0% found this document useful (0 votes)
62 views7 pages

A Survey On Visual Cryptography Methods in Biometric Data

This document discusses various visual cryptography methods for preserving privacy in biometric data like face images and fingerprints. It begins with an introduction to biometrics and issues with privacy. Then it discusses visual cryptography as a secret sharing method to split a private face image into two shares. Other discussed methods include a three step hybrid approach combining cryptography and cancellable biometrics, as well as de-identification techniques to anonymize stored biometric data while maintaining utility. The document also covers extensions to basic visual cryptography, like supporting gray scale images, and a multi-factor face de-identification method.

Uploaded by

V.KARTHIKEYAN.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views7 pages

A Survey On Visual Cryptography Methods in Biometric Data

This document discusses various visual cryptography methods for preserving privacy in biometric data like face images and fingerprints. It begins with an introduction to biometrics and issues with privacy. Then it discusses visual cryptography as a secret sharing method to split a private face image into two shares. Other discussed methods include a three step hybrid approach combining cryptography and cancellable biometrics, as well as de-identification techniques to anonymize stored biometric data while maintaining utility. The document also covers extensions to basic visual cryptography, like supporting gray scale images, and a multi-factor face de-identification method.

Uploaded by

V.KARTHIKEYAN.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 7

A Survey on Visual Cryptography Methods in Biometric Data

A.Arockia Abins1 A.Arivuchselvam2


Assistant professor1, PG Student2, Department of CSE, elammal en!ineerin! colle!e, Anna "niversit#, $ndia arockia%abins&#ahoo.co.in 'arivuselvamvecse&!mail.com

Abstract: (iometric data )e.!. fin!er print, face ima!e* stored in database s#stem, this +ork mainl# discuss about
preserve the privac# of human face ima!e, i.e. biometric is ph#siolo!ical and behavioural characteristics. $n case of face ima!es, private face ima!e is split into t+o shares )i.e. t+o la#ered ima!e* and stored in database server. isual Cr#pto!raph# is secret sharin! method +here a secret face ima!e is encr#pted into the t+o shares +hich independentl# disclose no information about the ori!inal secret face ima!e. ,he private face ima!e can be retrieve onl# +hen both t+o shares are available durin! the content retrieval process. Content retrieval deal +ith identif#in! secret face ima!e based on biometric information )fin!er print*, durin! this process fin!er print ima!e are needed to retrieve ori!inal secret face ima!e )De-identification*, isual cr#pto!raph# Provide !reat securit# needs as +ell as e.tra la#er of authentication. $n this paper different visual cr#pto!raph# method is used

Keywords- Private face ima!e, /in!er print, Privac#, isual Cr#pto!raph#, De-identification

! "#$%D&C# %"
(iometrics is the automated use of ph#siolo!ical or behavioral characteristic to determine or verif# identit# 011. Ph#siolo!ical biometric is based on direct measurement of a part of the human bod#, such as fin!er-scan, facial-scan, irisscan, hand-scan and retina-scan. (ehavioral biometric is based on measurements and data derived from an action and therefore indirectl# measure characteristic of the human bod# such as voice-scan and si!nature-scan. $dentit# is an individual is a sin!ular, "ni2ue entit#, collo2uiall# or Person, +hich can have more than one identit#. /or E.ample, 3ohn Doe 4i!ht has an email identit# and a +ork identit#. (iometric benefit consists of increasin! the securit# and convenience, reducin! the fraud )or* deliver# of enhanced services. A biometric authentication process operates b# ac2uirin! ra+ biometric data from a sub5ect )e.!. private face ima!e*6 the template of a person in the database is !enerated durin! enrollment process. Protectin! privac# of individual enrolled in a biometric database storin! a transformed biometric template instead of the ori!inal biometric template in the database ,his +as referred to as a private template 021 or a cancelable biometric 071 and three step h#brid approach 081 that combined advanta!e of cr#ptos#stem and cancellable biometric. Apart from these methods various ima!e hidin! approach 091, 0:1, 0;1 have been su!!ested b# researcher to provide anon#mit# to the stored biometric data. Privac# to face ima!es present in surveillance videos0<1.A face de-identification al!orithm 0=1 that minimi>ed the chances of performin! automatic face reco!nition +hile preservin! details of the face such as e.pression, !ender and a!e. A h#brid transformation approach has a !ood cancelable abilit#, but the dra+back of this approach is that a trade-off bet+een performance and securit# is normall# re2uired. ?aive De-identification method is no !uarantee of privac# of people visible in the ima!e. ?either preserves privac# nor data utilit#. /ace s+appin! techni2ue and a!!ressive de-identification the ori!inal face ima!e can be lost 01@1. Proposed method to perform secure face identification b# representin! a private face ima!e +ith inde.ed facial components e.tracted from a public face database. ,he rest of the paper is or!ani>ed as follo+s. $n Section $$ deals +ith visual cr#pto!raph# and its e.tensions are presented. $n Section $$$, +e deal +ith h#brid approach and Section $ , +e deal +ith De-identification method for securin! fin!erprint, and face ima!es and +e conclude this paper in Section .

! V S&A' C$()#%*$A)+(
isual Cr#pto!raph# is a secret-sharin! method that encr#pts a secret ima!e into several shares but re2uires neither computer nor calculations to decr#pt the secret ima!e as sho+ in /i!. 1. $nstead, the secret ima!e is reconstructed visuall#A simpl# b# overla#in! the encr#pted shares the secret ima!e becomes clearl# visible. isual cr#pto!raph# techni2ue for black and +hite ima!es )(asic1* introduced b# ?aor and Shamir 0111. An# visual secret information )pictures, te.t, etc* is considered as ima!e and encr#ption is performed usin! simple al!orithm to !enerate n copies of shares dependin! on t#pe of access structure schemes.

a.

b.

c.

d.

,igure-! a. %riginal mage b. Share- c. Share/ d. Stac0ing the shares reveal the secret isual Cr#pto!raph# scheme represented in computer usin! n . m (asis matrices. 1/2/. ModelA 1. Construct t+o 2*2 basis matrices asA s@B 1 @ @ 1 s1B 1 1 @ @

2. "sin! the permutated basis matrices, each pi.el from the secret ima!e +ill be encoded into t+o sub pi.els on each participantCs share. A black pi.el on the secret ima!e +ill be encoded on the ith participantCs share as the ith ro+ of matri. S1, +here a 1 represents a black sub pi.el and a @ represents a +hite sub pi.el. Similarl#, a +hite pi.el on the secret ima!e +ill be encoded on the ith participantCs share as the ith ro+ of matri. S0. 7. (efore encodin! each pi.el from the secret ima!e onto each share, randoml# permute the columns of the basis matrices S0 and S1. ,his CS ) isual Cr#pto!raph# Scheme* divides each pi.el in the secret ima!e into mB2 sub pi.els. $t has a contrast of (m).mB1 and a relative contrast of (m)B1'2. (asic visual cr#pto!raph# is e.pansion of pi.els. /irst Continuous ima!e )Gra# scale* is converted into halftone ima!e )(inar#* usin! an# halftone techni2ue as error diffusion, thresholdin!, ordered ditherin!, etc. ,he error diffusion !ives better half tone. Each pi.el of half tone is broken into some sub-pi.els as sho+n in ,able 1. #able - Construction o3 /-out-o3-/ scheme

/!- Visual Cryptography Scheme A


A isual Cr#pto!raph# Scheme ) CS* on a set of n participants is a method of encodin! a CsecretC ima!e into n shares such that ori!inal ima!e is obtained onl# b# stackin! specific combinations of the shares onto each other.

/!/ *ray 'evel 42tended Visual Cryptography Scheme:


CS allo+ encodin! a secret ima!e into n sheet ima!es, each revealin! no information about the ori!inal. A theoretical method to appl# e.tended visual cr#pto!raph# on !ra# scale ima!es )GE CS*. ,he GE CS operates b# chan!in! the d#namic ran!e of the ori!inal and host ima!es, transformin! the !ra# level ima!es into meanin!ful binar# ima!es and then appl#in! a (oolean operation on half toned pi.els of the t+o hosts and the ori!inal ima!e.

! #+$44 S#4) +(B$ D M4#+%D


(ased on three step h#brid approach, /ace template is secure. $n this approach three step are used, $n the first step, random pro5ection is emplo#ed as a cancelable transform to pro5ect the ori!inal template into a subspace and !enerate a cancelable template. $f it is compromised, the pro5ection matri. can be chan!ed in order to issue ane+ template. $n the second step, +e appl# the class distribution preservin! )CDP* transform 0181 to enhance the cancelable template discriminabilit# and convert the real value cancelable template into a binar# template. $n the third step, a hash function 0191 is emplo#ed in the third step to encr#pt the binar# face template, as sho+n in /i!. 2.

5!- $andom )ro6ection:


Dandom pro5ection is a popular dimension reduction techni2ue and has been successfull# applied to man# computer vision and pattern reco!nition applications. Decentl#, it has also been emplo#ed as a cancelable transform 0121 for face biometric. Ehile random pro5ection provides a !ood cancellable abilit#, there is a trade-off bet+een the s#stem performance and the template securit#

5!/ Class Distribution )reserving #emplate:


Class distribution preservin! )CDP* transform 0171, 0181 enhances the template discriminabilit# and converts a real value template into a binar# template. ,he basic idea is to make use of a set of distin!uishin! points, a distance function and thresholdin!. /or each template, the distances bet+een the template and each distin!uishin! point are calculated. $f the distance is belo+ the threshold, a bit F@G is !enerated6 other+ise, a bit F1G is !enerated.the CDP transform can enhance the template discriminabilit# and improve the s#stem performance.

5!5 +ash ,unction


,he hash function 0191 is applied for biometric data protection. $t encr#pts the ori!inal template s to a hashed code+ord Hash(s) +hich is stored in the database6 the matchin! process is done in hash space. Ehile hash function is not considered to be !ood for biometrics because of its sensitivit# to facial variations due to illumination, pose and facial e.pression, the use of CDP transform increases the template discriminative po+er enablin! the use of hash function for face biometric. $n our CDP transform, the templates are +ell classified. $n most of the cases, the binar# strin!s transformed via CDP transform are identical if the# belon! to the same class.

V! ,AC4 D4- D4"# , CA# %" M4#+%D


7!- Multi - ,actor ,ace De- denti3ication:
(ased on face de-identification method 0=1, factori>e input ima!es into identit# and non-identit# factors usin! a !enerative multi-factor model. Ee then appl# a de-identification al!orithm on the combined factori>ed data before usin! the bases of the multi-factor model to reconstruct de-identified ima!es, as sho+ in /i!.7. ,he resultin! identit# parameters could be used for face reco!nition )red arro+s* or, to!ether +ith the non-identit# parameters for face de-identification )blue arro+s*. After de-identification, the bases of the multi-factor model are used to produce de-identified ima!es.

4nrollment #hree step hybrid method /eature E.traction

Dandom Pro5ection

CDP ,ransform

Hashin!

Database

/eature E.traction Authentication

Dandom Pro5ection Cancelability

CDP ,ransform Discriminability

Hashin!

4atchin!

Security Biometric Cryptosystem Approach Decision

#rans3orm-based Approach

,igure/! Bloc0 Diagram o3 #hree step hybrid Approach

$nput $ma!es

/AC,ID$JA,$I?

?on-$dentit# /actors

$dentit# /actors

Generative 4ulti-/actor 4odel

DE-identification

DECIG?$,$I?

DECI?S,D"C,$I?

Figure 1
De-$dentified $ma!es

,igure5! %verview Combined ,ace De-identi3ication

7!/ )reserving )rivacy o3 Biometric )rivate ,ace mage:


$n this approach, the use of visual cr#pto!raph# is e.plored to preserve the privac# of biometric data b# decomposin! the ori!inal ima!e into t+o ima!es in such a +a# that the ori!inal ima!e can be revealed onl# +hen both ima!es are simultaneousl# available 01:16 further, the individual component ima!es do not reveal an# information about the ori!inal ima!e. Durin! the enrollment process, the private biometric data is sent to a trusted third-part# entit#. Ince the trusted entit# receives it, the biometric data is decomposed into t+o ima!es and the ori!inal data is discarded. ,he decomposed components are then transmitted and stored in t+o different database servers such that the identit# of the private data is not revealed to either server. Durin! the authentication process, the trusted entit# sends a re2uest to each server and the correspondin! sheets are transmitted to it. /or private face ima!e, as sho+n in /i!. 8, each private face ima!e is decomposed into independent public host ima!es. $n this approach, the private ima!e can be vie+ed as bein! encr#pted into t+o host face ima!es. /irst, the demo!raphic attributes of the private face ima!es such as a!e, !ender, ethnicit#, etc. can be retained in the host ima!es thereb# preservin! the demo!raphic aspects of the face +hile perturbin! its identit#. Second, a set of public face ima!es )e.!., those of celebrities* ma# be used to host the private face database. $n essence, a small set of public ima!es can be used to encr#pt the entire set of private face ima!es. ,hird, usin! non-face ima!es as hosts ma# result in visuall# revealin! the e.istence of a secret face. /ourth, +hile decomposin! the face ima!e into random noise structures ma# be preferable, it can pi2ue the interest of an eavesdropper b# su!!estin! the e.istence of secret data.

,igure!7!De-identi3ying and storing a 3ace image!

V! C%"C'&S %"S
$n this paper, surve#s of isual Cr#pto!raph# and /ace De-identification methods have been presented. (ased on the above summar#, three step h#brid approach consists of three parts are namel# cancelable transform, discriminabilit# enhancement transform and template protection. Each part provides the cancelable abilit#, discriminabilit# and securit#, respectivel#. $n /ace De-identification method, multi factor model preservin! data utilit# and multi-factor de-identification al!orithm described here operates on sin!le ima!es. (ut biometric private face ima!e method to protect the privac# of a face database b# decomposin! an input private face ima!e into t+o independent sheet ima!es such that the private face ima!e can be reconstructed onl# +hen both sheets are simultaneousl# available. GE CS is then used to encr#pt the private ima!e in the selected host ima!es. $t is observed that the reconstructed ima!es are similar to the ori!inal private ima!e. Since the# have respective advanta!es and ma# complement each other. 4an# research need to be done in isual Cr#pto!raph#.

$4,4$4"C4S
011 A. 3ain, P. /l#nn, and A. Doss, Handbook of Biometrics. ?e+ KorkA Sprin!er, 2@@;. 021 G. $. Davida, K. /rankel, and (. 3. 4att, FIn enablin! secure applications throu!h off-line biometric identification,G in Proc. IEEE S m!. Sec"rit and Pri#ac , 1==<, pp. 18<L19;. 071 ?. Datha, 3. Connell, and D. (olle, FEnhancin! securit# and privac# in biometrics-based authentication s#stems,G IB$ S st. %., vol. 8@, no. 7, pp. :18L:78, 2@@1. 081 K. /en!, P. Kuen, and A. 3ain, FA h#brid approach for face template protection,G in Proc. SPIE &onf. Biometric 'echno(o) for H"man Identification, Irlando, /M, 2@@<, vol. :=88. 091 A. 3ain and ". "luda!, FHidin! biometric data,G IEEE 'rans. Pattern *na(. $ach. Inte((., vol. 29, no. 11, pp. 18=8L18=<, ?ov. 2@@7. 0:1 3. Don! and ,. ,an, FEffects of +atermarkin! on iris reco!nition performance,G in Proc. 10th Int. &onf. &ontro(, *"tomation, +obotics and ,ision, -00. (I&*+&, -00.), 2@@<, pp.119:-11:1. 0;1 ?. A!ra+al and 4. Savvides, F(iometric data hidin!A A 7 factor authentication approach to verif# identit# +ith a sin!le ima!e usin! ste!ano!raph#, encr#ption and matchin!,G in Proc. &om!"ter ,ision and Pattern +eco)nition /orksho!, 2@@=, vol. @, pp. <9L=2. 0<1 E. 4. ?e+ton, M. S+eene#, and (. 4alin, FPreservin! privac# b# de-identif#in! face ima!es,G IEEE 'rans. 0no1(. 2ata En)., vol. 1;, no. 2, pp. 272L287, /eb. 2@@9. 0=1 D. Gross, M. S+eene#, /. De la ,orre, and S. (aker, F4odel-based face de-identification,G in IEEE /orksho! on Pri#ac +esearch in ,ision, Mos Alamitos, CA, 2@@:. 01@1 D. (itouk, ?. Numar, S. Dhillon, P. (elhumeur, and S. N. ?a#ar, F/ace s+appin!A Automaticall# replacin! faces in photo!raphs,G *&$'rans. 3ra!h., vol. 2;, no. 7, pp. 1L<, 2@@<. 0111 4. ?aor and A. Shamir, F isual cr#pto!raph#,G in Proc. E4+5&+6P', 1==8, pp. 1L12. 0121. A. ,eoh, A. Goh, and D. ?!o, FDandom 4ultispace Ouanti>ation as an Anal#tic 4echanism for (ioHashin! of (iometric and Dandom $dentit# $nputs,G IEEE 'ransactions on Pattern *na( sis and $achine Inte((i)ence, vol. 2<, no. 12, pp. 1<=2-1=@1, Dec. 2@@:. 0171. K C /en! and P C Kuen, FClass-Distribution Preservin! ,ransform for /ace (iometric Data Securit#,G Proceedin)s of IEEE Internationa( &onference on *co"stics, S!eech, and Si)na( Processin) (I&*SSP), pp. 181-188, 2@@;. 0181. K C /en! and P C Kuen, FSelection of Distin!uish Points for Class Distribution Preservin! ,ransform for (iometric ,emplate Protection,G Proceedin)s of IEEE Internationa( &onference on Biometrics (I&B), 2@@;. 0191. D. M. Divest, F,he 4D9 4essa!e-Di!est Al!orithm,G +7&18-1, 9et1ork /orkin) 3ro"!, $I' :aborator for &om!"ter Science and +S* 2ata Sec"rit , Inc., 1==2. 01:1. Arun Doss, and Asem Ithman, ; <,9o. 1,$arch -011. isual Cr#pto!raph# for (iometric Privac#, G IEEE 'rans, 5n information 7orensics and Sec"rit ,,o(.

You might also like