Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/357744.357902acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
Article
Free access

Secure data hiding in wavelet compressed fingerprint images

Published: 04 November 2000 Publication History

Abstract

With the rapid growth of the Internet, electronic commerce revenue now amounts to several billion US dollars. To avoid fraud and misuse, buyers and sellers desire more secure methods of authentication than today's userid and password combinations. Automated biometrics technology in general, and fingerprints in particular, provide an accurate and reliable authentication method. However, fingerprint-based authentication requires accessing fingerprint images scanned remotely at the user's workstation, a potentially weak point in the security system. Stored or synthetic fingerprint images might be fraudulently transmitted, even if the communication channel itself is encrypted. In this paper we describe an algorithm for secure data hiding in wavelet compressed fingerprint images to alleviate this problem. Assuming the image capture device is secure, then only the decompressor on the server can locate the embedded message and thereby validate the submitted image.

References

[1]
"WSQ Gray-scale Fingerprint Image Compression Specification", U.S. Federal Bureau of Investigation, 1993.
[2]
C. M. Brislawn, J. N. Bradley, R. J. Onyshczak, and T. Hopper. "The FBI compression standard for digitized fingerprint images", in Proc. of SPIE, Vol. 2847, Denver, Aug. 1996, pages 344-355.
[3]
C. T. Hsu and J. L. Wu, "Hidden digital watermarks in images", IEEE Trans. on image processing, Vol. 8, No. 1, Jan. 1999, pp. 58-68.
[4]
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding", IBM Systems Journal, Vol. 35, No. 3 & 4, 1996, pp. 313-335.
[5]
N. Memon and P. W. Wong, "Protecting digital media content", Communication of the ACM, Vol. 41, No. 7, July 1998, pp. 35-43.
[6]
S. Mallat, "Wavelets for vision", Proc. of the IEEE, Vol. 84, No. 4, April 1996, pp. 604-614.
[7]
M. D. Swanson, M. Kobayashi and A. H. Tewfik, "Multi-media data embedding and watermarking technologies", Proc. of the IEEE, Vol. 86, No. 6, June 1998, pp. 1064-1087.
[8]
F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information Hiding - A survey", Proc. of the IEEE, Vol. 87, No. 7, July 1999, pp. 1062-1078.

Cited By

View all
  • (2020)An Information Hiding Algorithm for Iris FeaturesCommunications, Signal Processing, and Systems10.1007/978-981-13-9409-6_176(1465-1473)Online publication date: 4-Apr-2020
  • (2019)Digital watermarking techniques for image security: a reviewJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-019-01500-1Online publication date: 20-Sep-2019
  • (2018)An overview of protection of privacy in multibiometricsMultimedia Tools and Applications10.1007/s11042-017-4596-y77:6(6753-6773)Online publication date: 1-Mar-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MULTIMEDIA '00: Proceedings of the 2000 ACM workshops on Multimedia
November 2000
248 pages
ISBN:1581133111
DOI:10.1145/357744
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 November 2000

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. WSQ compression
  2. authentication
  3. biometrics
  4. data hiding
  5. fingerprints
  6. watermarking

Qualifiers

  • Article

Conference

MM00: ACM Multimedia 2000
October 30 - November 3, 2000
California, Los Angeles, USA

Acceptance Rates

Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)29
  • Downloads (Last 6 weeks)6
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2020)An Information Hiding Algorithm for Iris FeaturesCommunications, Signal Processing, and Systems10.1007/978-981-13-9409-6_176(1465-1473)Online publication date: 4-Apr-2020
  • (2019)Digital watermarking techniques for image security: a reviewJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-019-01500-1Online publication date: 20-Sep-2019
  • (2018)An overview of protection of privacy in multibiometricsMultimedia Tools and Applications10.1007/s11042-017-4596-y77:6(6753-6773)Online publication date: 1-Mar-2018
  • (2017)A watermarking technique to improve the security level in face recognition systemsMultimedia Tools and Applications10.1007/s11042-016-4109-476:22(23805-23833)Online publication date: 1-Nov-2017
  • (2017)A multimodal biometric watermarking system for digital images in redundant discrete wavelet transformMultimedia Tools and Applications10.1007/s11042-016-4048-076:3(3871-3897)Online publication date: 1-Feb-2017
  • (2016)A watermarking technique to improve the security level in face recognition systems: An experiment with Principal Component Analysis (PCA) for face recognition and Discrete Cosine Transform (DCT) for watermarking2016 International Conference on Information and Communication Technology (ICICTM)10.1109/ICICTM.2016.7890805(223-226)Online publication date: 2016
  • (2016)Joint Encryption and Compression scheme for a multimodal telebiometric systemNeurocomputing10.1016/j.neucom.2016.01.006191:C(69-81)Online publication date: 26-May-2016
  • (2016)Security Enhancement of Digital WatermarkingDigital Watermarking10.1007/978-981-10-2095-7_13(191-203)Online publication date: 9-Aug-2016
  • (2015)Approach to cryptographic key generation from fingerprint biometricsInternational Journal of Biometrics10.1504/IJBM.2015.0719467:3(226-248)Online publication date: 1-Sep-2015
  • (2015)Blind reliable invisible watermarking method in wavelet domain for face image watermarkMultimedia Tools and Applications10.1007/s11042-014-1934-174:17(6897-6935)Online publication date: 1-Sep-2015
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media