data within the image file. Therefore, the encryption-
related information can be arranged into a data frame
and stored directly in the meta-data area of the im-
age. However, many widely used image formats do
not provide a standard for embedding custom meta-
data. These include BMP, GIF, and PNG. Therefore,
an alternative approach must be devised to store the
encryption-related information without affecting for-
mat compliance for the algorithm to support such im-
age formats. To remedy this problem, encryption-
related information is encoded and then hidden within
the image content data itself using digital image wa-
termarking techniques.
The actual encoding scheme for the encryption-
related information depends on a number of factors,
such as the acceptable shapes of the ROI and the num-
ber of levels of authority supported. A sample frame
for a 1024×1024 image with 2 regions of interests (A
and B) and 2 levels of authority (0 and 1) is shown
in Figure 2. One side benefit of storing the encoded
encryption-related information directly into the im-
age using watermarking techniques is that no addi-
tional storage space is required to hold the informa-
tion. The watermarking technique is performed af-
ter image compression if a lossy image compression
scheme is used in the image format. This ensures that
the encoded encryption-related information is not lost
due to lossy image compression.
Figure 2: Sample ROI Information Frame.
2.3 Biometric Authentication
A major issue that needs to be addressed is the need
for user authentication. This issue is not addressed in
JPSEC and related works on image encryption. How-
ever, it is very important to ensure that the person
viewing the secure content is in fact the person who
is authorized to view the information. A traditional
method for authenticating a user is through the use
of passwords. To access the desired content, the user
sends a password to an authentication server. If the
password used is correct, the server sends a strong
encryption key back to the user which can then be
used to decrypt the data. However, this is not very se-
cure since passwords are often short and chosen such
that they are easy to remember. An attacker can eas-
ily determine passwords using a combination of brute
force methods, guesses, or phishing attacks that en-
tice users to reveal passwords. A more effective so-
lution to providing user authentication is through the
use of biometric authentication. In biometric authen-
tication, biological characteristics that are unique to
the user are used for authentication. These biological
characteristics include fingerprints, iris patterns, and
speech. Unlike methods using passwords, biometric
information is a unique characteristic of an individ-
ual and therefore less susceptible to physical theft if
the biometric system is properly implemented. There
are numerous different biometric recognition methods
available depending on the type of biometric data is
used. A survey on biometric techniques can be found
in (Delac and Grgic, 2004). For the purpose of this
research, the focus is on presenting a method for in-
tegrating biometric user authentication into the pro-
posed multi-level ROI image encryption architecture.
The basic concept of the proposed biometric ap-
proach is similar to that described for password-based
authentication. However, rather than sending a pass-
word, biometric data pertaining to the user is used to
construct a unique biometric key and the biometric
key is sent instead. Furthermore, two individuals with
the same level of authority must be able to view the
same content. Therefore, a way to allow more than
one person to the same content is needed.
Recall the example involving Alice, Bob, Carol,
and Donna from Section 2.1. This example can be
extended to integrate biometric authentication. To do
so, we introduce an authentication server (denoted as
AS) that also acts as a key management server. As
such, the AS possesses a database of biometric tem-
plates that include those of the participating parties.
When Alice wishes to protect the legal document, she
makes a request to the AS for a set of encryption keys
(one for each level of authority) and a UID. Alice also
sends the AS information regarding the level of au-
thority each of the participating parties have for the
image. The AS sends Alice the requested information
through a secure channel and stores a record of the
UID, the set of generated encryption keys, the level
of authority each key is associated with, and the level
of authority of each individual. Alice then encrypts
the image using the proposed multi-level ROI encryp-
tion techniques. The encrypted image is sent to Bob,
Carol, and Donna. When Bob views the image, he
sends his username, the biometric key constructed us-
ing his biometric information, and the UID of the im-
age to the AS through a secure channel. The AS then
takes the biometric key and matches it with the bio-
metric template associated with Bob. If the biometric
key matches that of the biometric template, the AS re-
trieves the set of encryption keys associated with the
level of authority assigned to Bob by Alice and sends
them to Bob. Bob can then use the set of encryption
BACKWARDS COMPATIBLE, MULTI-LEVEL REGIONS-OF-INTEREST (ROI) IMAGE ENCRYPTION
ARCHITECTURE WITH BIOMETRIC AUTHENTICATION
327