Enhancing the transmission security of content-based hidden biometric data

被引:0
|
作者
Khan, Muhammad Khurram [1 ]
Zhang, Jiashu [1 ]
机构
[1] SW Jiaotong Univ, Res Grp Biometr & Secur, Sichuan Province Key Lab Signal & Informat Proc, Chengdu, Sichuan, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a secure scheme to enhance the transmission security of content-based hidden biometric data over insecure network. Encryption, coding, spread spectrum modulation, and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic maps, and each transaction session has different secret keys to protect from the attacks. Templates are encrypted by chaotic encryption, encoded by BCH encoding method, modulated by chaotic neural network parameter modulation (CNNPM), and then hid into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme is encouraging comparable with other methods found in the current literature.
引用
下载
收藏
页码:214 / 223
页数:10
相关论文
共 50 条
  • [21] Enhancing Content-Based Recommendation with the Task Model of Classification
    Wang, Yiwen
    Wang, Shenghui
    Stash, Natalia
    Aroyo, Lora
    Schreiber, Guus
    KNOWLEDGE ENGINEERING AND MANAGEMENT BY THE MASSES, EKAW 2010, 2010, 6317 : 431 - 440
  • [22] Enhancing the Security of Transformation Based Biometric Template Protection Schemes
    Ghammam, Loubna
    Barbier, Morgan
    Rosenberger, Christophe
    2018 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW), 2018, : 316 - 323
  • [23] A biometric-based scheme for enhancing security of cryptographic keys
    Siyal, MY
    Ahmed, F
    TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B407 - B410
  • [24] Security Aware Content-Based Publish/Subscribe System
    Chaabane, Amina
    Jmaiel, Mohamed
    ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 537 - +
  • [25] Security for biometric data
    Vielhauer, C
    Kalker, T
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 642 - 652
  • [26] Host-Oblivious Security for Content-Based Networks
    Jeong, Jongmin
    Kwon, Ted
    Choi, Yanghee
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET TECHNOLOGIES (CFI10), 2010, : 35 - 40
  • [27] Content-based information security technique for Chinese text
    Zhang, Wenyin
    FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4223 : 650 - 659
  • [28] Security Analysis of Content-Based Watermarking Authentication Framework
    Wang, Jinwei
    Liu, Guangjie
    Lian, Shiguo
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 483 - +
  • [29] Biometric Traits in Enhancing Security of Healthcare
    Nanayakkara, Shanika Iroshi
    Ganegoda, Gamage Upeksha
    2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [30] A Review on Biometric based Secure Data Transmission
    Kumbhare, Mithun G.
    Padole, Palash S.
    Shende, Diksha P.
    Meshram, Sanchana S.
    Baraskar, Shailesh S.
    Raut, Swati B.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 444 - 448