Pravin et al. in (Pravin et al., 2011) proposed a
stegano-crysto system for enhancing biometric
feature security with RSA and data hiding. The aim
is to increase security of biometric system and
facilitate identification. They used a biometric code
generated from captured biometric image. The light
of this paper is the use of the RSA algorithm and
data hiding process to protect the biometric
information against attacks. But the authors did not
precise whose is the biometric image used as host
image and those used as watermarks. Also the
authors did not investigate about the robustness of
the data hiding against attacks and distortion
inducted with watermark embedding. Thus, because
sometimes the embedding destroys the biometric
features of biometric image itself. For example,
when the face features are embedded into fingerprint
image, the features of fingerprint may get disturbed
and wrong minutiae points may arise. Another point
important is that the authors did not discuss the
credibility of the verification and recognition
performance under attacks
Jain et al. (Jain and Uludag,
2003)
have hidden
fingerprint image features in face image. Then they
proposed to hide the facial information as watermark
to authenticate the fingerprint image. A bit stream of
eigenface coefficients is embedded into selected
fingerprint image pixels using a randomly generated
secret key. The extraction bits are then employed for
fusion recognition with host fingerprint image.
However, since the Extracted pattern is given for
identification without credibility verification, it only
increases recognition performance under attack free
circumstances thus provide no additional security.
Another important criterion to respect in the data
hiding is the payload which is low in the proposed
algorithm.
Mathivadhani et al. (Mathivadhani and
Meena, 2010)
have presented a comparative study on fingerprint
protection using watermarking techniques.
However, most of these works induced distortion
with watermark embedding sometimes destroys the
biometric features of the fingerprint image itself. For
example, when the face features are embedded into
fingerprint image, the features of fingerprint may get
disturbed and wrong minutiae points may arise.
In addition of these attacks, and by analyzing the
fingerprints based identification system, we found
that generally the enrolled fingerprint images are
stored in a database along with the demographic text
data of the individual and a facial image. The
different data types are usually stored under three
different sub categories in a database. The
collection, storage and analysis of disparate
information introduces problems such as data
mismatches and mishandling, high cost of storage, a
longer time for retrieval, and unauthorized
tampering of the files in the database (Noore et al.,
2007). This leads to the decrease of the biometric
system credibility (Figure 2). Ensuring the security
and the integrity of biometric data has become a
critical issue.
Figure 2: The attack after enrolment in AFIS system.
In order to solve this problem, this paper proposes
an algorithm that combines a digital watermarking
technique and an Arnold scrambling process. The
digital watermarking approach is used to embed the
iconic digital information (watermark) where in our
case; it’s composed of ID image and gray scale face
image into the corresponding enrolled digital
fingerprint of the person. Embedding the facial and
ID data into the individuals fingerprint image
eliminates data mismatch, reduces the high cost of
storage, speeds the retrieval of related data and
detects tampering. It is important to ensure that the
embedded ID and face watermarks do not alter the
functional integrity of the fingerprint and its ability
to detect possible matches.
The unique robustness and security character of
the watermark can ensure the integrity and reliability
of the fingerprint data after information exchange
process. So it can identify the authenticity of the
contents, as well as content protection.
The proposed watermarking method is based on
Shih approach (Shih and al., 2011), where he
proposed a semi fragile spatial watermarking based
on Local Binary Pattern operator (LBP) to embed a
binary watermark. The operator takes a local
neighborhood around each pixel, thresholds the
pixels of the neighborhood at the value of the central
pixel and uses the resulting binary-valued image
patch as a local image descriptor.
In the proposed algorithm, the embedding
process is performed on two levels. In the first level
the binary ID image is inserted while the gray scale
face image is embedded in the second level. To
SIGMAP2014-InternationalConferenceonSignalProcessingandMultimediaApplications
34