International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 3 | Year 2013 | Article Id. IJCTT-V4I3P111 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I3P111

Securing the Images Using Biometric Cryptography Technique


K.Nandakumar, D.Prabakar, Dr.S.Karthik

Citation :

K.Nandakumar, D.Prabakar, Dr.S.Karthik, "Securing the Images Using Biometric Cryptography Technique," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 3, pp. 253-257, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I3P111

Abstract

A biometric authentication system operates by acquiring raw biometric data from a subject, extracting a feature set from the data and comparing the feature set against the templates stored in a database in order to identify a person or to verify a claimed identity. The template data in the database is generated during enrolment and is often stored along with the original raw data. This work explores the possibility of using visual cryptography without pixel expansion for imparting privacy to biometric data such as fingerprint images, iris codes, and face images. In the case of faces, a private face image is dithered into two host face images that are stored in two separate database servers such that the private image can be revealed only when both sheets are simultaneously available; at the same time, the individual sheet images do not reveal the identity of the private image.

Keywords

Multiple Secrets, Depth-equalization, Pixel Expansion.

References

[1] Agrawal. N and Savvides. M, (2009), “Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching,” in Proc. Computer Vision and Pattern Recognition, vol. 0, pp. 85–92.
[2] Anil K. Jain and Umut Uludag, (2008), “Hiding Biometric Data”, IEEE Trans. Pattern Analysis And Machine Intelligence, Vol. 25, No. 11.
[3] Anil K. Jain, Karthik Nandakumar and Abhishek Nagar, (2008), “Biometric Template Security”, EURASIP Journal on Advances in Signal Processing.
[4] Arun Ross and Asem Othman, (2011), “Visual Cryptography for Biometric Privacy,” IEEE trans. Information forensics and security, vol. 6, no. 1. 
[5] Ateniese.G, Blundo.C, Santis.A, and Stinson.D, (2010), “Extended capabilities for visual cryptography,” Theor. Comput. Sci., vol. 250, no. 1–2, pp. 143–161.
[6] Bitouk.D, Kumar.N, Dhillon.S, Belhumeur.P and Nayar.S.K, (2008), “Face swapping: Automatically replacing faces in photographs,” ACMTrans., vol. 27, no. 3, pp. 1–8.
[7] Dong.J and Tan.T, (2008), “Effects of watermarking on iris recognition performance,” in Proc. 10th Int. Conf. Control, Automation, Robotics and Vision, pp. 1156–1161.
[8] Gross.R, Sweeney.L, De la Torre.F, and Baker.S, (2007), “Modelbased face de-identification,” in IEEE Workshop on Privacy Research in Vision, Los Alamitos, CA. 
[9] Jain.A, Nandakumar.K and Nagar.A, (2008), “Biometric template security,” EURASIP Journal on Advances in Signal Processing, Special Issue on Biometrics.
[10] Maltoni.D, Maio.D, Jain.A, and Prabhakar.S, (2008), “Handbook of Fingerprint Recognition”. Secaucus, NJ: Springer-Verlag New York, Inc.
[11] Moskovich.B and Osadchy.M, (2010), “Illumination invariant representation for privacy preserving face identification,” in Proc. IEEE Computer Society and IEEE Biometrics Council Workshop on Biometrics, San Francisco, CA, pp. 154–161.
[12] Nakajima.M and Yamaguchi.Y, (2012), “Extended visual cryptography for natural images,” J. WSCG, vol. 10, no. 2, pp. 303310.
[13] Naor.M and Shamir.A, (2010), “Visual cryptography,” in EUROCRYPT,   pp. 1–12.
[14] Newton.E.M,  Sweeney.L and Malin.B, (2007), “Preserving privacy by de-identifying face images,” IEEE Trans. Knowl. Data Eng., vol. 17, no. 2, pp. 232–243.
[15] Prabhakar.S, Pankanti.S, and Jain.A, (2011), “Biometric recognition: Security and privacy concerns,” IEEE Security Privacy, vol. 1, no. 2, pp. 33–42.
[16] Ratha N.K, Connell J.H, Bolle.R.M, (2011), “Enhancing security and privacy in biometrics-based authentication systems”, IBM Systems Journal, Vol 40, No 3.
[17] Soutar.C, Roberge.D, Stoianov.A, Gilroy.R, and Kumar.B, (2009), “Biometric encryption,” in ICSA Guide to Cryptography. New York: Mc Graw-Hill.
[18]  Thuraisingham.B and Ford.W, 2007), “Security constraint processing in a multilevel secure distributed database management system,” IEEE Trans. Knowl. Data Eng., vol. 7, no. 2, pp. 274–293.