Lip biometric template security framework using spatial steganography

被引:21
作者
Das, Srijan [1 ]
Muhammad, Khan [2 ]
Bakshi, Sambit [3 ]
Mukherjee, Imon [4 ]
Sa, Pankaj K. [3 ]
Sangaiah, Arun Kumar [5 ]
Bruno, Andrea [6 ]
机构
[1] INRIA, STARS Team, Sophia Antipolis, France
[2] Sejong Univ, Digital Contents Res Inst, Intelligent Media Lab, Seoul, South Korea
[3] Natl Inst Technol, Dept Comp Sci & Engn, Rourkela, India
[4] Indian Inst Informat Technol, Dept Comp Sci & Engn, Kalyani, W Bengal, India
[5] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
[6] Univ Salerno, Dipartimento Informat, Fisciano, Italy
关键词
Lip biometrics; Steganography; Privacy-preservation; Template security; PERSONAL IDENTIFICATION; PRINT RECOGNITION;
D O I
10.1016/j.patrec.2018.06.026
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this work, we have proposed an efficient and secured lip biometric framework. Unlike the traditional biometric frameworks, that focus on the recognition accuracy only, we focus on both recognition rate along with securing the templates stored in the biometric system. Our contribution also includes using a pre-processing step for improving the local features of the lip images. Local interest points detected by Scale Invariant Feature Transform (SIFT) are used for extracting the lip features. A spatial steganographic algorithm is employed on the lip images to ensure minimum distortion along with hiding the identity of the lip images in the images itself, thus ensuring less chance of misuse of the template. We have reported a comparative analysis of using our steganographic algorithm to secure the template management system to ensure that it does not hamper the recognition rate of the biometric system. We have validated our proposed framework on NITRLipV1 and NITRLipV2 comparing against state-of-the-art results which does not use identity hiding, and we have found the recognition along with hidden identity to yield equally satisfactory performance. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:102 / 110
页数:9
相关论文
共 50 条
  • [41] A robust way of steganography by using blocks of an image in spatial domain
    Abdulraman, Ladeh S.
    Salah, Sheerko R. Hma
    Maghdid, Halgurd S.
    Sabir, Azhin T.
    [J]. REVISTA INNOVACIENCIA, 2019, 7 (01):
  • [42] Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography
    Garg, Priyansha
    Sharma, Moolchand
    Agrawal, Shivani
    Kumar, Yastika
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 71 - 79
  • [43] Analogy of Various DNA Based Security Algorithms Using Cryptography and Steganography
    Jain, Shipra
    Bhatnagar, Vishal
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 285 - 291
  • [44] An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography
    Vijayakumar, P.
    Vijayalakshmi, V.
    Zayaraz, G.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (04) : 1221 - 1242
  • [45] Security Model for Secure Transmission of Medical Image Data Using Steganography
    Umeda, Tokuo
    Okawa, Akiko
    Gomi, Tsutomu
    [J]. INTEGRATING INFORMATION TECHNOLOGY AND MANAGEMENT FOR QUALITY OF CARE, 2014, 202 : 311 - 311
  • [46] Enhancing the Security and Quality of Image Steganography Using a Novel Hybrid Technique
    Verma, Vaidehi
    Ozha, Trapti
    [J]. SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 668 - 673
  • [47] Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions
    Al-Haidari, Fahd
    Gutub, Adnan
    Al-Kahsah, Khalid
    Hamodi, Jameel
    [J]. 2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 396 - 399
  • [48] An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography
    P. Vijayakumar
    V. Vijayalakshmi
    G. Zayaraz
    [J]. Wireless Personal Communications, 2016, 89 : 1221 - 1242
  • [49] Image security using steganography and cryptography with sweeping computational ghost imaging
    Rajabi-Ghaleh, Sajjad
    Olyaeefar, Babak
    Kheradmand, Reza
    Ahmadi-Kandjani, Sohrab
    [J]. FRONTIERS IN PHYSICS, 2024, 12
  • [50] Improve Security Using Steganography and Cryptography Based on Smartphone Users Locations
    Ahmed, Anfal Mahmood
    Non, Ahmed Sami
    [J]. 2022 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL, COMPUTING, COMMUNICATION AND SUSTAINABLE TECHNOLOGIES (ICAECT), 2022,