Visible to the public A Novel Technique for Biometric Data Protection in Remote Authentication System

TitleA Novel Technique for Biometric Data Protection in Remote Authentication System
Publication TypeConference Paper
Year of Publication2019
AuthorsJilnaraj, A. R., Geetharanjin, P. R., Lethakumary, B.
Conference Name2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT)
Keywordsbiometric data protection, biometric encryption, biometric features, biometrics, biometrics (access control), chaotic encrypted fingerprint image, chaotic encryption, cover image, crypto-steganography method, cryptography, extracted fingerprint image, feature extraction, fingerprint identification, Fingerprint recognition, image segmentation, Integer Wavelet Transform, IWT based data hiding increases, Metrics, pubcrawl, Qualified Significant Wavelet Trees, remote authentication system, resilience, Resiliency, Scalability, secret image, semantic segmentation, steganography, transmitted biometric data, wavelet transforms
AbstractRemote authentication via biometric features has received much attention recently, hence the security of biometric data is of great importance. Here a crypto-steganography method applied for the protection of biometric data is implemented. It include semantic segmentation, chaotic encryption, data hiding and fingerprint recognition to avoid the risk of spoofing attacks. Semantically segmented image of the person to be authenticated is used as the cover image and chaotic encrypted fingerprint image is used as secret image here. Chaotic encrypted fingerprint image is embedded into the cover image using Integer Wavelet Transform (IWT). Extracted fingerprint image is then compared with the fingerprints in database to authenticate the person. Qualified Significant Wavelet Trees (QSWT`s) of the cover image act as the target coefficients to insert the secret image. IWT provide both invisibility and resistance against the lossy transmissions. Experimental result shows that the semantic segmentation reduces the bandwidth efficiently. In addition, chaotic encryption and IWT based data hiding increases the security of the transmitted biometric data.
DOI10.1109/ICICICT46008.2019.8993412
Citation Keyjilnaraj_novel_2019