Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication

被引:2
|
作者
Abdullahi, Sani M. [1 ]
Wang, Hongxia [1 ]
Qian, Qing [1 ]
Cao, Wencheng [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Sichuan, Peoples R China
基金
美国国家科学基金会;
关键词
Biometrics; Fingerprint feature; Embedding; Identity authentication; Watermarking; WATERMARKING;
D O I
10.1007/978-3-319-53465-7_10
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Numerous security issues are raised through the transmission and storage of biometric data due to its high sensitivity and extremely crucial purpose. However, it might be impossible to recover if lost, counterfeited or hacked, thereby ruining the general aim of securing it. In this paper, an 8-layered feature enhancement algorithm is proposed. A centroid based semi-fragile audio watermarking is used to conceal the enhanced fingerprint biometric data into audio signals. The algorithm starts by encrypting our enhanced/extracted fingerprint template and converting it into binary bits prior to watermarking. It hence proceeds with computing the centroid of each audio frame and once more encrypting the obtained watermark using a Logistic map operation. DWT and DCT are performed on the sub-band which carries the centroid of audio thereby embedding the encrypted watermark bits into the domain signal. ODG and SDG analysis are performed on both the original and watermarked signal and the results signify the efficiency of the proposed scheme. Moreover, some signal processing operations are finally carried out on the watermarked signal and the outcome was intriguing as all attacks are counteracted.
引用
收藏
页码:129 / 144
页数:16
相关论文
共 50 条
  • [41] EarSlide: a Secure Ear Wearables Biometric Authentication Based on Acoustic Fingerprint
    Wang, Zi
    Wang, Yilin
    Yang, Jie
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2024, 8 (01):
  • [42] Secured Authentication of Space Specified Token with Biometric Traits - Face and Fingerprint
    Lakshmi, B. Prasana
    Kannammal, A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (07): : 231 - 234
  • [43] Score selection techniques for fingerprint multi-modal biometric authentication
    Giacinto, G
    Roli, F
    Ronci, R
    IMAGE ANALYSIS AND PROCESSING - ICIAP 2005, PROCEEDINGS, 2005, 3617 : 1018 - 1025
  • [44] Matching Fingerprint Images for Biometric Authentication using Convolutional Neural Networks
    Najih, Abdulmawla
    Mohamed, Syed Abdul Rahman Al-Haddad Syed
    Ramli, Abdul Rahman
    Hashim, Shaiful Jahari
    Albannai, Nabila
    PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2019, 27 (04): : 1723 - 1733
  • [45] Towards a high-precision contactless fingerprint scanner for biometric authentication
    Oduah, Uzoma I.
    Kevin, Ifeanyichukwu F.
    Oluwole, Daniel O.
    Izunobi, Josephat U.
    ARRAY, 2021, 11
  • [46] A linear convolution-based cancelable fingerprint biometric authentication system
    Yang, Wencheng
    Wang, Song
    Kang, James Jin
    Johnstone, Michael N.
    Bedari, Aseel
    COMPUTERS & SECURITY, 2022, 114
  • [47] A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition
    Xiang, Wei
    Desai, Bhavin
    Wen, Paul
    Wang, Yafeng
    Peng, Tianshu
    ROUGH SETS AND KNOWLEDGE TECHNOLOGY, PROCEEDINGS, 2009, 5589 : 264 - +
  • [48] Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking
    Ma, Bin
    Wang, Yunhong
    Li, Chunlei
    Zhang, Zhaoxiang
    Huang, Di
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (01) : 637 - 666
  • [49] Biometric Authentication Technology Facilitating Protection and Management of Biometric Data
    Yamada, Shigefumi
    Aoki, Takahiro
    Shimoyama, Takeshi
    Mori, Shigehisa
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2019, 55 (05): : 53 - 58
  • [50] Model of Intelligent Detection Mechanism Against False Biometric Data Injection in Fingerprint-Based Authentication Systems
    Kapczynski, Adrian
    Banasik, Arkadiusz
    2009 IEEE INTERNATIONAL WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2009, : 496 - 498