Upload
varick
View
48
Download
0
Embed Size (px)
DESCRIPTION
Hiding Biometric Data IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 11, NOVEMBER 2003. Anil K. Jain, Fellow, IEEE, and Umut Uludag, Student Member, IEEE. Outline. Introduction Application scenarios Skim through data hiding method Experimental results. - PowerPoint PPT Presentation
Citation preview
2005/6/16 by pj 1
Hiding Biometric Hiding Biometric DataDataIEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 11, NOVEMBER 2003
Anil K. Jain, Fellow, IEEE, and Anil K. Jain, Fellow, IEEE, and Umut Uludag, Student Member,Umut Uludag, Student Member, IEEE IEEE
2005/6/16 2by pj
OutlineOutline IntroductionIntroduction Application scenariosApplication scenarios Skim through data hiding methodSkim through data hiding method Experimental resultsExperimental results
2005/6/16 3by pj
Introduction - Introduction - What’s shortcoming of What’s shortcoming of biometricbiometric The problem of ensuring the security aThe problem of ensuring the security and integrity of biometric data is criticand integrity of biometric data is criticall
Example: ID v.s. fingerprintExample: ID v.s. fingerprint
2005/6/16 4by pj
Introduction - Introduction - 8 basic sources of attacks8 basic sources of attacks
Fake biometric
Resubmission of digital stored biometric
Feature detector could be forced to produce feature values chosen by attacker
Synthetic feature setthe matcher
could be attacked to produced high or low scores
Attack databaseChannel
attack
Alter matching result
2005/6/16 5by pj
Skip…Skip… Encryption v.s. steganographyEncryption v.s. steganography There have been only a few published There have been only a few published papers on watermarking of fingerprint papers on watermarking of fingerprint images.images.
2005/6/16 6by pj
Application Application scenarios(1/2)scenarios(1/2) The biometric data (The biometric data (fingerprintfingerprint minutiaeminutiae) )
that need to bethat need to be transmitted istransmitted is hidden in a hidden in a host image, whose onlyhost image, whose only function is to function is to carry the data.carry the data. 7th attack7th attack Host: Host: synthetic fingerprintsynthetic fingerprint, face, …, face, …
R. Cappelli, A. Erol, D. Maio, and D. Maltoni, “SynthR. Cappelli, A. Erol, D. Maio, and D. Maltoni, “Synthetic Fingerprint Image Generation,” Proc. 15th Int’l etic Fingerprint Image Generation,” Proc. 15th Int’l Conf. Pattern Recognition, vol. 3, pp. 475-478,Sept. 20Conf. Pattern Recognition, vol. 3, pp. 475-478,Sept. 2000.00. Encrypt++Encrypt++
2005/6/16 7by pj
2005/6/16 8by pj
Application scenarios(2/2)Application scenarios(2/2) Hiding facial information (e.g. Hiding facial information (e.g. eigen-face coefficientseigen-face coefficients) into fingerprin) into fingerprin
t imagest images Examine fingerprint & faceExamine fingerprint & face
2005/6/16 9by pj
2005/6/16 10by pj
Skim through data hiding mSkim through data hiding methodethod M. Kutter, F. Jordan, and F. Bossen, “Digital SiM. Kutter, F. Jordan, and F. Bossen, “Digital Signature of Color Images Using Amplitude Modugnature of Color Images Using Amplitude Modulation,” Proc. SPIE, vol. 3022, pp. 518-526, 1997.lation,” Proc. SPIE, vol. 3022, pp. 518-526, 1997. B. Gunsel, U. Uludag, and A.M. Tekalp, “RobusB. Gunsel, U. Uludag, and A.M. Tekalp, “Robust Watermarking of Fingerprint Images,” Pattert Watermarking of Fingerprint Images,” Pattern Recognition, vol. 35, no. 12, pp. 2739-2747, Den Recognition, vol. 35, no. 12, pp. 2739-2747, Dec. 2002.c. 2002.
2005/6/16 11by pj
Skim through data Skim through data hiding methodhiding method WatermarkWatermark
1th scenario: fingerprint minutiae 9-bit1th scenario: fingerprint minutiae 9-bit X[0,N-1], Y[0,M-1], orientattion[0,359]X[0,N-1], Y[0,M-1], orientattion[0,359]
2th scenario: eigenface coefficients 4-byte2th scenario: eigenface coefficients 4-byte Random seedRandom seed Embed watermark : repeat or notEmbed watermark : repeat or not Embed reference bits 0 & 1 ?Embed reference bits 0 & 1 ?
2005/6/16 12by pj
Skim through data hiding mSkim through data hiding methodethod Embedding functionEmbedding function
S : the value of watermark bitS : the value of watermark bit q : embedding strength (q : embedding strength ( 自訂自訂 )) PPAVAV, P, PSDSD: average and standard deviation of neighbor: average and standard deviation of neighborhood (ex. 5x5 square)hood (ex. 5x5 square) PPGMGM: gradient magnitude ?: gradient magnitude ? A, B : weightA, B : weight β: maskβ: mask
2005/6/16 13by pj
Skim through data hiding mSkim through data hiding methodethod Decoding functionDecoding function
5x5 cross-shaped neighborhood5x5 cross-shaped neighborhood
2005/6/16 14by pj
Experimental resultsExperimental results Highlight Highlight decoding accuracydecoding accuracy and and
matching performancematching performance
2005/6/16 15by pj
Experimental results -Experimental results - 1th scenario 1th scenario 1th scenario : 1th scenario :
Host : 5 synthetic fingerprint, 5 face, 5 othHost : 5 synthetic fingerprint, 5 face, 5 othersers 5 minutiae data sets, 5 seed keys5 minutiae data sets, 5 seed keys q= 0.1, A = 100, B = 1000 q= 0.1, A = 100, B = 1000 17% stego image pixels are changed17% stego image pixels are changed 100% accuracy100% accuracy
2005/6/16 16by pj
Experimental results –Experimental results – 2nd scenario 2nd scenario 2nd scenario :2nd scenario :
Fingerprint image : 300x300Fingerprint image : 300x300 Face : 150 x 130Face : 150 x 130
14 eigenface coefficients = 56 bytes14 eigenface coefficients = 56 bytes Face database : 4 x 10 face subjectsFace database : 4 x 10 face subjects MaskMask
Minutiae-based: 23x23 blockMinutiae-based: 23x23 block Ridge-based: 3x3 blockRidge-based: 3x3 block
q= 0.1, A = 100, B = 1000q= 0.1, A = 100, B = 1000 640 fingerprint images from 160 users640 fingerprint images from 160 users
2005/6/16 17by pj
Experimental results –Experimental results – 2nd scenario 2nd scenarioOrigin fingerprint
Origin face Reconstruct eigenface
Mask minutiae
Reconstruct fingerprint from
watermarked minutiae-based
image
Mask ridge
Reconstruct fingerprint from
watermarked ridge-based
image
2005/6/16 18by pj
Experimental results –Experimental results – 2nd scenario 2nd scenario
2005/6/16 19by pj
The end…The end…