Chaotic secure content-based hidden transmission of biometric templates

被引:46
|
作者
Khan, Muhammad Khurram [1 ]
Zhang, Jiashu [1 ]
Tian, Lei [1 ]
机构
[1] SW Jiaotong Univ, Res Grp Biometr & Secur, Sichuan Prov Key Lab Signal & Informat Proc, Chengdu 610031, Sichuan, Peoples R China
关键词
D O I
10.1016/j.chaos.2005.12.015
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel Chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system's resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1749 / 1759
页数:11
相关论文
共 50 条
  • [1] Lossless and Content-based Hidden Transmission for Biometric Verificaion
    Lu, Yinghua
    Li, Xiaolu
    Qi, Miao
    Li, Jinsong
    Fu, Yao
    Kong, Jun
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL I, PROCEEDINGS, 2008, : 462 - 466
  • [2] Enhancing the transmission security of content-based hidden biometric data
    Khan, Muhammad Khurram
    Zhang, Jiashu
    ADVANCES IN NEURAL NETWORKS - ISNN 2006, PT 3, PROCEEDINGS, 2006, 3973 : 214 - 223
  • [3] Content-based Image Hiding Method for Secure Network Biometric Verification
    Che, Xiangjiu
    Kong, Jun
    Dai, Jiangyan
    Gao, Zhanheng
    Qi, Miao
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2011, 4 (04) : 596 - 605
  • [4] A Biometric Templates Secure Transmission Method Based on Bi-layer Watermarking and PKI
    Li, ChunLei
    Wang, YunHong
    Liu, LiNing
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 95 - 98
  • [5] Secure sketch for biometric templates
    Li, Qiming
    Sutcu, Yagiz
    Memon, Nasir
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 99 - +
  • [6] One Time Biometric Transform to Secure Biometric Templates
    Abhyankar, Aditya
    Kulkarni, Shailesh
    Talware, Rajendra
    Schuckers, Stephanie
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 5, 2010, : 881 - 885
  • [7] CONTENT-BASED BIOMETRIC IMAGE HIDING APPROACH
    Qi, Miao
    Kong, Jun
    Lu, Yinghua
    Du, Ning
    Ma, Zhiqiang
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2011, 25 (04) : 565 - 581
  • [8] Secure Biometric Authentication Scheme Based on Chaotic Map
    Liang, Jiahao
    You, Lin
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 643 - 653
  • [9] Feature Transformation of Biometric Templates for Secure Biometric Systems based on Error Correcting Codes
    Sutcu, Yagiz
    Rane, Shantanu
    Yedidia, Jonathan S.
    Draper, Stark C.
    Vetro, Anthony
    2008 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, VOLS 1-3, 2008, : 1175 - +
  • [10] A Review on Biometric based Secure Data Transmission
    Kumbhare, Mithun G.
    Padole, Palash S.
    Shende, Diksha P.
    Meshram, Sanchana S.
    Baraskar, Shailesh S.
    Raut, Swati B.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 444 - 448