Abstract
Biometric security is a fast growing area that gains an increasing interest in the last decades. Digital encryption and hiding techniques provide an efficient solution to protect biometric data from accidental or intentional attacks. In this paper, a highly secure encryption/hiding scheme is proposed to ensure secure transmission of biometric data in multimodal biometric identification/authentication system. The secret fingerprint and iris vectors are sparsely approximated using accelerated iterative hard thresholding technique and then embedded in the host Slantlet-SVD domain of face image. Experiments demonstrate the efficiency of our technique for both encryption and hiding purpose, where the secret biometric information is well encrypted and still extractable with high fidelity even though the carrier image is seriously corrupted. Our experimental results show the efficiency of the proposed technique in term of robustness to attacks, Invisibility, and security.










Similar content being viewed by others
References
Agarwal H, Raman B, Venkat I (2015) Blind reliable invisible watermarking method in wavelet domain for face image watermark. Multimedia Tools and Applications 74(17):6897–6935
Agrawal N, Savvides M (2009) Biometric data hiding: a 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching. In: 2009 IEEE computer society conference on computer vision and pattern recognition workshops. IEEE, pp 85–92
Bala BK, Joanna JL (2014) Multi modal biometrics using cryptographic algorithm. Eur J Acad Essays 1(1):6–10
Barni M, Droandi G, Lazzeretti R (2015) Privacy protection in biometric-based recognition systems: a marriage between cryptography and signal processing. IEEE Signal Proc Mag 32(5):66–76
Bhatnagar G, Wu Q (2014) Biometric inspired multimedia encryption based on dual parameter fractional fourier transform. IEEE Trans Syst Man Cybern Syst 44(9):1234–1247
Bhatnagar G, Wu QJ (2015) A novel chaos-based secure transmission of biometric data. Neurocomputing 147:444–455
Blumensath T (2012) Accelerated iterative hard thresholding. Signal Process 92(3):752–756
CASIA-Iris Twins. National Laboratory of Pattern Recognition (NLPR) Institute of Automation, C.A.o.S.C.:
Chang CC, Tsai P, Lin CC (2005) Svd-based digital image watermarking scheme. Pattern Recogn Lett 26(10):1577–1586
Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727–752
Chourasia J (2013) Identification and authentication using visual cryptography based fingerprint watermarking over natural image. CSI Trans ICT 1(4):343–348
Chung Y, Moon D, Moon K, Pan S (2005) Hiding biometric data for secure transmission. In: Knowledge-based intelligent information and engineering systems. Springer, pp 178–178
Cox IJ, Miller ML (2002) The first 50 years of electronic watermarking. EURASIP J Adv Signal Process 2002(2):1–7
Dutta MK, Singh A, Burget R (2015) Digital ownership tags based on biometric features of iris and fingerprint for content protection and ownership of digital images and audio signals. Multimedia Tools and Applications:1–27
Elad M, Aharon M (2006) Image denoising via sparse and redundant representations over learned dictionaries. IEEE Trans Image Process 15(12):3736–3745
Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724
George RM (2013) Facial template protection using extended visual cryptography and chaotic encryption, vol 1
Georgia Tech Face Database: http://www.anefian.com/research/face_reco.htm
Huang K, Aviyente S (2006) Sparse representation for signal classification. In: Advances in neural information processing systems, pp 609–616
Jain A, Hong L, Bolle R (1997) On-line fingerprint verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(4):302–314
Jain AK, Uludag U (2003) Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(11):1494–1498
Jain AK, Uludag U, Hsu RL (2002) Hiding a face in a fingerprint image. In: Proceedings 16th international conference on pattern recognition, 2002, vol 3. IEEE, pp 756–759
Kaur H, Khanna P (2015) Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimedia Tools and Applications:1–29
Kester QA, Nana L, Pascu AC, Gire S, Eghan J, Quaynor NN (2014) Feature based encryption technique for securing forensic biometric image data using aes and visual cryptography. In: 2014 2nd international conference on artificial intelligence, modelling and simulation (AIMS). IEEE, pp 199– 204
Koliwad S (2009) A comprehensive survey of contemporary researches in watermarking for copyright protection of digital images. IJCSNS 9(4):91
Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1-2):201–211
Lee H, Battle A, Raina R, Ng AY (2007) Efficient sparse coding algorithms. Advances in Neural Information Processing Systems 19:801
Liew CZ, Shaw R, Li L (2014) Protect biometric data with compound chaotic encryption. Security and Communication Networks
Ma B, Wang Y, Li C, Zhang Z, Huang D (2014) Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking. Multimedia Tools and Applications 72(1):637– 666
Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) Fvc2002: second fingerprint verification competition. In: Proceedings of 16th international conference on pattern recognition, 2002, vol 3. IEEE, pp 811–814
Marqués I., Graña M. (2012) Image security and biometrics: a review. In: International conference on hybrid artificial intelligence systems. Springer, pp 436–447
Marwaha P, Marwaha P (2010) Visual cryptographic steganography in images. In: 2010 international conference on computing communication and networking technologies (ICCCNT). IEEE, pp 1–6
Mohanty SP (1999) Digital watermarking: a tutorial review. http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey1999Mohanty.pdf
Nair SAH, Aruna P (2015) Comparison of dct, svd and bfoa based multimodal biometric watermarking systems. Alexandria Eng J 54(4):1161–1174
Nematollahi MA, Gamboa-Rosales H, Martinez-Ruiz FJ, Jose I, Al-Haddad S, Esmaeilpour M (2016) Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition. Multimedia Tools and Applications:1–31
Oliveira Filho DL, Santiago OG, Canuto AM, Bedregal BR, et al (2013) A comparative analysis of cryptographic algorithms and transformation functions for biometric data. In: 2013 12th international conference on Machine learning and applications (ICMLA), vol 2. IEEE, pp 255–260
Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062–1078
Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on smvq and image inpainting. IEEE Trans Image Process 23(3):969–978
Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164
Rabil BS, Tliba S, Granger E, Sabourin R (2013) Securing high resolution grayscale facial captures using a blockwise coevolutionary ga. Expert Syst Appl 40(17):6693–6706
Saini N, Sinha A (2013) Biometrics based key management of double random phase encoding scheme using error control codes. Opt Lasers Eng 51(8):1014–1022
Selesnick IW (1999) The slantlet transform. IEEE Trans Signal Process 47(5):1304–1313
Shaw AK, Majumder S, Sarkar S, Sarkar SK (2013) A novel emd based watermarking of fingerprint biometric using gep. Procedia Technology 10:172–183
Singh A, Kishore Dutta M, Travieso CM, Soni K (2014) Digital right management control for joint ownership of digital images using biometric features. In: 2014 international conference on signal processing and integrated networks (SPIN). IEEE, pp 164–167
Suzuki H, Takeda M, Obi T, Yamaguchi M, Ohyama N, Nakano K (2014) Encrypted sensing for enhancing security of biometric authentication. In: 2014 13th workshop on Information optics (WIO). IEEE, pp 1–3
Vatsa M, Singh R, Noore A (2009) Feature based rdwt watermarking for multimodal biometric system. Image Vis Comput 27(3):293–304
Vatsa M, Singh R, Noore A, Houck MM, Morris K (2006) Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 3(2):23–28
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Whitelam C, Osia N, Bourlai T (2013) Securing multimodal biometric data through watermarking and steganography. In: 2013 IEEE international conference on technologies for homeland security (HST). IEEE, pp 61–66
Wright J, Ma Y, Mairal J, Sapiro G, Huang TS, Yan S (2010) Sparse representation for computer vision and pattern recognition. Proc IEEE 98(6):1031–1044
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tarif, E.B., Wibowo, S., Wasimi, S. et al. A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system. Multimed Tools Appl 77, 2485–2503 (2018). https://doi.org/10.1007/s11042-016-4280-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-4280-7