Chaotic secure content-based hidden transmission of biometric templates

被引:46
|
作者
Khan, Muhammad Khurram [1 ]
Zhang, Jiashu [1 ]
Tian, Lei [1 ]
机构
[1] SW Jiaotong Univ, Res Grp Biometr & Secur, Sichuan Prov Key Lab Signal & Informat Proc, Chengdu 610031, Sichuan, Peoples R China
关键词
D O I
10.1016/j.chaos.2005.12.015
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel Chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system's resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1749 / 1759
页数:11
相关论文
共 50 条
  • [21] Content-based resynchronization for robust video transmission
    Fang, T
    Chau, LP
    IEEE TRANSACTIONS ON BROADCASTING, 2004, 50 (04) : 390 - 395
  • [22] A novel chaos-based secure transmission of biometric data
    Bhatnagar, Gaurav
    Wu, Q. M. Jonathan
    NEUROCOMPUTING, 2015, 147 : 444 - 455
  • [23] Hiding biometric data for secure transmission
    Chung, YW
    Moon, D
    Moon, K
    Pan, S
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 1049 - 1057
  • [24] Secure Content-Based Image Retrieval in the Cloud With Key Confidentiality
    Li, Jung-Shian
    Liu, I-Hsien
    Tsai, Chin-Jui
    Su, Zhi-Yuan
    Li, Chu-Fen
    Liu, Chuan-Gang
    IEEE ACCESS, 2020, 8 : 114940 - 114952
  • [25] FSeCBIR: A Faster Secure Content-Based Image Retrieval for Cloud
    Anju, J.
    Shreelekshmi, R.
    SOFTWARE IMPACTS, 2022, 11
  • [26] Intelligent and Secure Content-Based Image Retrieval for Mobile Users
    Liu, Fei
    Wang, Yong
    Wang, Fan-Chuan
    Zhang, Yong-Zheng
    Lin, Jie
    IEEE ACCESS, 2019, 7 : 119209 - 119222
  • [27] Secure distribution of events in content-based publish subscribe systems
    Opyrchal, L
    Prakash, A
    USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 281 - 295
  • [28] Secure biometric templates from fingerprint-face features
    Sutcu, Yagiz
    Li, Qiming
    Memon, Nasir
    2007 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOLS 1-8, 2007, : 2964 - +
  • [29] Secure access control to hidden data by biometric features
    Cancellaro, J.
    Carli, M.
    Egiazarian, K.
    Neri, A.
    MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [30] A CONTENT-BASED PRECODING SOLUTION DESIGNED FOR JPWL TRANSMISSION
    Abot, Julien
    Pousset, Yannis
    Olivier, Christian
    Perrine, Clency
    2012 PROCEEDINGS OF THE 20TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2012, : 1219 - 1223