Securing biometric data by combining watermarking and cryptography

被引:0
|
作者
Ouslim, Mohamed [1 ]
Sabri, Ahmed [2 ]
Mouhadjer, Hassan [2 ]
机构
[1] Univ Sci & Technol Oran USTOMB, Lab Microsyst & Syst Embarques, Oran, Algeria
[2] Univ Sci & Technol Oran USTOMB, Dept Elect, Oran, Algeria
关键词
biometrics; iris; fingerprint; watermarking; vectorial quantization; chaos; encryption;
D O I
暂无
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
with that of the iris. This was done by merging the two biometric signatures by means of watermarking based on vector quantization. The proposed technique is based on the extraction of features from the fingerprint image to hide the iris code. This appeared to be the most obvious alternative, given the type of manipulated images. The robustness of this technique has been proven by a process of several tests known in the field of data transmission. Test results show that the proposed method is robust against JPEG compression. Other tests covered the attacks based on filtering, addition of noise, translation and rotations. Furthermore, we applied chaotic encryption with several alternatives on the watermarked fingerprint image to enhance the overall security of transmission. Results are satisfactory and very encouraging.
引用
收藏
页码:179 / 182
页数:4
相关论文
共 50 条
  • [41] Joint visual cryptography and watermarking
    Fu, MS
    Au, OC
    2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 975 - 978
  • [42] Securing Power System Data in Motion by Timestamped Digital Text Watermarking
    Roy, Siddhartha Deb
    Sharma, Ankush
    Chakrabarti, Saikat
    Debbarma, Sanjoy
    IEEE TRANSACTIONS ON SMART GRID, 2024, 15 (05) : 4974 - 4985
  • [43] Visual cryptography based watermarking
    Cimato, Stelvio
    Yang, James C. N.
    Wu, Chih-Cheng
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8363 : 91 - 109
  • [44] Multiple Watermarking in Visual Cryptography
    Luo, Hao
    Lu, Zhe-Ming
    Pan, Jeng-Shyang
    DIGITAL WATERMARKING, PROCEEDINGS, 2008, 5041 : 60 - +
  • [45] Biometric data-based robust watermarking scheme of video streams
    Jung, Sooyeun
    Lee, Dongeun
    Lee, Seongwon
    Paik, Joonki
    2007 6TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS & SIGNAL PROCESSING, VOLS 1-4, 2007, : 1244 - +
  • [46] Two-level security approach combining watermarking and encryption for securing critical colored images
    Fkirin, Alaa
    Attiya, Gamal
    El-Sayed, Ayman
    OPTICAL AND QUANTUM ELECTRONICS, 2021, 53 (06)
  • [47] Two-level security approach combining watermarking and encryption for securing critical colored images
    Alaa Fkirin
    Gamal Attiya
    Ayman El-Sayed
    Optical and Quantum Electronics, 2021, 53
  • [48] Augmenting security of biometric with watermarking
    Paunwala, M. C.
    Patnaik, S.
    IMAGING SCIENCE JOURNAL, 2014, 62 (04): : 189 - 196
  • [49] Securing Data Using Elliptic Curve Cryptography and Least Significant Bit Steganography
    Bhadra, Jayati
    Banga, M. K.
    Murthy, M. Vinayaka
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 1460 - 1466
  • [50] Role of Threshold Cryptography in Securing MANETs
    Samreen, Aasia
    Hyderv, Syed Irfan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (01): : 106 - 112