2005/6/16 by pj 1 Hiding Biometric Data Hiding Biometric Data IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 11, NOVEMBER.

Slides:



Advertisements
Similar presentations
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Advertisements

Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
1 Is your biometric data safe? Alex Kot School of Electrical & Electronic Engineering Nanyang Technological University Singapore.
Securing Fingerprint Template - Fuzzy Vault with Helper Data
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #26 Emerging Technologies.
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Fingerprint Synthesis An Hong Tran. Outline Introduction Haar Wavelet Transform Fingerprint Synthesis Application Results Conclusion.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
N-Secure Fingerprinting for Copyright Protection of Multimedia
Suggested Term Projects CSE 666, Fall Guidelines The described projects are suggestions; if you have desire, skills or idea to explore alternative.
Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Enhanced images watermarking based on amplitude modulation Image and Vision Computing, 24 (2006), 111 – 119 Authors :T. Amornraksa, K. Janthawongwilai.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Symmetric hash functions for fingerprint minutiae
Enhancing Biometric Security Using Watermarking By Shivankush Aras.
Biometrics II CUBS, University at Buffalo
Watermarking For Image Authentication Presented by San-Hao Wang.
A Review on: Spread Spectrum Watermarking Techniques
Karthiknathan Srinivasan Sanchit Aggarwal
Introduction to Biometric Systems
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Damageless Information Hiding Technique using Neural Network Keio University Graduate School of Media and Governance Kensuke Naoe.
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Introduction to Steganalysis Schemes Multimedia Security.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Biometrics and Other Emerging Technologies in Applications.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
 Forensics of image re-sampling (such as image resizing) is an important issue,which can be used for tampering detection, steganography, etc.  Most of.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Watermarking Scheme Capable of Resisting Sensitivity Attack
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Welcome
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
DONE BY S.MURALIRAJAN M.NIRMAL
ATM using fingerprint
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Outline A. M. Martinez and A. C. Kak, “PCA versus LDA,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 23, no. 2, pp , 2001.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Authors:Tae-Yun Chung; Min-Suk Hong; Young-Nam Oh;
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: IEICE-Transactions on Info and Systems
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Image Based Steganography Using LSB Insertion Technique
Introduction to Multimedia Security Topics Covered in this Course
Lossless Data Hiding in the Spatial Domain for High Quality Images
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

2005/6/16 by pj 1 Hiding Biometric Data Hiding Biometric Data IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 11, NOVEMBER 2003 Anil K. Jain, Fellow, IEEE, and Umut Uludag, Student Member, IEEE

2005/6/16 2by pj Outline Introduction Introduction Application scenarios Application scenarios Skim through data hiding method Skim through data hiding method Experimental results Experimental results

2005/6/16 3by pj Introduction - What ’ s shortcoming of biometric The problem of ensuring the security and integrity of biometric data is critical The problem of ensuring the security and integrity of biometric data is critical Example: ID v.s. fingerprint Example: ID v.s. fingerprint

2005/6/16 4by pj Introduction - 8 basic sources of attacks Fake biometric Resubmission of digital stored biometricFeature detector could be forced to produce feature values chosen by attacker Synthetic feature set the matcher could be attacked to produced high or low scores Attack database Channel attack Alter matching result

2005/6/16 5by pj Skip … Encryption v.s. steganography Encryption v.s. steganography There have been only a few published papers on watermarking of fingerprint images. There have been only a few published papers on watermarking of fingerprint images.

2005/6/16 6by pj Application scenarios(1/2) The biometric data (fingerprint minutiae) that need to be transmitted is hidden in a host image, whose only function is to carry the data. The biometric data (fingerprint minutiae) that need to be transmitted is hidden in a host image, whose only function is to carry the data. 7th attack 7th attack Host: synthetic fingerprint, face, … Host: synthetic fingerprint, face, … R. Cappelli, A. Erol, D. Maio, and D. Maltoni, “ Synthetic Fingerprint Image Generation, ” Proc. 15th Int ’ l Conf. Pattern Recognition, vol. 3, pp ,Sept R. Cappelli, A. Erol, D. Maio, and D. Maltoni, “ Synthetic Fingerprint Image Generation, ” Proc. 15th Int ’ l Conf. Pattern Recognition, vol. 3, pp ,Sept Encrypt++ Encrypt++

2005/6/16 7by pj

2005/6/16 8by pj Application scenarios(2/2) Hiding facial information (e.g. eigen-face coefficients) into fingerprint images Hiding facial information (e.g. eigen-face coefficients) into fingerprint imageseigen-face coefficientseigen-face coefficients Examine fingerprint & face Examine fingerprint & face

2005/6/16 9by pj

2005/6/16 10by pj Skim through data hiding method M. Kutter, F. Jordan, and F. Bossen, “ Digital Signature of Color Images Using Amplitude Modulation, ” Proc. SPIE, vol. 3022, pp , M. Kutter, F. Jordan, and F. Bossen, “ Digital Signature of Color Images Using Amplitude Modulation, ” Proc. SPIE, vol. 3022, pp , B. Gunsel, U. Uludag, and A.M. Tekalp, “ Robust Watermarking of Fingerprint Images, ” Pattern Recognition, vol. 35, no. 12, pp , Dec B. Gunsel, U. Uludag, and A.M. Tekalp, “ Robust Watermarking of Fingerprint Images, ” Pattern Recognition, vol. 35, no. 12, pp , Dec

2005/6/16 11by pj Skim through data hiding method Watermark Watermark 1th scenario: fingerprint minutiae 9-bit 1th scenario: fingerprint minutiae 9-bit X[0,N-1], Y[0,M-1], orientattion[0,359] X[0,N-1], Y[0,M-1], orientattion[0,359] 2th scenario: eigenface coefficients 4-byte 2th scenario: eigenface coefficients 4-byte Random seed Random seed Embed watermark : repeat or not Embed watermark : repeat or not Embed reference bits 0 & 1 ? Embed reference bits 0 & 1 ?

2005/6/16 12by pj Skim through data hiding method Embedding function Embedding function S : the value of watermark bit S : the value of watermark bit q : embedding strength ( 自訂 ) q : embedding strength ( 自訂 ) P AV, P SD : average and standard deviation of neighborhood (ex. 5x5 square) P AV, P SD : average and standard deviation of neighborhood (ex. 5x5 square) P GM : gradient magnitude ? P GM : gradient magnitude ? A, B : weight A, B : weight β: mask β: mask

2005/6/16 13by pj Skim through data hiding method Decoding function Decoding function 5x5 cross-shaped neighborhood 5x5 cross-shaped neighborhood

2005/6/16 14by pj Experimental results Highlight decoding accuracy and matching performance Highlight decoding accuracy and matching performance

2005/6/16 15by pj Experimental results - 1th scenario 1th scenario : 1th scenario : Host : 5 synthetic fingerprint, 5 face, 5 others Host : 5 synthetic fingerprint, 5 face, 5 others 5 minutiae data sets, 5 seed keys 5 minutiae data sets, 5 seed keys q= 0.1, A = 100, B = 1000 q= 0.1, A = 100, B = % stego image pixels are changed 17% stego image pixels are changed 100% accuracy 100% accuracy

2005/6/16 16by pj Experimental results – 2nd scenario 2nd scenario : 2nd scenario : Fingerprint image : 300x300 Fingerprint image : 300x300 Face : 150 x 130 Face : 150 x eigenface coefficients = 56 bytes 14 eigenface coefficients = 56 bytes Face database : 4 x 10 face subjects Face database : 4 x 10 face subjects Mask Mask Minutiae-based: 23x23 block Minutiae-based: 23x23 block Ridge-based: 3x3 block Ridge-based: 3x3 block q= 0.1, A = 100, B = 1000 q= 0.1, A = 100, B = fingerprint images from 160 users 640 fingerprint images from 160 users

2005/6/16 17by pj Experimental results – 2nd scenario Origin fingerprint Origin faceReconstruct eigenface Mask minutiae Reconstruct fingerprint from watermarked minutiae- based image Mask ridge Reconstruct fingerprint from watermarked ridge- based image

2005/6/16 18by pj Experimental results – 2nd scenario

2005/6/16 19by pj The end …