A Multichannel Approach to Fingerprint Classification
IEEE Transactions on Pattern Analysis and Machine Intelligence
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
IEEE Transactions on Pattern Analysis and Machine Intelligence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Vulnerabilities in biometric encryption systems
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Protecting biometric data for personal identification
SINOBIOMETRICS'04 Proceedings of the 5th Chinese conference on Advances in Biometric Person Authentication
Filterbank-based fingerprint matching
IEEE Transactions on Image Processing
Ergodic chaotic parameter modulation with application to digital image watermarking
IEEE Transactions on Image Processing
Challenge-response-based biometric image scrambling for secure personal identification
Future Generation Computer Systems
A pseudo-Zernike moment based audio watermarking scheme robust against desynchronization attacks
Computers and Electrical Engineering
ICCSA'11 Proceedings of the 2011 international conference on Computational science and Its applications - Volume Part V
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Journal of Network and Computer Applications
Future Generation Computer Systems
PalmHash Code vs. PalmPhasor Code
Neurocomputing
Hi-index | 0.00 |
In this paper, we propose a chaos and NDFT-based spread spectrum technique to conceal fingerprint-biometrics templates into audio signals. Fingerprint templates are encrypted by chaotic encryption, encoded by the BCH codes, modulated by chaotic parameter modulation (CPM), and then hid into the chaotically selected random sampling points of the host speech signal by a novel non-uniform discrete Fourier transform (NDFT)-based data hiding method. The template extraction process is completely blind and does not require original speech signal, thus the extraction depends on the secret key. Experimental and simulation results show that the proposed scheme is robust against common signal processing attacks, secure by secret keys, efficient in performance, and accomplishes perceptual transparency by exploiting the masking effects of human auditory system (HAS).