Secure data hiding in wavelet compressed fingerprint images Nalini K. Ratha
Jonathan H. Connell
Ruud M. Bolle
IBM T. J. Watson Research Center 30 Saw Mill River Road, Hawthorne, NY 10532
IBM T. J. Watson Research Center 30 Saw Mill River Road, Hawthorne, NY 10532
IBM T. J. Watson Research Center 30 Saw Mill River Road, Hawthorne, NY 10532
[email protected]
[email protected]
[email protected]
ABSTRACT "!# $&% " ' & & ( ) * * ' + ) * , " $.- / '/ 0 " ) 1 $)2 & (0 , / / 3 0 / '/ ) + & 4 ' 4) 5 " ' ' $# ) ' "0 , '5 5 & ' $ 6 5 0 ( ( ( )$(- , & '" , ) " ' $ - (0 (*# 7. ,
" Keywords
%& INTRODUCTION ) ' ) / 1 1 ' , ) / ' " $&8(9 "0 $# ' ' & 4 $1-. , / ' : 3 / 5 ( ; " '5 ' $"%& " ' < ) 9 " ' $= , 1.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Copyright 2000 ACM 0-89791-88-6/97/05 .. 5.00
>
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
1 ( ) *# 7A 5 " $ & )0 , @ '" & ,
1 5 '/ '1 ( " $ , 1 3 5 ' 1 , & ' ' ' 5 50 $ " ) , & & " " & $= " ) 0 9 K 4 , ' L ( 5 1 " $# 3 & " " & & ( 4 $1J& " $M N 1# 1 $M N
5 9 " ' " , 3 $)V , $@M N ) 5 '1 1 9 "' 3 $ 2 1 55/M N " & 4 & V&8 " $ & ( ' ' $ ) ' , 0 , " '/ 4 $*% ) 9 1 , 5 5 " ' $A%& " * 5 * * 4/ / 1 / / ' )& ' : ' & $%& & 5 5 5 ) " 5 $"
'5 ) 1 50 " , $% " ) & 4 &0 " 5 " ') 9 ) $ ( 5 " , 3 ( " , $ % *# 7* " " 9 $ 5 =(J&& *# 7*0 , / 1# /F $ " , 5
) # $ # " , $ & & & 4 # D$ 5WSQ " "FINGERPRINT * ( "=(J&COMPRESSION # 7*0 ,
$ " /M E N $ J& 4 )*# 76 ) = $E K L $ 5 0 ( " 5 )H 3 ' , "" , "0 4 $%& "0 " E @0 $%& &0 0 8( E =(J&( = $ E K L $&% , 0 " " 5 , " 0 $&= & 9 5 , /F D5 / '/ )0 41
/ E E E + ) 0 )K L /E " "0 ) K L $"% 0 95 ) 6 * 9 $&- # 7 ; ' " ' $ 5 '5 < ) / 5 ) 1 0 ' 9 * K # 8&%L ' $J&' 9 ' " A ) 2.
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
& , " ( & / & " & $ % $'&*E ( ) ) ) ( % * +( , $ - . 3. DATA-HIDING ALGORITHM
WSQ Encoder Fingerprint Image
Quantizer
Huffman Encoder
Quant. Table
Huff Tables
Wavelet Transform Filters
Compressed data
WSQ Decoder
Compressed data
Huff Decoder
Quant. Decoder
Huff Tables
Quant. Table
Inverse
Fingerprint
Wavelet Trans.
Image
K L
0.9
Filters
0.8 "h0"
"h1"
0.8 0.6 0.7 0.6
0.4
0.5 0.2
0.4 0.3
0
0.2 -0.2
0.1 0 -0.1 -0.2 -4
-3
-2
-1
K L
-0.4
-0.6 0
1
2
3
4
-4
-3
-2
K L
-1
0
1
2
! "# $ % &' ')(* '
@ #" & &
, " 9 , $ + , $ + , " % & + , J& & ' &* "& * " 0 5K 5 9 L $ = " " " $%& 0 ) 0 " 5 1 $% " ) " " ; . - # , 6 $ , $ & 0 ( ) - $ % $'&*E ( ) ) ) ( " " 6 # - 6 " " , @ ) , A " ' $'& # 0 J& & .( 9 ) ' " & 0 & & 9 & / ) $%& 1K 1 L $*%& ) 1 ) : ,
" $ W ) 5 / 5 9 1 ' 9 & $( " & & & " ) '5 0 & 3 1 / $ ' " ) 9 " 5 / 1 1 $
%& " "0 9
& 5 @K * 5 * ) L $ %& " & ' ( . ) & " 5 9 9 " $$ - ' 0 & " H " 5= $ F $% " 5 3 , 0 & $= & & F K L ) 1 0 2 2 $ D ) < ) 3 < 5 " E 3 ) ' $ , ; E F 5 , 1 1 /= $&F K L $ -/ & & " ' " " " ) 9 " $-( & , ' , $ 4. RESULTS
& " " , * 5 , )0 $ / & @ ( " "0 " '" 9 ( " & $% " A 5 ' 5 $ ) ' & " " K ; " ( L 4 ' 1 3 " $1% ) ) & " $% 4 , 5 1 '1 5. CONCLUSIONS
K L
K L
K L
' ' # (% % ! $ %' $ $ ) ' ' !! %' B& $ W $ - (E 3 3 H $ H H E $ 9 '5 ,
$& ' & ) 9 4 ' , ' " $
M E N REFERENCES *# 7! ' , "= & # 0 E 3 3 $ M F ,N $ 5$ J& $ W"$ J& ' ?$ $ ' < 4 %$ 2 $ %& "=(J& ) < 0 $
U S (U Q
U "P P # D D - $E 3 3 H $ M ,N , %/2 ) , ) 2 ) 4 8&8&8/% $ B& $ W $ E $E 3 3 3 $ D H $ M N@$ J& "$ W"$ )-$ % 3 " J :# ' % B& $ D W $ ! E 3 3 H $ E D $ M D NW"$ ) V1 V( & " ( "%- 5 B& $ E W $ ')E 3 3 $ D $ M H N# $ ) 1 " V( $ 8&8&8
6.
M N 5$ "$ # 5$ I ' ( )-$ 2"$ % 0 4 , " " 4 V( $ 8&8&8 B& $ H W $ H E 3 3 $E H , E $ M N"=&$ -$ V ?"$ $ - ) 5$ "$ I )2 -* ' V( $ 8&8&8 B& $ W $ ')E 3 3 $ E H F E $