non-revocability of biometrics, we proposed two methods for image security and template security in this paper (these methods are also applicable for some of the biometric traits); for image security, we used chaotic mixing with watermarking technique; first chaotic mixing is applied to the host image, and then, this resultant image is embedded in a sample (cover or carrier) image, and if the intruder gets the chaotic mixed image, he/she cannot get back the original host image, and for template security, we shuffled the palmprint template according to the input random number. This shuffling scheme increases the imposter matching score leaving genuine matching score.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Huang, D.S., Jia, W., Zang, D.: Palmprint verification based on principal lines. Pattern Recogn. 41(4) (2008)
Laadjel, M., Bouridane, A., Kurugollu, F., Boussakta, S.: Palmprint recognition using Fisher-Gabor feature extraction. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICSSP), pp. 1709–1712 (2008)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. (End-to-End Security), 40 (2001)
Kong, A., Zhang, D., Kamel, M.: Three measures for secure palmprint identification. Pattern Recogn. 41 (2008)
Wu, L., Yuan, S.: A face based fuzzy vault scheme for secure online authentication. In: Second International Symposium on Data, Privacy and E-Commerce (ISDPE), Nov 2010, pp. 45–49
Wang, Z., Wang, S., Ding, Q.: A secure face recognition algorithm based on adaptive non-uniform quantization. In: First International Conference on Pervasive Computing, Signal Processing and Applications (PCSPA), pp. 1115–1118 (2010)
Chen, B., Chandran, V.: Biometric template security using higher order spectra. In: IEEE International Conference On Acoustics Speech and Signal Processing (ICASSP), pp. 1730–1733 (2010)
Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55, 1081–1088 (2006)
Vatsa, M., Singh, R., Mitra, P., Noore, A.: Digital watermarking based secure multimodal biometric system. In: IEEE International Conference on Systems, Man and Cybernetics, vol. 3, pp. 2983–2987 (2004)
Teoh, A.B.J., Ong, T.S.: Secure biometric template protection via randomized dynamic quantization transformation. In: International Symposium on Biometrics and Security Technologies (ISBAST), pp. 1–6 (2008)
Yang, S., Verbauwhede, I.: Secure IRIS verification. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 133–136 (2007)
Barni, M., Bartolini, F., Cappllini, V., Piva, A.: Copyright protection of digital images by embedded unperceivable marks. Image Vis. Comput. 16 (1998)
Pereira, S.: Robust digital image watermarking. Doctoral Thesis, University of Geneva (2000)
Pitas, I.: A method for watermark casting on digital image. IEEE Trans. Circuits Syst. Video Technol. 8, 775–780 (2002)
Voyatzis, G., Pitas, I.: Digital image watermarking using mixing systems. Comput. Graph. 22, 405–416 (1998)
Tefas, A., Pitas, L.: Image authentication using chaotic mixing systems. In: IEEE International Symposium on Circuits and Systems (ISCAS), vol. 1, pp. 216–219 (2000)
Shu, Z., Li, G., Gan, L., Zhan, L., Fang, W.: Image watermarking based on wavelet-based contourlet packet transform with best tree. In: Second International Symposium on Electronic Commerce and Security (ISECS), vol. 1, pp. 203–207 (2009)
Zhao, H.: Algorithm of digital image watermarking technique combined with HVS. In: IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 774–777 (2010)
Zhang, C., Wang, J.: Digital image watermarking algorithm with double encryption by Arnold transform and logistic. In: Fourth International Conference on Network Computing and Advanced Information Management, vol. 1, pp. 329–334 (2008)
Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25, 1494–1498 (2003)
Cao, J., Li, A., Lv, G.: Study on multiple watermarking scheme for GIS vector data. In: 18th International Conference on Geoinformatics, pp. 1–6 (2010)
Kanade, S., Petrovska-Delacretaz, D., Dorizzi, B.: Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 120–127 (2009)
Fan, L., Duan, H., Long, F.: Face recognition by subspace analysis of 2D Log-Gabor wavelets features. In: Third International Conference on Intelligent system and Knowledge Engineering (ISKE), vol. 1, pp. 1167–1172 (2008)
IITD Touchless Palmprint Database: http://web.iitd.ac.in/~ajaykr/Database_Palm.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Prasad, M.V.N.K., Adinarayana, B. (2014). Image and Template Security for Palmprint. In: Mohapatra, D.P., Patnaik, S. (eds) Intelligent Computing, Networking, and Informatics. Advances in Intelligent Systems and Computing, vol 243. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1665-0_1
Download citation
DOI: https://doi.org/10.1007/978-81-322-1665-0_1
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1664-3
Online ISBN: 978-81-322-1665-0
eBook Packages: EngineeringEngineering (R0)