Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Double-layer secret-sharing system involving privacy preserving biometric authentication

Double-layer secret-sharing system involving privacy preserving biometric authentication

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
User-Centric Privacy and Security in Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this chapter, we proposed a new way to preserve the privacy of user by the combination of steganography and biometrics template protection. The secret image to be shared is protected by double layers of steganography: embedding it into the transformed fingerprint images, which are to be hidden into casual images to prevent unauthorised access when stored online. In order for authorised users to recover the secret image, a matching between their fingerprint and the version into which the secret image is embedded is performed in the transformed domain of the cancellable template, which is used to protect the raw biometric information. With this new framework, the problem of dishonest participant that Yang etal. mentioned can be fully resolved since the stego-images are stored in a cloud server. Moreover, this system is no longer dependent on cryptographic key. The main contribution of this chapter is to present a novel scheme that utilizes the power of not only steganography but also biometrics to protect the identity of the user. Although the results produced in experiments are fairly accepted, it is believed that certain factors can be improved to increase the quality of the outcome images, such as: using a wider field to process full range of the pixel values and generating output of PNG format to prevent the degradation caused by lossy compression. In the near future, looking for an appropriate algorithm and developing new techniques to apply in this system are promising research topics. In addition, in order to better evaluate the performance of the system, a new metric that shows the relationship of biometric data matching and steganographic embedding should be devised.

Chapter Contents:

  • Introduction
  • 7.1 Conceptual clarifications
  • 7.1.1 Steganography
  • 7.1.2 (k, n)-Threshold secret sharing
  • 7.1.3 Biometric template protection
  • 7.2 Related work
  • 7.2.1 Authentication with biometric template protection
  • 7.2.2 Secret sharing with steganography
  • 7.3 Double-layer secret-sharing system
  • 7.3.1 Embedding process
  • 7.3.1.1 Cancellable template protection with Delaunay triangle-based local structure
  • 7.3.1.2 Layer one: bio-stego-images
  • 7.3.1.3 Camouflage-stego-images
  • 7.3.2 Recovery process
  • 7.3.2.1 Recover secret image
  • 7.3.3 Security analysis
  • 7.4 Experimental results
  • 7.4.1 Settings and parameters
  • 7.4.2 Results
  • 7.5 Conclusion and future works
  • References

Inspec keywords: image coding; authorisation; fingerprint identification; steganography; data protection

Other keywords: double-layer secret-sharing system; user identity protection; unauthorised access prevention; privacy preserving biometric authentication; secret image sharing; steganography; fingerprint images; biometrics template protection

Subjects: Cryptography; Image and video coding; Computer vision and image processing techniques; Data security; Image recognition

Preview this chapter:
Zoom in
Zoomout

Double-layer secret-sharing system involving privacy preserving biometric authentication, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse004e/PBSE004E_ch7-1.gif /docserver/preview/fulltext/books/sc/pbse004e/PBSE004E_ch7-2.gif

Related content

content/books/10.1049/pbse004e_ch7
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address