A Secure Hiding Scheme for Tamper-Proofing and Authentication of Color Biometric Templates

被引:0
|
作者
Ben Tarif, Eyad [1 ,2 ]
Wibowo, Santoso [1 ]
Wasimi, Saleh [1 ]
Tareef, Afaf [2 ]
Tareaf, Abedalraheem [3 ]
机构
[1] Cent Queensland Univ, Sch Engn & Technol, Melbourne, Vic, Australia
[2] Univ Sydney, Sch Informat Technol, Sydney, NSW, Australia
[3] Al Balqa Appl Univ, Fac Engn Technol, Salt, Jordan
关键词
Biometric information security; image hiding; tamper-proofing; content authentication; sparse decomposition; IMAGE WATERMARKING; FINGERPRINT; FACE; SVD;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid growth of the biometric-based identification and authentication systems, establishing the integrity and authenticity of biometric data has become a serious research issue. Information hiding has emerged as an efficient way to secure the biometric data during transmission in web-based applications. In this paper, a content authentication and tamper-proofing system is presented to localize and correct the corrupted area in color biometric data. Information hiding based on sparsity theory is utilized to hide a copy of the luminance component of the color biometric image. The proposed scheme has been evaluated using Georgia Technology face database, and the results have demonstrated the reliability and efficiency of the proposed scheme in identifying and restoring the tampered area, even when the biometric image is seriously corrupted.
引用
收藏
页码:141 / 146
页数:6
相关论文
共 50 条
  • [1] SensorWatermark: a scheme of software watermark using code obfuscation and tamper-proofing for WSN
    Jorge, Emanuele N. de L. F.
    Pirmez, Luci
    de Farias, Claudio M.
    Costa, Rafael de O.
    Boccardo, Davidson R.
    Carmo, Luiz F. R. da C.
    [J]. 2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 916 - 922
  • [2] Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain
    Cao, Sheng
    Zhang, Gexiang
    Liu, Pengfei
    Zhang, Xiaosong
    Neri, Ferrante
    [J]. INFORMATION SCIENCES, 2019, 485 : 427 - 440
  • [3] Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding
    Villan, R.
    Voloshvnovskiy, S.
    Koval, K.
    Deguillaume, F.
    Pun, T.
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505
  • [4] Efficient sub-band coding in JPEG2000 for improved authentication and tamper-proofing
    Chen, J
    Chen, TS
    Chen, JG
    [J]. IMAGING SCIENCE JOURNAL, 2004, 52 (03): : 181 - 187
  • [5] Secure speech biometric templates for user authentication
    Inthavisas, K.
    Lopresti, D.
    [J]. IET BIOMETRICS, 2012, 1 (01) : 46 - 54
  • [6] Secure Authentication Using Biometric Templates in Kerberos
    Maheshwari, Radhika
    Gupta, Apoorva
    Chandra, Nidhi
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1247 - 1250
  • [7] A secure image authentication scheme for tamper detection and recovery
    Chen, T-Y
    Hwang, M-S
    Jan, J-K
    [J]. IMAGING SCIENCE JOURNAL, 2012, 60 (04): : 219 - 233
  • [8] Secure Biometric Authentication Scheme Based on Chaotic Map
    Liang, Jiahao
    You, Lin
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 643 - 653
  • [9] A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system
    Eyad Ben Tarif
    Santoso Wibowo
    Saleh Wasimi
    Afaf Tareef
    [J]. Multimedia Tools and Applications, 2018, 77 : 2485 - 2503
  • [10] A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system
    Ben Tarif, Eyad
    Wibowo, Santoso
    Wasimi, Saleh
    Tareef, Afaf
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) : 2485 - 2503