Abstract
As user authentication by using biometric information such as fingerprint has been widely accepted, there has been a growing interest in protecting the biometric information itself against external attackers. Especially, as the mobile handheld devices equipped with fingerprint sensors are produced, it becomes important to protect the private information of an user(i.e., fingerprint image) in the remote applications. In this paper, we propose an energy-efficient technique to transmit fingerprint images from the handheld device to a server securely using both encryption and fingerprinting. In addition to the encryption to guarantee the confidentiality of the fingerprint image transmitted, we insert the logo of the application into the fingerprint image(i.e., fingerprinting) to indicate to whom the fingerprint image is transmitted(i.e., a possible privacy violator). In particular, to lower the computational burden of the handheld device, we not only offload some heavy computation to the server without compromising the security, but also apply some techniques to the handheld device such as loop transformation and data compaction. Based on experimental results, we confirm that our technique can transmit fingerprint images from the handheld device in an energy-efficient way(by a factor of 2) and detect the intentional/unintentional leakage of the transmitted fingerprint image from the server – privacy violator.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)
Prabhakar, S., Pankanti, S., Jain, A.: Biometric Recognition: Security and Privacy Concerns, pp. 33–42. IEEE Computer Society Press, Los Alamitos (2003)
Stalling, W.: Cryptography and Network Security. Pearson Ed. Inc. (2003)
Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)
Korea Information Security Agency: A Guideline to the Security of Biometric Data (in Korean) (2005)
Moon, D., et al.: Performance Analysis of the Match-on-Card System for the Fingerprint Authentication. In: Proc. of International Workshop on Information Security Applications, pp. 449–459 (2001)
Ratha, N., Bolle, R.: Automatic Fingerprint Recognition Systems. Springer, Heidelberg (2004)
Jain, A., Uludag, U.: Hiding Fingerprint Minutiae in Images. In: Proc. of AutoID, pp. 97–102 (2002)
Jain, A., Uludag, U., Hsu, R.: Hiding a Face in a Fingerprint Image. In: Proc. of ICPR, pp. 756–759 (2002)
Yeung, M., Pankanti, S.: Verification Watermarks on Fingerprint Recognition and Retrieval. Journal of Electronic Imaging 9, 468–476 (2000)
Gunsel, B., Uludag, U., Tekalp, A.: Robust Watermarking of Fingerprint Images. Pattern Recognition 35, 2739–2747 (2002)
Chung, Y., et al.: Hiding Biometric Data for Secure Transmission. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1049–1057. Springer, Heidelberg (2005)
Kim, T., et al.: Secure Remote Fingerprint Verification using Dual Watermarks. In: Safavi-Naini, R., Yung, M. (eds.) DRMTICS 2005. LNCS, vol. 3919, pp. 217–227. Springer, Heidelberg (2006)
Dugad, R., Ratakonda, K., Ahuja, N.: A New Wavelet-based Scheme for Watermarking Images. In: Proc. of the ICIP (1998)
Ye, W., Vijaykrishnan, N., Kandemir, M., Irwin, M.J.: The Design and Use of SimplePower: A Cycle-Accurate Energy Estimation Tool*. In: Annual ACM IEEE Design Automation Conference, pp. 340–345 (2000)
Hennessy, J., Patterson, D.: Computer Architecture – A Quantitative Approach. Morgan Kaufmann, San Francisco (2007)
Intel: Intel StrongARM* SA-1110 Microprocessor (2000)
NiGen: http://www.nitgen.com
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, H., Lee, S., Moon, D., Chung, Y. (2007). Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques. In: Huang, DS., Heutte, L., Loog, M. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques. ICIC 2007. Communications in Computer and Information Science, vol 2. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74282-1_96
Download citation
DOI: https://doi.org/10.1007/978-3-540-74282-1_96
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74281-4
Online ISBN: 978-3-540-74282-1
eBook Packages: Computer ScienceComputer Science (R0)