- Research Article
- Open Access
Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions
© Klimis Ntalianis et al. 2011
- Received: 12 April 2010
- Accepted: 3 January 2011
- Published: 13 February 2011
An automatic video-object oriented steganographic system is proposed for biometrics authentication over error-prone networks. Initially, the host video object is automatically extracted through analysis of videoconference sequences. Next, the biometric pattern corresponding to the segmented video object is encrypted by a chaotic cipher module. Afterwards, the encrypted biometric signal is inserted to the most significant wavelet coefficients of the video object, using its qualified significant wavelet trees (QSWTs). QSWTs provide both invisibility and significant resistance against lossy transmission and compression, conditions that are typical in error prone networks. Finally, the inverse discrete wavelet transform (IDWT) is applied to provide the stego-object. Experimental results under various losses and JPEG compression ratios indicate the security, robustness, and efficiency of the proposed biometrics hiding system.
- Chaotic System
- Chaotic Function
- Biometric Data
- Video Object
- Fingerprint Image
Person authentication is one of the most important issues in contemporary societies. It ensures that a system's resources are not obtained fraudulently by illegal users. Real-life physical transactions are generally accomplished using paper ID while electronic transactions are based on password authentication, the most simple and convenient authentication mechanism over insecure networks. In , a remote password authentication scheme was proposed by employing a one-way hash function, which was later used for designing the famous S/KEY one-time password system . However, in such schemes, a verification table should be maintained on the remote server in order to validate the legitimacy of the requesting users; if intruders break into the server, they can modify the verification table. Therefore, many password authentication schemes [3–7] have recognized this problem, and different solutions have been proposed to avoid verification tables.
One very popular solution is based on cryptographic keys, which are long and random (e.g., 128 bits for the Advanced Encryption Standard ), thus it is difficult to memorize. As a result, these keys are stored somewhere (e.g., on a server or smart card) and they are released based on some alternative authentication mechanism (e.g., password). However, several passwords are simple and they can be easily guessed (especially based on social engineering methods) or broken by simple dictionary attacks . In this case, user protection is only as secure as the password (weakest link) used to release the correct decrypting key for establishing user authenticity. Simple passwords are easy to guess; complex passwords are difficult to remember, and some users tend to "store" complex passwords at easily accessible locations. Furthermore, most people use the same password across different applications; if a malicious user determines a single password, they can access multiple applications.
Many of these password-based authentication problems can be confronted by the incorporation of biometrics [10, 11]. Biometrics authentication refers to establishing identity based on the physical and/or behavioral characteristics of a person such as face, fingerprint, hand geometry, iris, voice, way of walking, and so forth. Biometric systems offer several advantages over traditional password-based schemes. They are inherently more reliable, since biometric traits cannot be lost or forgotten, they are more difficult to forge, copy, share, and distribute, and they require the person being authenticated to be present at the time and point of authentication. Thus, a biometrics-based authentication scheme is a powerful alternative to traditional systems, and it can be easily combined with password techniques to enhance the offered security.
In order to further promote the wide spread utilization of biometric techniques to applications over error prone networks, increased security and especially robustness of the biometric data is necessary. Towards this direction, proper combination of encryption and steganography can achieve this goal. In particular, cryptographic algorithms can scramble biometric signals so that they cannot be understood. In a real-world scenario, encryption can be applied to the biometric signals for increasing security; the templates that can reside in either a central database or a token (e.g., smart card, or a biometric-enabled device such as a cellular phone with a fingerprint sensor), can be encrypted after enrollment. During authentication, these encrypted templates can be decrypted and used for generating the matching result with the biometric data obtained online. As a result, the encrypted templates are secured since they cannot be utilized or modified without decrypting them with the correct key, which is typically secret. On the other hand, steganographic methods can hide encrypted biometric signals so that they cannot be seen, hence, reducing the chances of illegal modifications. Generally, steganography utilizes typical digital media such as text, images, audio, or video files as a carrier (called a host or cover signal) for hiding private information in such a way that unauthorized parties cannot detect or even notice its presence .
Several steganographic algorithms have been proposed in the literature, most of which are performed in pixel domain, where more capacity  is provided. Many of the existing approaches are based on least significant bit (LSB) insertion, where the LSBs of the cover file are directly changed with message bits. Examples of LSB schemes can be found in [14, 15]. However, LSB methods are vulnerable to extraction [16, 17], and they are very sensitive to image manipulations. For example, converting an image from BMP to JPEG and then back would destroy the hidden information . Furthermore, if an enciphered message is LSB-embedded and transmitted over a mobile network, then it may not be possible to decipher it, even in case of little losses.
On the other hand, a limited number of methods to confront these problems have been proposed. In , spread spectrum image steganography (SSIS) was introduced. The SSIS incorporated the use of error control codes to correct the large number of bit errors. In , the message is hidden in the sign/bit values of insignificant children of the detail subbands, in nonsmooth regions of the image. Using this technique, steganographic messages can be sent in lossy environments, with some robustness against detection or attack. However, low losses are considered, and the problem of compression remains. A very interesting approach is proposed in . The message is comprised of two components: a soft-authenticator watermark for authentication and tamper assessment of the given image, and a chrominance watermark employed to improve the efficiency of compression. The approach is implemented as a DCT-DWT dual domain, but, unfortunately, the authenticator watermark is not encrypted, making it possible to extract it.
There are also some schemes focusing on steganography of biometric signals. In , an amplitude modulation-based steganographic scheme is proposed, which, however, is not tested under compression or lossy transmission. In , a wavelet-based steganographic method for minutiae embedding is proposed. Nevertheless, if opponents know the embedding algorithm, they can easily extract the hidden information. In , fingerprints are hidden in the region of interest of images. Both DFT and DWT domains are examined. However, again, no encryption is incorporated, thus it is easy to extract the hidden fingerprints. Another interesting, but not resistant to compression, method is proposed in , where a remote multimodal biometrics authentication framework that works on the basis of fragile watermarking is designed. Finally, in , a DCT-SVD-based watermarking scheme is proposed for ownership protection using biometrics. The scheme is not tested under compression or lossy transmission.
In order to confront the problem of user authentication, in this paper, we propose an efficient wavelet-based steganographic method for biometric signals hiding in video objects, which focuses on optimizing the authentication rate of hidden biometric data over error prone transmissions. Interesting techniques for object-oriented data hiding have been presented in the literature, for example [26, 27], however, most of them do not particularly consider the case of biometric data. Thus the main contributions and novelties of the proposed system are as follows. (a) It is one of the first to use video objects to hide their respective biometrics. By this way "dual" authentication is accomplished, the first by visual perception of the figured person, and the second by extraction and matching of the hidden pattern. (b) Biometric signals are encrypted before hiding, using a fast chaotic method. The statistical properties of this novel combination are analyzed and presented. (c) A DWT-based algorithm is adapted for biometrics hiding. In contrast to most steganographic algorithms that are capacity-efficient, the proposed algorithm is very robust to several types of signal distortions. Even though it has been incorporated in a limited number of watermarking schemes, its steganographic potential has not been examined. (d) Resistance of steganographic biometrics systems to signal distortions has not been sufficiently investigated in the literature, a topic that is extensively considered in this paper. By this way, the proposed scheme contributes to illustrate the perspective of encrypted biometrics authentication systems over error prone networks.
In particular, in the proposed system, the biometric signal is initially enciphered using a chaotic pseudorandom bit generator and a chaos-driven cipher, based on mixed feedback and time-variant S-boxes. The use of a chaos-based cryptographic module is justified by the following facts. (a) Chaos presents many desired cryptographic qualities, such as sensitivity to initial conditions, a feature that is very important to an encryption scheme, (b) a chaotic pseudo-random bit generator works very well as a one-time pad generator [28, 29], and one-time pads have been proven to be information-theoretically secure, (c) implementations of popular public key encryption methods, such as RSA or El Gamal cannot provide suitable encryption rates, while security of these algorithms relies on the difficulty of quickly factorizing large numbers or solving the discrete logarithm problem, topics that are seriously challenged by recent advances in number theory and distributed computing and (d) private-key bulk encryption algorithms such as Triple DES or Blowfish, similarly to chaotic algorithms, are more suitable for transmission of large amounts of data. However, due to the complexity of their internal structure, they are not particularly fast in terms of execution speed and cannot be concisely and clearly explained, so as to enable detection of cryptanalytic vulnerabilities.
After encryption, a videoconference image, containing the owner of the biometric signal, is analyzed, and the host video object (VO) is automatically extracted based on the method proposed in . Next, a DWT-based algorithm is proposed for hiding the encrypted biometric signal to the host video object. The proposed algorithm hides the encrypted information into the largest-value qualified significant wavelet trees (QSWTs) of energy-efficient pairs of subbands. Compared to other related schemes, the incorporated approach has the following advantages . (a) It is one of the most efficient algorithms of the literature that better support robust hiding of visually recognizable patterns, (b) it is hierarchical and has multiresolution characteristics, (c) the embedded information is hard to detect by the human visual system (HVS), and (d) it is among the best known techniques with regards to survival of hidden information after image compression.
The rest of this paper is organized as follows. In Section 2, a short description of QSWTs together with the essential definitions is provided. In Section 3, the chaotic encryption scheme is analyzed while Section 4 discusses the proposed biometrics hiding method. Experimental results are given in Sections 5 and 6 concludes this paper.
By applying the DWT once to an image, four parts of high, middle, and low frequencies (i.e., LL 1 , HL 1 , LH 1 , HH 1 ) are produced, where subbands HL 1 , LH 1 , and HH 1 contain the finest scale wavelet coefficients. The next coarser scale wavelet coefficients can be obtained by decomposing and critically subsampling subband LL 1 . This process can be repeated several times, based on the specific application. Furthermore, the original image can be reconstructed using the IDWT. In the proposed biometrics hiding scheme, coefficients with local information in the subbands are chosen as the target coefficients for inserting a fingerprint image. The coefficients' selection is based on the QSWT derived from EZW , and the basic definitions follow.
Firstly, a parent-child relationship is defined between wavelet coefficients at different scales, corresponding to the same location. Excluding the highest frequency subbands (i.e., HL 1 , LH 1 , and HH 1 ), every coefficient at a given scale can be related to a set of coefficients at the next finer scale of similar orientation. The coefficient at the coarse scale is called the parent, and all coefficients corresponding to the same spatial location at the next finer scale of similar orientation are called children. For a given parent, the set of all coefficients at all finer scales of similar orientation corresponding to the same location are called descendants.
A wavelet coefficient is a parent of , where D is a subband labeled HL n , LH n , HH n , , , , and .
If a wavelet coefficient at the coarsest scale and its descendants satisfy , , for a given threshold T, then they are called wavelet zerotrees, where .
If a wavelet coefficient at the coarsest scale satisfy , for a given threshold T, then is called a significant coefficient.
If a wavelet coefficient at the coarsest scale is a parent of , where D is a subband labeled HL n , LH n , HH n , satisfy , for given thresholds and , then and its children are called a QSWT.
3.1. Keys Generation Based on C-PRBG
In most secure cryptographic schemes, the security of the encrypted content mainly depends on the size of the key. In our system, for each biometric signal a different key is used, which has a size of 256 bits, leading to a symmetric cipher. Each key is generated by a chaotic pseudo-random bit generator (C-PRBG). C-PRBGs based on a single chaotic system can be insecure, since the produced pseudorandom sequence may expose some information about the employed chaotic system . For this reason, in this paper, we propose a PRBG based on a triplet of chaotic systems, which can provide higher security than other C-PRBGs , as three chaotic systems are employed. The basic idea of the C-PRBG is to generate pseudo-random bits by mixing three different and asymptotically independent chaotic orbits.
According to this scheme, the generation of each bit of a key is controlled by the orbit of the third chaotic system, having as initial conditions the outputs of the other two chaotic systems.
3.2. The Encryption Module
After generating a pseudo-random key for each biometric signal, the cipher module is activated. Before encryption, the samples of each biometric signal are properly ordered. In case of 1-D signals (e.g., voice), the order is the same as the sequence of samples while in 2-D signals (e.g., fingerprint image) pixels are scanned from top-left to bottom-right, providing plaintext pixels . Next, we take into consideration the fact that multiple iterations of chaotic functions lead to slow ciphers while a small number of iterations may raise security problems, so that the encryption algorithm is both fast and secure . In order to make possible a single iteration of the chaotic systems while maintaining high security standards, the proposed scheme combines a simple chaotic stream cipher and two simple chaotic block ciphers (with time variant S-boxes) to implement a complex product cipher.
where symbol ⊕ represents the XOR function, are time-variant S-boxes (bijections defined on ) and is produced from the states of three chaotic functions. Here, the f S are also pseudorandomly controlled by the chaotic functions. The secret key provides the initial conditions and control parameters of the employed chaotic systems. The increased complexity of the proposed cipher against possible attacks is due to the mixed feedback (internal and external): at FB 1 , at FB 2 and ciphertext feedback at FB 3 , which lead the cipher to acyclic behavior.
The procedure is terminated after all ordered signal samples are enciphered, providing the final encrypted biometric signal. This encrypted signal is then used by the hiding module.
3.3. The Decryption Module
The decryption module receives at its input a vector of enciphered signal samples, the initial control parameters and initial conditions for the triplet of chaotic maps (C-PRBG module), and the initial cipher value (used at the first feedback).
Afterwards, the digital chaotic systems produce the same specific values used during encryption, but now for decryption purposes. The procedure is terminated after the final sample is decrypted and all decrypted samples are reordered (in case of 2D signals), to provide the initial biometrics signal.
In the proposed biometrics hiding method, one of the initial steps includes detection of the QSWTs for a pair of subbands of the host video object. Towards this direction, let us assume that the host video object is decomposed into two levels using the DWT to provide three pairs of subbands: , , and . In this paper, and after extensive experimentation, just two levels are used, where 1 to 4 levels' decomposition has been examined. According to our findings, the best tradeoff between complexity and robustness was provided for 2 levels.
with , , , , and is the size of one of the subbands at level 2.
4.1. The Hiding Strategy
Next, the QSWTs are detected according to Algorithm 1.
Algorithm 1: Algorithm for QSWTs detection.
For to /* is the size of subband */
where , , , .
Finally, the 2-D IDWT is applied to the modified and unchanged subbands to form the stego-object.
4.2. Message Recovery
Considering that the stego-object (or a distorted version of it) has reached its destination, the encrypted biometric signal is initially extracted by following a reverse (to the embedding method) process. Towards this direction, let us assume that the recipient of the stego-object has also received the size of the encrypted 2-D biometric signal ( ), the scaling constants ( , ), and possesses the original host video object. Then the following steps are performed in the recipient's side.
The resulting hidden message coefficients and are averaged and rearranged to provide the encrypted biometric signal.
The original biometric signal is recovered by decrypting the enciphered signal (see Section 3.3).
Here, it should be mentioned that if the same video object is used for every authentication attempt, the scheme may become vulnerable to attacks. In order to confront this problem, the sender and receiver may share multiple video objects (poses) for each user. In each authentication session, the sender may select one pose and inform the receiver of the selected pose's ID. This is a methodology more resistant to attacks, which can become even more efficient if new poses of the users are periodically collected.
For evaluation purposes, the proposed video-objects oriented biometric signals hiding scheme is examined in terms of security and efficiency. In particular, the database of the POLY-BIO project  was used, which contains more than 1500 biometric signals, 300 of which are fingerprints. The authentication setting, which focused on fingerprints, was simulation-based and included three different scenarios that are described in the following paragraphs. The general methodology included (a) extraction of the host video object from a videoconference image and detection of the QSWTs to embed the encrypted signal, (b) encryption of the fingerprint, (c) embedding of the encrypted signal to the host video object, (d) compression of the final content and simulated noisy transmission, (e) decompression, and extraction of the encrypted signal, (f) decryption and (g) authentication.
Here, it should be mentioned that due to the acyclic behavior of the encryption module, the output keystream has all the merits of one-time pads, and thus it is very difficult to cryptanalyze, using statistical attacks. For this reason some tests have been performed to check the security of the encryption system. Towards this direction, let us assume that an unauthorized user knows the QSWTs, where the encrypted biometric signal of Figure 3(c) is hidden and tries to decrypt it by, brute force attack. Let us also assume that he has also obtained a rearranged version of the image, where all pixels are on proper position. If the exact key is used, then the content can be decrypted. However, even if the key differs by just one bit, the content will not be decrypted as it can be seen in Figure 5(c).
Next, the robustness of the proposed biometrics hiding method has been extensively evaluated under various simulation tests, performed using MATLAB. In particular, during experimentation, the host video objects of Figures 3(d) and 4(d) were used, in which, the encrypted biometric signals of Figures 3(c) and 4(c) were hidden, respectively. Then according to the size of the encrypted biometric signals, the top QSWTs were selected for both host video objects to embed the signals. For simplicity, in the performed experiments, and were fixed in all frequency bands and were chosen to be and . The stego-objects can be seen in Figures 3(e) and 4(e), providing PSNRs of 46.17 and 45.44 dB, respectively. As it can be observed, the embedded encrypted biometric signals have caused imperceptible changes to the host video objects.
Afterwards, since the proposed system is designed for user authentication under error-prone transmissions, the case of mobile networks is further studied as a typical example, and the system's resistance is investigated under different JPEG compression ratios and various bit error rates (BERs). More particularly, compression ratios between 1.6 and 7.1 were used while BERs took values between and , considering that typical average BERs for cellular mobile radio channels are in the interval [10-4 10-3] . In our simulations, we assume unreliable connectionless mobile transmission protocols, where errors occur only in the data field of each packet (headers remain intact). Furthermore, here it should be mentioned that even though the majority of mobile applications use "closed" image formats, there are some that use JPEG (e.g., Image Converter by AOXUE.studio or Image Converter 5th v3.0.0 for Symbian s60 5th edition), while the market tendency for JPEG-enabled applications is increasing. Finally, in all experiments, fingerprint authentication is based on the minutiae string matching algorithm presented in .
Under these assumptions, in order to fully illustrate the authentication capabilities of the proposed scheme and to compare it to another steganographic method, three different scenarios have been investigated. In the first scenario (SC1), the original biometric data is compressed and transmitted over error-prone channels without being encrypted or hidden. In the second scenario (SC2), the original biometric data is hidden into their respective host-objects using either the proposed method (PR) or another interesting steganographic method (ZG), introduced by Zhang et al. . The final content is compressed and transmitted over error-prone channels. In the third scenario (SC3), which is the full usage scenario of the proposed scheme, the original biometric data is initially encrypted, and now, in contrast to SC2, the encrypted data is hidden to the respective host-objects. The final stego-objects are compressed and transmitted. In all three scenarios, the authentication accuracy is examined.
Biometric signal retrieval results for the stego-object of Figure 3(e), under different combinations of compression ratios and BERs.
Biometric signal retrieval results for the stego-object of Figure 4(e), under different combinations of compression ratios and BERs.
Biometric signals enter more and more into our everyday lives, since governments resort to their use in accomplishing crucial procedures (e.g., citizen authentication). Thus there is an urgent need to further develop and integrate biometric authentication techniques into practical applications.
Towards this direction, in this paper, the domain of biometrics authentication over error-prone networks has been examined. Since steganography by itself does not ensure secrecy, it was combined with a chaotic encryption system. The proposed procedure, other than providing results that are imperceptible to human visual system, it also outputs a stego-object that can resist different signal distortions. Experimental results on the database of POLY-BIO project , which contains more than 1500 biometric signals, illustrate the performance of the proposed system. Experiments have been designed to fulfill the requirements of three different scenarios. In the first scenario (SC1), the original biometric data was compressed and transmitted over error-prone channels without being encrypted or hidden. In the second scenario (SC2), the original biometric data was hidden into their respective host-objects, and the final content was compressed and transmitted over error-prone channels. In the third scenario (SC3), the original biometric data was initially encrypted and hidden into the respective host-objects and the final stego-objects were compressed and transmitted. All experiments have been performed for JPEG compression and typical BERs of wireless links. By examining the three scenarios, it was found that SC2 provided the highest authentication rate (about 75%). However, even though SC3 did not result into the best authentication scores or lowest complexity, it is the most secure among the three. Finally, the proposed scheme was also compared to a typical steganographic scheme based on LSBs' manipulation, which it outperformed, for the specified signal distortion conditions.
In future research, the effects of compression and mobile transmission of other hidden biometric signals (e.g., voice or iris) should also be examined, or cases of other common signal distortions such as additive noise or image resize operations could be considered. Another very interesting research topic focuses on tackling the problem of lost biometric data. Several techniques could be examined from the areas of image error concealment, region restoration, or region matching. Based on the focus of the first area, the lost biometric data can be concealed from the authentication module, so that it attempts to perform authentication even though parts are missing (maybe parts that do not contain any crucial information, for example, terminations/bifurcations in case of fingerprints). Restoration aims at reproducing lost regions, usually using interpolation techniques. In this case also, if the restored region would not contain crucial information, results could be interesting. Finally, region matching and classification methods can also play an important role in authenticating a partially complete biometric signal.
This was funded by the Cyprus Research Promotion Foundation in the framework of PLHRO/0506/04: "POLY-BIO," Multimodal Biometric Security System.
- Lamport L: Password authentication with insecure communication. Communications of the ACM 1981, 24(11):770-772. 10.1145/358790.358797MathSciNetView ArticleGoogle Scholar
- Haller N: The S/KEY one-time password system. Proceedings of the ISOC Symposium on Network and Distributed System Security, 1994 151-157.Google Scholar
- Lee C-C, Hwang M-S, Yang W-P: A flexible remote user authentication scheme using smart cards. Operating Systems Review 2002, 36(3):46-51. 10.1145/567331.567335View ArticleGoogle Scholar
- Chang CC, Hwang KF: Some forgery attacks on a remote user authentication scheme using smart cards. Informatica 2003, 14(3):289-294.MathSciNetMATHGoogle Scholar
- Leung KC, Cheng LM, Fong AS, Chan CK: Cryptanalysis of a modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2003, 49(4):1243-1245. 10.1109/TCE.2003.1261224View ArticleGoogle Scholar
- Hsu CL: Security of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards and Interfaces 2004, 26(3):167-169. 10.1016/S0920-5489(03)00094-1View ArticleGoogle Scholar
- Kumar M: Some remarks on a remote user authentication scheme using smart cards with forward secrecy. IEEE Transactions on Consumer Electronics 2004, 50(2):615-618. 10.1109/TCE.2004.1309438View ArticleGoogle Scholar
- Stallings W: Cryptography and Network Security: Principles and Practices. 3rd edition. Prentice-Hall, Upper Saddle River, NJ, USA; 2003.Google Scholar
- Klein DV: Foiling the cracker: a survey of, and improvements to, password security. Proceedings of the 2nd USENIX Workshop Security, 1990 5-14.Google Scholar
- Jain AK, Ross A, Prabhakar S: An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology 2004, 14(1):4-20. 10.1109/TCSVT.2003.818349View ArticleGoogle Scholar
- Bolle RM, Connell JH, Ratha NK: Guide to Biometrics. Springer, New York, NY, USA; 2004.View ArticleGoogle Scholar
- Swanson MD, Kobayashi M, Tewfik AH: Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE 1998, 86(6):1064-1087. 10.1109/5.687830View ArticleGoogle Scholar
- Ramkumar M, Akansu AN: Capacity estimates for data hiding in compressed images. IEEE Transactions on Image Processing 2001, 10(8):1252-1263. 10.1109/83.935040View ArticleMATHGoogle Scholar
- van Schyndel RG, Tirkel AZ, Osborne CF: A digital watermark. Proceedings of the IEEE International Conference on Image Processing, 1994 2: 86-90.Google Scholar
- Ruanaidh JJKÓ, Dowling WJ, Boland FM: Watermarking digital images for copyright protection. Proceedings of the IEEE International Conference on Image Processing 3: 211-214.Google Scholar
- Johnson NF, Jajodia S: Exploring steganography: seeing the unseen. Computer 1998, 31(2):26-34.View ArticleGoogle Scholar
- Fridrich J, Du R, Long M: Staganalysis of LSB encoding in color images. Proceedings of the IEEE International Conference on Multi-Media and Expo (ICME '00), July-August 2000, New York, NY, USA 1279-1282.Google Scholar
- Marvel LM, Boncelet CG, Retter CT: Spread spectrum image steganography. IEEE Transactions on Image Processing 1999, 8(8):1075-1083. 10.1109/83.777088View ArticleGoogle Scholar
- Areepongsa S, Syed YF, Kaewkamnerd N, Rao KR: Steganography for a low bit-rate wavelet based image coder. Proceedings of the IEEE International Conference on Image Processing (ICIP '00), 2000, Vancouver, Canada 1: 597-600.Google Scholar
- Kundur D, Zhao Y, Campisi P: A steganographic framework for dual authentication and compression of high resolution imagery. Proceedings of the IEEE International Symposium on Circuits and Systems, May 2004, Vancouver, Canada 2: II1-II4.Google Scholar
- Jain AK, Uludag U: Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence 2003, 25(11):1494-1498. 10.1109/TPAMI.2003.1240122View ArticleGoogle Scholar
- Zebbiche K, Ghouti L, Khelifi F, Bouridane A: Protecting fingerprint data using watermarking. Proceedings of the 1st NASA/ESA Conference on Adaptive Hardware and Systems (AHS '06), June 2006, tur 451-456.View ArticleGoogle Scholar
- Zebbiche K, Khelifi F: Region-based watermarking of biometric images: case study in fingerprint images. International Journal of Digital Multimedia Broadcasting 2008., 2008:Google Scholar
- Hoang T, Tran D, Sharma D: Remote multimodal biometric authentication using bit priority-based fragile watermarking. Proceedings of the 19th International Conference on Pattern Recognition (ICPR '08), December 2008 1-4.Google Scholar
- Rao NN, Thrimurthy P, Babu BR: A novel scheme for digital rights management of images using biometrics. International Journal of Computer Science and Network Security 2009, 9(3):157-167.Google Scholar
- Campisi P: Object-oriented stereo-image digital watermarking. Journal of Electronic Imaging 2008., 17(4):Google Scholar
- Pham VQ, Miyaki T, Yamasaki T, Aizawa K: Robust object-based watermarking using feature matching. IEICE Transactions on Information and Systems 2008, 91(7):2027-2034.View ArticleGoogle Scholar
- Ntalianis KS, Kollias SD: Chaotic video objects encryption based on mixed feedback, multiresolution decomposition and time-variant S-boxes. Proceedings of the International Conference on Image Processing (ICIP '05), September 2005, Genova, Italy 2: 1110-1113.Google Scholar
- Li S, Zheng X, Mou X, Cai Y: Chaotic encryption scheme for real-time digital video. Real-Time Imaging VI, January 2002, Proceedings of SPIE 4666: 149-160.View ArticleGoogle Scholar
- Doulamis A, Doulamis N, Ntalianis K, Kollias S: An efficient fully unsupervised video object segmentation scheme using an adaptive neural-network classifier architecture. IEEE Transactions on Neural Networks 2003, 14(3):616-630. 10.1109/TNN.2003.810605View ArticleGoogle Scholar
- Hsieh MS, Tseng DC, Huang YH: Hiding digital watermarks using multiresolution wavelet transform. IEEE Transactions on Industrial Electronics 2001, 48(5):875-882. 10.1109/41.954550View ArticleGoogle Scholar
- Ntalianis KS, Doulamis ND, Doulamis AD, Kollias SD: Automatic stereoscopic video object-based watermarking using qualified significant wavelet trees. Proceedings of the International Conference on Consumer Electronics (ICCE '02), June 2002, Los Angeles, Calif, USA 188-189.Google Scholar
- Shapiro JM: Embedded image coding using zerotrees of wavelet coefficients. IEEE Transactions on Signal Processing 1993, 41(12):3445-3462. 10.1109/78.258085View ArticleMATHGoogle Scholar
- Protopopescu VA, Santoro RT, Tollover JS: Fast and secure encryption—decryption method based on chaotic dynamics. US Patent No. 5479513, 1995Google Scholar
- Li S, Zheng X, Mou X, Cai Y: Chaotic encryption scheme for real-time digital video. Real-Time Imaging VI, January 2002, Proceedings of SPIE 4666: 149-160.View ArticleGoogle Scholar
- Wu X, Zhu W, Xiong Z, Zhang YAQ: Object-based multiresolution watermarking of images and video. Proceedings of the IEEE Internaitonal Symposium on Circuits and Systems, May 2000, Geneva, Switzerland 1: 545-550.Google Scholar
- Kounoudes A, Tsapatsoulis N, Theodosiou Z, Milis M: POLYBIO: multimodal biometric data acquisition platform and security system. In Biometrics and Identity Management. Edited by: Schouten B, Juul NC, Drygajlo A, Tistarelli M. Springer, Berlin, Germany; 2009:216-227.Google Scholar
- Weerackody V, Podilchuk C, Estrella A: Transmission of JPEG-coded images over wireless channels. Bell Labs Technical Journal 1996, 1(2):111-125.View ArticleGoogle Scholar
- Kaur M, Singh M, Girdhar A, Sandhu PS: Fingerprint verification system using minutiae extraction technique. Proceedings of World Academy of Science, Engineering and Technology, December 2008 36: 497-502.Google Scholar
- Zhang X, Zhang W, Wang S: Efficient double-layered steganographic embedding. Electronics Letters 2007, 43(8):482-483. 10.1049/el:20070248View ArticleGoogle Scholar
This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.