This Article 
 Bibliographic References 
 Add to: 
Hiding Biometric Data
November 2003 (vol. 25 no. 11)
pp. 1494-1498

Abstract—With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are possible in a biometric system, make the issue of security/integrity of biometric data extremely critical. We introduce two applications of an amplitude modulation-based watermarking method, in which we hide a user's biometric data in a variety of images. This method has the ability to increase the security of both the hidden biometric data (e.g., eigen-face coefficients) and host images (e.g., fingerprints). Image adaptive data embedding methods used in our scheme lead to low visibility of the embedded signal. Feature analysis of host images guarantees high verification accuracy on watermarked (e.g., fingerprint) images.

[1] BIOMETRICS: Personal Identification in Networked Society, A. Jain, S. Pankanti, and R. Bolle, eds., Kluwer, 1999.
[2] B. Schneier, "Inside Risks: The Uses and Abuses of Biometrics," Comm. ACM, vol. 42, no. 8, Aug. 1999, p. 136.
[3] N.K. Ratha, J.H. Connell, and R.M. Bolle, An Analysis of Minutiae Matching Strength Proc. Third Int'l. Conf. Audio- and Video-Based Biometric Person Authentication, pp. 223-228, June 2001.
[4] N.K. Ratha, J.H. Connell, and R.M. Bolle, A Biometrics-Based Secure Authentication System Proc. IEEE Workshop Automatic Identification Advanced Technologies, pp. 70-73, Oct. 1999.
[5] P.K. Janbandhu and M.Y. Siyal, Novel Biometric Digital Signatures for Internet-Based Applications Information Management and Computer Security, vol. 9, no. 5, pp. 205-212, 2001.
[6] F. Hartung and M. Kutter, "Multimedia Watermarking Techniques,'' Proc. IEEE, vol. 87, IEEE Press, Piscataway, N.J., July 1999, pp. 1079-1107.
[7] M. Kutter, F. Jordan, and F. Bossen, Digital Signature of Color Images Using Amplitude Modulation Proc. SPIE, vol. 3022, pp. 518-526, 1997.
[8] M. Barni, F. Bartolini, V. Cappellini, and A. Piva, A DCT Domain System for Robust Image Watermarking Signal Processing, vol. 66, no. 3, pp. 357-372, May 1998.
[9] N.K. Ratha, J.H. Connell, and R.M. Bolle, Secure Data Hiding in Wavelet Compressed Fingerprint Images Proc. ACM Multimedia, pp. 127-130, Oct. 2000.
[10] S. Pankanti and M.M. Yeung, Verification Watermarks on Fingerprint Recognition and Retrieval Proc. SPIE, vol. 3657, pp. 66-78, 1999.
[11] S. Jain, Digital Watermarking Techniques: A Case Study in Fingerprints&Faces Proc. Indian Conf. Computer Vision, Graphics, and Image Processing, pp. 139-144, Dec. 2000.
[12] B. Gunsel, U. Uludag, and A.M. Tekalp, Robust Watermarking of Fingerprint Images Pattern Recognition, vol. 35, no. 12, pp. 2739-2747, Dec. 2002.
[13] R. Cappelli, A. Erol, D. Maio, and D. Maltoni, “Synthetic Fingerprint-Image Generation,” Proc. 15th Int'l Conf. Pattern Recognition (ICPR 2000), pp. 475-478, Sept. 2000.
[14] The USC-SIPI Image Database. / Database.html. 2003.
[15] B. Schneier, Applied Cryptography, second ed., John-Wiley, 1996.
[16] A.K. Jain, L. Hong, S. Pankanti, and R. Bolle, “An Identity Authentication System Using Fingerprints,” Proc. IEEE, vol. 85, no. 9, pp. 1365-1388, 1997.
[17] Evaluation of Face Recognition Algorithms. 2003.

Index Terms:
Biometrics, data hiding, face, fingerprint, minutiae, steganography, watermarking.
Anil K. Jain, Umut Uludag, "Hiding Biometric Data," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 11, pp. 1494-1498, Nov. 2003, doi:10.1109/TPAMI.2003.1240122
Usage of this product signifies your acceptance of the Terms of Use.