IBM Systems Journal
Protecting digital media content
Communications of the ACM
Hidden digital watermarks in images
IEEE Transactions on Image Processing
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
Biometrics break-ins and band-aids
Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
IEEE Transactions on Pattern Analysis and Machine Intelligence
Feature based RDWT watermarking for multimodal biometric system
Image and Vision Computing
An efficient watermarking technique for the protection of fingerprint images
EURASIP Journal on Information Security
A novel image hiding approach based on correlation analysis for secure multimodal biometrics
Journal of Network and Computer Applications
An effective video steganography method for biometric identification
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Watermarking as a means to enhance biometric systems: a critical survey
IH'11 Proceedings of the 13th international conference on Information hiding
Computer Standards & Interfaces
A secure multimodal biometric verification scheme
IWBRS'05 Proceedings of the 2005 international conference on Advances in Biometric Person Authentication
Optimum detection of multiplicative-multibit watermarking for fingerprint images
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric template protection with DCT-based watermarking
Machine Vision and Applications
Hi-index | 0.00 |
With the rapid growth of the Internet, electronic commerce revenue now amounts to several billion US dollars. To avoid fraud and misuse, buyers and sellers desire more secure methods of authentication than today's userid and password combinations. Automated biometrics technology in general, and fingerprints in particular, provide an accurate and reliable authentication method. However, fingerprint-based authentication requires accessing fingerprint images scanned remotely at the user's workstation, a potentially weak point in the security system. Stored or synthetic fingerprint images might be fraudulently transmitted, even if the communication channel itself is encrypted. In this paper we describe an algorithm for secure data hiding in wavelet compressed fingerprint images to alleviate this problem. Assuming the image capture device is secure, then only the decompressor on the server can locate the embedded message and thereby validate the submitted image.