Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication

被引:2
|
作者
Abdullahi, Sani M. [1 ]
Wang, Hongxia [1 ]
Qian, Qing [1 ]
Cao, Wencheng [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Sichuan, Peoples R China
基金
美国国家科学基金会;
关键词
Biometrics; Fingerprint feature; Embedding; Identity authentication; Watermarking; WATERMARKING;
D O I
10.1007/978-3-319-53465-7_10
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Numerous security issues are raised through the transmission and storage of biometric data due to its high sensitivity and extremely crucial purpose. However, it might be impossible to recover if lost, counterfeited or hacked, thereby ruining the general aim of securing it. In this paper, an 8-layered feature enhancement algorithm is proposed. A centroid based semi-fragile audio watermarking is used to conceal the enhanced fingerprint biometric data into audio signals. The algorithm starts by encrypting our enhanced/extracted fingerprint template and converting it into binary bits prior to watermarking. It hence proceeds with computing the centroid of each audio frame and once more encrypting the obtained watermark using a Logistic map operation. DWT and DCT are performed on the sub-band which carries the centroid of audio thereby embedding the encrypted watermark bits into the domain signal. ODG and SDG analysis are performed on both the original and watermarked signal and the results signify the efficiency of the proposed scheme. Moreover, some signal processing operations are finally carried out on the watermarked signal and the outcome was intriguing as all attacks are counteracted.
引用
收藏
页码:129 / 144
页数:16
相关论文
共 50 条
  • [21] A novel technique for fingerprint template security in biometric authentication systems
    Afeeza Ali
    Vivek Singh Baghel
    Surya Prakash
    The Visual Computer, 2023, 39 : 6249 - 6263
  • [22] Multimodal biometric cryptosystem for human authentication using fingerprint and ear
    Padira S. V. V. N. Chanukya
    T. K. Thivakaran
    Multimedia Tools and Applications, 2020, 79 : 659 - 673
  • [23] A Hybrid Template Protection Technique for Fingerprint Biometric Authentication System
    Poonguzhali, N.
    Ezhilarasan, M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [24] Security Improvement in Fingerprint Authentication System using Virtual Biometric
    Ram, Athira A.
    Jyothis, T. S.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1930 - 1932
  • [25] Comparison of fingerprint and iris biometric authentication for control of digital signatures
    Zuckerman, AE
    Moon, KA
    Eaddy, K
    AMIA 2002 SYMPOSIUM, PROCEEDINGS: BIOMEDICAL INFORMATICS: ONE DISCIPLINE, 2002, : 1208 - 1208
  • [26] Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption
    Kim, Taeyun
    Kim, Hyoungshick
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 813 - 815
  • [27] Intramodal and intermodal fusion for audio-visual biometric authentication
    Cheung, MC
    Mak, MW
    Kung, SY
    PROCEEDINGS OF THE 2004 INTERNATIONAL SYMPOSIUM ON INTELLIGENT MULTIMEDIA, VIDEO AND SPEECH PROCESSING, 2004, : 25 - 28
  • [28] Digital ownership tags based on biometric features of iris and fingerprint for content protection and ownership of digital images and audio signals
    Dutta, Malay Kishore
    Singh, Anushikha
    Burget, Radim
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (23) : 16287 - 16313
  • [29] Digital ownership tags based on biometric features of iris and fingerprint for content protection and ownership of digital images and audio signals
    Malay Kishore Dutta
    Anushikha Singh
    Radim Burget
    Multimedia Tools and Applications, 2016, 75 : 16287 - 16313
  • [30] Authentication of Audio Signals in Frequency Domain (AASF)
    Mondal, Uttam Kr.
    Mandal, J. K.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 681 - 690