Paper Type |
: |
Research Paper |
Title |
: |
A data securing approach for face images in biometric database |
Country |
: |
India |
Authors |
: |
Aswathy Elma Aby, K.Vijayakumar |
Abstract: Biometrics refers to statistically analyzing biological characteristics of a person for
authentication as well as identification and is of prime importance because of the eminent role security plays in
different areas in day to day life. Application of such system includes terrorist determination, passport control,
banking etc. All in all, biometrics is not a secure approach unless; suitable countermeasures are employed to
make the enrolled data inaccessible to intruder. This work introduces a technique for providing biometric face
data secure by using Grey level Extended Visual Cryptography (GEVCS), Principal Component Analysis (PCA)
and Euclidian distance approach. The performance is analyzed using Peak Signal to Noise Ratio (PSNR). The
results show that the reconstructed image as well as the share images is similar in appearance to the original
target image and the host images respectively.
Key-Words: - Biometric database, Euclidian distance, GEVCS, PCA, PSNR
[1] G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in Proc.
IEEE Symp. Security and Privacy, 1998, pp. 148–157.
[2] N. Ratha, J. Connell, and R. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J.,
vol. 40, no. 3, pp. 614–634, 2001.
[3] Y. Feng, P. Yuen, and A. Jain, "A hybrid approach for face template protection," in Proc. SPIE Conf. Biometric Technology for
Human Identification, Orlando, FL, 2008, vol. 6944.
[4] A. Jain and U. Uludag, "Hiding biometric data," IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 11, pp. 1494–1498, Nov.
2003.
[5] J. Dong and T. Tan, "Effects of watermarking on iris recognition performance," in Proc. 10th Int. Conf. Control, Automation,
Robotics and Vision,2008 (ICARCV 2008), 2008, pp. 1156-1161.
[6] N. Agrawal and M. Savvides, "Biometric data hiding: A 3 factor authentication approach to verify identity with a single image
using steganography, encryption and matching," in Proc. Computer Vision and Pattern Recognition Workshop, 2009, vol. 0, pp. 85–92.
[7] D. Bitouk, N. Kumar, S. Dhillon, P. Belhumeur, and S. K. Nayar, "Face swapping: Automatically replacing faces in
photographs," ACMTrans. Graph., vol. 27, no. 3, pp. 1–8, 2008.
[8] M. Naor and A. Shamir, "Visual cryptography," in Proc. EUROCRYPT, 1994, pp. 1–12.
[9] M. Nakajima and Y. Yamaguchi, "Extended visual cryptography for natural images," J. WSCG, vol. 10, no. 2, pp. 303–310,
2002.
[10] Arun Ross and Asem Othman, "Visual Cryptography For Biometric Privacy," in IEEE Transactions On Information Forensics
And Security, Vol. 6, No. 1, March 2011
[11] T. Cootes et al., "Active appearance models," IEEE Trans. PatternAnal. Mach. Intell., vol. 23, no. 6, pp. 681–685, Jun. 2001.
[12] G. Ateniese, C. Blundo, A. Santis, and D. Stinson, "Extended capabilities for visual cryptography," Theor. Comput. Sci., vol.
250, no. 1–2, pp. 143–161, 2001.
[13] Mamta Dhanda, "Face recognition using eigenvectors from Principal component analysis" in International Journal of Advanced
Engineering Research and Studies/ Vol. I/ Issue II/January-March, 2012/37-39
[14] Marijeta Slavković, Dubravka Jevtić, "Face Recognition Using Eigenface Approach", Serbian Journal Of Electrical
Engineering, Vol. 9, No. 1, February 2012, 121-130