Font Size: a A A

Research Of Biometric Image Hidden Method Based On Content

Posted on:2010-02-22Degree:MasterType:Thesis
Country:ChinaCandidate:X L LiFull Text:PDF
GTID:2178360275488914Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of modern communication technology and the wide application of computer internet technology, information sharing and transmission becomes more and more important. It has brought us great convenience and a great number of information security problems as well. Such as information theft, copyright protection of multimedia data and image authentication.Biomertric-based personal identification techniques that use physiological or behavioral characteristics are becoming increasingly popular compared to traditional token-based or knowledge-based techniques such as identification cards (ID), passwords, etc. One of the main reasons for this popularity is the ability of the biometrics technology to differentiate between an authorized person and an impostor who fraudulently acquires the access privilege of an authorized person. While biometric techniques have inherent advantages over traditional personal identification techniques, the problem of ensuring the security and integrity of the biometric data is critical.The major goal of image information hiding is to enhance communication security by inserting secret message into the digital image. The image after the embedding of the secret message is then sent to the receiver through a public channel. In the transmission process, the public channel may be intentionally monitored by some opponent who tries to prevent the message from being successfully sent and received. The opponent may randomly attack the stegoimage if he/she doubts the stego-image carries any secret message.In order to ensure the security of biological images in the process of network transmission and increase the speed of authentication, this article using the method of two-factor authentication through the watermark and palmprint image. At the sending side, first of all, biokey is extracted from the palmprint image, through the chao map to generate binary sequences for image encryption, encrypted watermark embedded in the palmprint image in the use of lossless scheme, and then through the Arnold transform to encrypt palmprint image, finally we use the content-based information hiding scheme to hide the palmprint images into cover image, obtained with stego-image transmission in the network. At the receiver, through the inverse embedding process of extracting the watermark and restore the original palmprint image, according to the similarity of the watermark image, to determine transmission has been attacked or not, if attacked by opponent, then the transmission does not work, carried out by the sender to re-transmission; If do not come under attack, the watermark image is used for first verification, then use palmprint images for further verification.In this thesis, the proposed algorithm considers the contents of the image, the different region of the information embedded in different, and through the R, G, B three channels to hide, increasing the information embedding capacity. The combination of the watermarking scheme and the palmprint identification will improve the recognition speed and the accuracy of recognition.
Keywords/Search Tags:Digital Watermarking, Steganography, Content-based, Biometric Verification, Chaos
PDF Full Text Request
Related items