Advances in Intelligent Systems and Computing 243 Intelligent Computing, Networking, and Informatics Durga Prasad Mohapatra Srikanta Patnaik Editors Proceedings of the International Conference on Advanced Computing, Networking, and Informatics, India, June 2013
30
Embed
Srikanta Patnaik Editors Intelligent Computing, … Computing, Networking, and Informatics Durga Prasad Mohapatra Srikanta Patnaik Editors Proceedings of the International Conference
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Advances in Intelligent Systems and Computing 243
Intelligent Computing, Networking, and Informatics
Durga Prasad MohapatraSrikanta Patnaik Editors
Proceedings of the International Conference on Advanced Computing, Networking, and Informatics, India, June 2013
Advances in Intelligent Systemsand Computing
Volume 243
Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, [email protected]
For further volumes:http://www.springer.com/series/11156
The series ‘‘Advances in Intelligent Systems and Computing’’ contains publications on theory,applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually alldisciplines such as engineering, natural sciences, computer and information science, ICT, eco-nomics, business, e-commerce, environment, healthcare, life science are covered. The list oftopics spans all the areas of modern intelligent systems and computing.
The publications within ‘‘Advances in Intelligent Systems and Computing’’ are primarilytextbooks and proceedings of important conferences, symposia and congresses. They coversignificant recent developments in the field, both of a foundational and applicable character. Animportant characteristic feature of the series is the short publication time and world-widedistribution. This permits a rapid and broad dissemination of research results.
Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, Indiae-mail: [email protected]
Members
Emilio S. Corchado, University of Salamanca, Salamanca, Spaine-mail: [email protected]
Hani Hagras, University of Essex, Colchester, UKe-mail: [email protected]
László T. Kóczy, Széchenyi István University, Gy}or, Hungarye-mail: [email protected]
Vladik Kreinovich, University of Texas at El Paso, El Paso, USAe-mail: [email protected]
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwane-mail: [email protected]
Jie Lu, University of Technology, Sydney, Australiae-mail: [email protected]
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexicoe-mail: [email protected]
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazile-mail: [email protected]
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Polande-mail: [email protected]
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Konge-mail: [email protected]
Durga Prasad MohapatraSrikanta PatnaikEditors
Intelligent Computing,Networking, and Informatics
Proceedings of the International Conferenceon Advanced Computing, Networking,and Informatics, India, June 2013
123
EditorsDurga Prasad MohapatraComputer Science and EngineeringNational Institute of Technology RourkelaRourkela, OrissaIndia
Srikanta PatnaikComputer Science and EngineeringSOA UniversityBhubaneswarIndia
ISSN 2194-5357 ISSN 2194-5365 (electronic)ISBN 978-81-322-1664-3 ISBN 978-81-322-1665-0 (eBook)DOI 10.1007/978-81-322-1665-0Springer New Delhi Heidelberg New York Dordrecht London
Library of Congress Control Number: 2013955257
� Springer India 2014This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part ofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformation storage and retrieval, electronic adaptation, computer software, or by similar or dissimilarmethodology now known or hereafter developed. Exempted from this legal reservation are briefexcerpts in connection with reviews or scholarly analysis or material supplied specifically for thepurpose of being entered and executed on a computer system, for exclusive use by the purchaser of thework. Duplication of this publication or parts thereof is permitted only under the provisions ofthe Copyright Law of the Publisher’s location, in its current version, and permission for use mustalways be obtained from Springer. Permissions for use may be obtained through RightsLink at theCopyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exemptfrom the relevant protective laws and regulations and therefore free for general use.While the advice and information in this book are believed to be true and accurate at the date ofpublication, neither the authors nor the editors nor the publisher can accept any legal responsibility forany errors or omissions that may be made. The publisher makes no warranty, express or implied, withrespect to the material contained herein.
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Preface
The proceedings of the International Conference on Advanced Computing,Networking, and Informatics (ICACNI 2013), at Central Institute of TechnologyRaipur, Chhattisgarh, India during 12–14 June record scientific and engineeringprogress in both theoretical and applied sections of Computer Science and relatedfields. The proceedings contain technical articles, reports, and case studies oncomputing, networking, and informatics. Along with these main tracks, there weretwo special sessions organized for recording specific advancements in the domainsof image and video processing and biometric security. The conference also sporteda special industrial track to mark the relevant research achievements from theindustry. Out of 458 articles received for consideration for publication, 135 havebeen selected through a single-blind peer review process. Each article has beenreviewed by at least two reviewers. Academicians, scholars, industry profession-als, and practitioners have contributed to this conference by submitting theirvaluable research works, which has led this conference to a success.
A dedicated committee of several professors and academicians from premierinstitutes, such as the IITs and the NITs, has served to manifest the conferencesuccessful. We sincerely thank all our chairs and committees. We are grateful tothe reviewers who, despite their busy schedules, have supported us by providingreview reports within the stipulated time. We would like to thank Central Instituteof Technology Raipur for organizing and providing the venue for the conference.Our hearty thanks go to the Department of Computer Science and Engineering,National Institute of Technology Rourkela for overall support in executing theconference.
Durga Prasad MohapatraSrikanta Patnaik
v
Committee
Advisory Committee
Ajith Abraham, Technical University of Ostrava, Czech RepublicMassimo Tistarelli, University of Sassari, ItalyPhalguni Gupta, Indian Institute of Technology Kanpur, IndiaGeorge A. Tsihrintzis, University of Piraeus, GreeceAtilla Elçi, Aksaray University, TurkeyRajib Mall, Indian Institute of Technology Kharagpur, IndiaManoj Kumar Singh, IIT-Banaras Hindu University, IndiaShobha Lata Sinha, National Institute of Technology Raipur, IndiaSrikanta Patnaik, Institute of Technical Education and Research, IndiaAjita Rattani, University of Cagliari, ItalyR. C. Hansdah, Indian Institute of Science Bangalore, IndiaBadrinath G. S., Samsung Electronics, IndiaPartha Pratim Goswami, Calcutta University, IndiaParesh Kumar Majhi, Institut für Anorganische Chemie, GermanySanjay Kumar Saha, Jadavpur University, IndiaAsim K. Roy, Visva Bharati University, IndiaShambhu Upadhyaya, University at Buffalo, The State University of New York,USAA. P. James, Indian Institute of Information Technology and Management, IndiaRajkumar Buyya, University of Melbourne, AustraliaSanjay Kumar Jena, National Institute of Technology Rourkela, IndiaBanshidhar Majhi, National Institute of Technology Rourkela, IndiaHarish Agarwal, Oracle Apps Supply Chain/Customer Services, UKKrishna Pramanik, National Institute of Technology Rourkela, IndiaSabu M. Thampi, Indian Institute of Information Technology and Management,IndiaVinod P. Narayanan, Evonik Industries, GermanySwati Sanganeria, Oracle Apps, UK
vii
Amulya Ratna Swain, Indian Institute of Science Bangalore, IndiaPankaj K. Sa, National Institute of Technology Rourkela, IndiaBinod K. Pattanayak, Institute of Technical Education and Research, IndiaSidharth Sankar Das, Amdocs Inc., Texas, USA
Chief Patron
Prakash Davara, Chairman, Central Institute of Technology Raipur, India
Patron
Arindam Ray, Director, Central Institute of Technology Raipur, India
General Chairs
Sipi Dubey, Rungta College of Engineering and Technology, IndiaRajib Sarkar, Central Institute of Technology Raipur, India
Programme Chair
Manoj Kumar Singh, DST-CIMS, Banaras Hindu University, India
Programme Co-Chairs
Ashok Kumar Turuk, National Institute of Technology Rourkela, IndiaUmesh Ashok Deshpande, Visvesvaraya National Institute of Technology Nagpur,India
Proceedings Volume Editors
Durga Prasad Mohapatra, National Institute of Technology Rourkela, IndiaSrikanta Patnaik, Institute of Technical Education and Research, India
viii Committee
Technical Track Chairs
Bidyut Kumar Patra, National Institute of Technology Rourkela, IndiaRamjeevan Singh Thakur, Maulana Azad National Institute of TechnologyBhopal, IndiaDebasish Jena, International Institute of Information Technology Bhubaneswar,Odisha, IndiaManmath Narayan Sahoo, National Institute of Technology Rourkela, Odisha,IndiaDebasis Giri, Haldia Institute of Technology, IndiaKorra Sathyababu, National Institute of Technology Rourkela, Odisha, India
Industrial Track Chairs
Bibhudutta Sahoo, National Institute of Technology Rourkela, IndiaK. Sridhar Patnaik, Birla Institute of Technology Mesra, IndiaUmesh Chandra Pati, National Institute of Technology Rourkela, India
Publication Chairs
Anil Kumar Vuppala, International Institute of Information TechnologyHyderabad, IndiaPriyadarshini Sabut, Oracle India Pvt. Ltd., India
Steering Committee Chair
Savita Gupta, National Institute of Technology Rourkela, India
Organising Chairs
Jayanta Pothal, Scientist, Council of Scientific and Industrial Research, IndiaRahul Raman, National Institute of Technology Rourkela, India
Committee ix
Publicity Chair
Sambit Bakshi, National Institute of Technology Rourkela, India
Programme Committee
Parantapa Goswami, University Joseph Fourier, FranceAzadeh Ghandehari, Islamic Azad University, IranA. Vadivel, National Institute of Technology Trichy, IndiaDevesh C. Jinwala, Sardar Vallabhbhai National Institute of Technology, IndiaJitender Kumar Chhabra, National Institute of Technology Kurukshetra, IndiaSuvendu Rup, International Institute of Information Technology, IndiaSnigdha Bakshi, Central Bank of India, IndiaParthasarathi Roop, University of Auckland, New ZealandPriyadarsi Nanda, University of Technology Sydney (UTS), AustraliaJamuna Kanta Sing, Jadavpur University, IndiaSanjay Kumar Jain, National Institute of Technology Kurukshetra, IndiaBinod Mishra, Tata Consultancy Services, IndiaArun Kumar Mishra, UCET, Vinoba Bhave University, IndiaDilip Singh Sisodia, National Institute of Technology Raipur, IndiaArunanshu Mahapatro, National Institute of Science and Technology, IndiaAruna Chakraborty, St. Thomas’ College of Engineering & Technology, IndiaAnil Kumar Vuppala, International Institute of Information TechnologyHyderabad, IndiaDilip Kumar Sharma, Member, Executive Committee, UP Section, IEEEHarish Kumar Sahoo, International Institute of Information Technology, IndiaTrilochan Panigrahy, National Institute of Science and Technology, IndiaHunny Mehrotra, National Institute of Technology Rourkela, IndiaAnup Kawtia, Oracle India Pvt. Ltd., IndiaMukesh A. Zaveri, Sardar Vallabhbhai National Institute of Technology, IndiaSaroj Kr. Panigrahy, Sir Padampat Singhania University, IndiaRaksha Shetty, IBM, IndiaG. R. Gangadharan, Institute for Development and Research in BankingTechnology, IndiaShila Samantaray, Padmanava College of Engineering, IndiaSuraj Sharma, International Institute of Information Technology Bhubaneswar,IndiaPradeep Singh, National Institute of Technology Raipur, IndiaSwati Vipsita, International Institute of Information Technology Bhubaneswar,IndiaRanjan Jana, Department of MCA, RCC Institute of Information Technology,India
x Committee
Amit Trivedi, National Institute of Technology Raipur, IndiaUmakanta Majhi CSIT Durg, Chhattisgarh, IndiaRahul Dubey, Manipal University, Bangalore, IndiaHaider Banka, Indian School of Mines, IndiaSubrajeet Mohapatra, Birla Institute of Technology Mesra, Ranchi, IndiaAnukul Chandra Panda, Centre for Development of Telematics, IndiaJayan Basak, Mahindra Satyam, IndiaSanjay Prasad Kushwaha, Nepal College of Information Technology, NepalTapas Kumar Panigrahi, International Institute of Information TechnologyBhubaneswar, India
Steering Committee
Santanu Bakshi, University of Florida, USAManu Kumar Mishra, Bharat Heavy Electrical Ltd., IndiaRam Shringar Raw, AIACTR, IndiaAuroprasad Mohanty, Hindalco—Aditya Birla Management Corporation Pvt. Ltd.,IndiaOm Prakash Pahari, Central Institute of Technology Raipur, IndiaMohit Agarwal, Razorsight Corporation, IndiaAsish Dalai, National Institute of Technology Rourkela, IndiaAlekha Mishra, National Institute of Technology Rourkela, India
Committee xi
Contents
Image and Template Security for Palmprint . . . . . . . . . . . . . . . . . . . 1Munaga V. N. K. Prasad and B. Adinarayana
Extending Network Lifetime by Time-Constrained DataAggregation in Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . 11K. B. Ashwini and G. T. Raju
The Complex Network Analysis of Power Grid: A Case Studyof the West Bengal Power Network . . . . . . . . . . . . . . . . . . . . . . . . . . 17Himansu Das, Gouri Sankar Panda, Bhagaban Muduliand Pradeep Kumar Rath
Comparison and Analysis of Node Deployment for EfficientCoverage in Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31Ram Shringar Raw, Shailender Kumar, Sonia Mann and Sambit Bakshi
To Study the Architectural Designs of a Proposed ComprehensiveSoftware Extractor for Reengineering Tool: A Literature Survey . . . . 91Rashmi Yadav, Abhay Kothari and Ravindra Patel
Marathi Parts-of-Speech Tagger Using Supervised Learning. . . . . . . 251Jyoti Singh, Nisheeth Joshi and Iti Mathur
Design and Evaluation of N-Module Reconfigurable Systems . . . . . . 259Kunal Yogeshkumar Parikh, J. Manikandan and V. K. Agrawal
Genre-Based Classification of Song Using Perceptual Features . . . . . 267Arijit Ghosal, Rudrasis Chakraborty, Bibhas Chandra Dharaand Sanjoy Kumar Saha
Novel Distributed Dual Beamforming for Randomly DistributedSensor by Phase Tracking Using Bilateral Probability Function . . . . 277G. Vaikundam and G. F. Sudha
Electrical Network Modeling of Amino Acid Stringand Its Application in Cancer Cell Prediction . . . . . . . . . . . . . . . . . 293T. Roy, S. Das and S. Barman
Generation of AES-like 8-bit Random S-Box and ComparativeStudy on Randomness of Corresponding Ciphertextswith Other 8-bit AES S-Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303S. Das
BCube-IP: BCube with IP Address Hierarchy . . . . . . . . . . . . . . . . . 319A. R. Ashok Kumar, S. V. Rao and Diganta Goswami
Image Retrieval Using Fuzzy Color Histogram and Fuzzy StringMatching: A Correlation-Based Scheme to Reducethe Semantic Gap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327Nidhi Goel and Priti Sehgal
A Multi-Objective Optimization Approach for Lifetimeand Coverage Problem in Wireless Sensor Network . . . . . . . . . . . . . 343Anil Kumar Sagar and D. K. Lobiyal
An Ontology-Based Software Development Environment UsingUpgraded Functionalities of Clojure. . . . . . . . . . . . . . . . . . . . . . . . . 619Mary Alias and C. R. Rene Robin
Using a Cluster for Efficient Scalability Evaluationof Multithreaded and Event-Driven Web Servers . . . . . . . . . . . . . . . 627Syed Mutahar Aaqib and Lalitsen Sharma
An Overview of Detection Techniques for Metamorphic Malware . . . 637Pratiksha Natani and Deepti Vidyarthi
M-Band and Rotated M-Band Dual-Tree Complex WaveletTransform for Texture Image Retrieval . . . . . . . . . . . . . . . . . . . . . . 775K. Prasanthi Jasmine and P. Rajesh Kumar
A Rank-Based Hybrid Algorithm for Scheduling Data-and Computation-Intensive Jobs in Grid Environments . . . . . . . . . . 785Mohsen Abdoli, Reza Entezari-Maleki and Ali Movaghar
Evaluation of Software Understandability Using Rough Sets . . . . . . . 939D. Srinivasulu, Adepu Sridhar and Durga Prasad Mohapatra
HCDLST: An Indexing Technique for Current and Recent-PastSliding Window Spatio-Temporal Data . . . . . . . . . . . . . . . . . . . . . . 947Kuleshwar Sahu, Sangharatna J. Godboley and S. K. Jain
A Novel Approach to Text Steganography Using Font Sizeof Invisible Space Characters in Microsoft Word Document . . . . . . . 1047Susmita Mahato, Dilip Kumar Yadav and Danish Ali Khan
Analysis of Type-2 Fuzzy Systems for WSN: A Survey . . . . . . . . . . . 1115Megha Sharma and Ashutosh Kumar Singh
Fusion of Entropy-Based Color Space Selection and StatisticalColor Features for Ripeness Classification of Guavas . . . . . . . . . . . . 1125Suchitra Khoje and S. K. Bodhe
Testing and Implementation Process in Automationof a University . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1145Vaibhav Sharma, Jyoti Singh and A. S. Zadgaonkar
Performance of Spectral Efficiency and Blocking ProbabilityUsing Distributed Dynamic Channel Allocation . . . . . . . . . . . . . . . . 1153Y. S. V. Raman, S. Sri Gowri and B. Prabhakara Rao
Data Structures for IP Lookups, A Comparative Analysiswith Scalability to IPV6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1201Soumyadeep Ghosh, Oaindrila Das and Arindam Majumdar
Multiobjective Clustering Using Support Vector Machine:Application to Microarray Cancer Data . . . . . . . . . . . . . . . . . . . . . . 1209Anita Bai
Prediction of Warning Level in Aircraft Accidents usingClassification Techniques: An Empirical Study. . . . . . . . . . . . . . . . . 1217A. B. Arockia Christopher and S. Appavu Alias Balamurugan
Fuzzy TOPSIS Method Applied for Ranking of Teacherin Higher Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1225H. S. Hota, L. K. Sharma and S. Pavani
Performance Analysis of Transformation Methodsin Multi-Label Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1233P. K. A. Chitra and S. Appavu Alias Balamurugan
Predictive Data Mining Techniques for Forecasting Tamil NaduElectricity Board (TNEB) Load Demand: An Empirical Study . . . . . 1241T. M. Usha and S. Appavu Alias Balamurugan
Novel Approach for Finding Patterns in Product-BasedEnhancement Using Labeling Technique . . . . . . . . . . . . . . . . . . . . . 1249Hemant Palivela, H. K. Yogish, N. Shalini and S. N. Raghavendra
Abstract The wide spread use of biometrics in real world causes more securityand privacy concerns to be raised, because conventional biometric systems storebiometric templates as it is in database without any security, and this may lead tothe possibility of tracking personal information stored in database; moreover,biometric templates are not revocable and are unusable throughout their life timeonce they are lost or stolen. To overcome this non-revocability of biometrics, weproposed two methods for image security and template security in this paper (thesemethods are also applicable for some of the biometric traits); for image security,we used chaotic mixing with watermarking technique; first chaotic mixing isapplied to the host image, and then, this resultant image is embedded in a sample(cover or carrier) image, and if the intruder gets the chaotic mixed image, he/shecannot get back the original host image, and for template security, we shuffledthe palmprint template according to the input random number. This shufflingscheme increases the imposter matching score leaving genuine matching score.
Use of biometrics in today’s networked world increased drastically over lastdecades. Palmprint is one of the biometric traits; a lot of work have been done onpalmprint identification and verification [1, 2], compared to the security on the
M. V. N. K. Prasad (&) � B. AdinarayanaIDRBT, Castle Hills, Road No 1, MasabTank, Hyderabad, Indiae-mail: [email protected]
D. P. Mohapatra and S. Patnaik (eds.), Intelligent Computing, Networking,and Informatics, Advances in Intelligent Systems and Computing 243,DOI: 10.1007/978-81-322-1665-0_1, � Springer India 2014
1
palmprint data (i.e., template and image). Security of the biometric data must beprovided in order to increase the widespread utilization of biometric traits.
According to Ratha et al. [3], there are eight basic types of attacks on thebiometric system. Kong et al. proposed different security methods to avoid replayand database attacks [4] in palmprint recognition system, Lifang Wu et al. pro-posed fuzzy vault scheme to provide the template protection online authenticationon the face database [5], Zhifang Wang et al. developed a secure face recognitionsystem using principle component analysis (PCA) [6], Brenden Chen et al. usedhigher-order spectral (HOS) transform applied to biometric data as a secure hashfunction [7], Feng Hao et al. proposed combining crypto with biometricseffectively [8] using different coding techniques like Hadamard code and Reed-Solomon code, Mayank Vatsa et al. developed a multimodal biometrics systemusing watermarking [9], Thian Song Ong et al. used fuzzy commitment scheme forbiometric template protection [10], and Shenglin Yang et al. developed a secureiris verification system based on error correcting code (ECC) cryptographictechnique [11].
Encryption and watermarking are two widely used techniques to achievesecurity in biometrics. Encryption system does not give complete solution to theproblem, because once the password is known, everything is gone. With the helpof watermarking technique in biometric systems is good way to solve the prob-lems. Watermarking [12–14] is simply known as embedding the watermark intocover image in order to protect the copyright and authorization.
The rest of the paper is organized as follows: Sect. 2 explains about imagesecurity with chaotic mixing and watermarking. Template security and proposedsystem are explained in Sect. 3. Conclusion is given in Sect. 4.
2 Image Protection
Proposed approach uses both chaotic mixing and watermarking for image security.Many researches have been done in watermarking and chaotic mixing for copy-right protection. Voyatizis G et al. used strong chaotic mixing-based watermarkingalgorithm for embedding logo; the security of the system lies in the strongparameters of the chaotic mixing system [15]. Tefas et al. proposed a novelapproach for image authentication with chaotic mixing system because it increasesthe security of the proposed method [16].
2.1 Chaotic Mixing
A two-dimensional chaotic mixing can be given as spatial transformation of planarregions. The chaotic mixed images with different iteration (n) values are shown inFig. 1. It can be represented by map:
2 M. V. N. K. Prasad and B. Adinarayana
A : U ! U;U ¼ 0; 1½ Þ � 0; 1½ Þ � R2 ð1Þ
and the formula for the above equation is
r0 ¼ Ar mod 1ð Þ ð2Þ
xnþ1
ynþ1
� �¼ a11 a12
a21 a22
� �xn
yn
� �mod 1ð Þ ð3Þ
where aij € Z, det A = 1, and A1, 2 {-1, 0, 1} are the eigenvalues of A. Iteratedactions of A on a point r0 € U from a dynamic system A(n):U ? U, given by theiterative process:
Where n = 0, 1, 2,… The set of points hðr0Þ ¼ r0; r1; r3; . . .f g is an orbit ofthe system. Roughly speaking, if V0 is a dense subset of U, then its image Vn underthe map A(n) spreads chaotically over the entire space of U while preserving itsarea, because det A = 1.
Equation (4) strongly explains about chaotic mixing, and it possesses a denseset of periodic orbits. An orbit h r0ð Þ ¼ r0; r1; r3; . . .f g is periodic; if it is finite,i.e., there exists a number ‘T’ of iterations such that r0 = rT. The necessary andsufficient condition for an orbit to be periodic is that the initial position r0 hasrational coordinates. The inverse chaotic mixing is applied to get the
rnþ1 ¼ Anr0 mod 1ð Þ or rnþ1 ¼ Arn mod 1ð Þ ð4Þ
original image from the chaotic mixed image; in our proposed method, weembedded this chaotic mixed image into cover image for enhancing security.
2.2 Watermarking
Watermarking is mainly used in copyright protection and to hide the intendedinformation into a digital image, etc., and this must be performed in such a waythat the added information does not cause degradation of the perceptual quality
Fig. 1 a Binary palmprint image and b chaotic mixed image after n = 3, c n = 5, and d n = 15
Image and Template Security for Palmprint 3
and cannot be removed [16]. Basically, image watermarking techniques can beclassified into two groups with respect to the domain of application of water-marking. First, in spatial domain methods, the pixel values in the image channel(s)are changed, whereas in spectral-transform domain method, a signal is added to thehost image in a transform domain such as the full-frame DCT domain. Manyalgorithms are proposed for watermarking purpose [16–19].
There have been few published papers on watermarking on biometric traits(palmprint, fingerprint, face, etc.). Jain et al. proposed a biometric data-hidingtechnique in which they have selected to use one type of biometric data to secureanother type of biometric data to increase the overall security of the system [20].Changjiang et al. proposed a watermarking approach based on the concept ofdiscrete stationary wavelet transform (DSWT) for the copyright protectionapplication, and they used Arnold and inverse Arnold transform for the watermarkscrambling and reconstruction [19]. Mayank Vatsa et al. proposed a digital imagewatermarking for secure multimodal biometric system in which two phases ofsecurity are proposed for simultaneously verifying any individual and protectingthe biometric template; first, the iris code (template) generated by 1D Log-Gabor iswatermarked in face image [9], such that the face is visible for verification, and thewatermarked iris is used to cross-authenticate the individual and securing thebiometrics data (face) is also possible. For watermarking, they used two algorithmsnamely modified correlation-based algorithm (MCBA) and modified 2D discretecosine transform-based algorithm (M2DCT). Cao et al. [21] developed a multiplewatermarking scheme for GIS vector data to improve the robustness and combinethe advantages of single watermarking scheme; finally, they concluded that theirtechnique increases the robustness and this technique plays an increasing role incopyright protection.
In this paper, we used watermarking along with chaotic mixing technique, andwe applied watermarking on the image which is obtained after applying chaoticmixing. The whole process is explained in Fig. 2, first take binary palmprint image(of size 150 9 150) as a host image because our main intension is to hide this hostimage into another sample(cover or carrier) image, then apply the chaotic mixingon the host image i.e., palm image after chaotic mixing the images as shown inFig. 2. Here, chaotic mixing is dependent on the ‘n’ value; if ‘n’ value changes, theresulting image is varied so here ‘n’ value is confidential. This can be clearlyobserved from the Fig. 1. Then, take a sample gray scale image as a cover orcarrier image (of size 150 9 150). Here, we have taken person as a cover image.Then, we embedded the host image in the cover image. For this, we used the well-known LSB technique. Take each pixel value from the host image (i.e., here, hostimage is binary image so ‘0’ and ‘1’ will be the possible values), and replace theleast significant bit pixel value in the cover image with the appropriate value inthe host image pixel value, so the resultant image is the watermarked image(of size 150 9 150); these images are stored in the database, even intruder cannotobserve the palmprint image with naked eye, and if he came to know that thewatermarking is applied, he cannot get the original palmprint image; instead,
4 M. V. N. K. Prasad and B. Adinarayana
he will get the chaotic mixed palmprint image. With this, he cannot roll back to theoriginal palmprint image without knowing the ‘n’ value. To get back originalimage, we used the reverse chaotic mixing.
3 Template Security
Biometrics authentication systems are to authenticate a person depending upon hisphysical and behavioral characteristics, but unfortunately, these biometric-basedauthentication systems are facing new challenges related to personal data pro-tection, because of these security and privacy issues, many researchers came upwith new techniques toward protecting the biometric templates against possibleattacks. In today’s biometric systems, biometrics data are not protected, and if it iscompromised or lost or stolen at any phase in the authentication process, it cannotbe used again (difficult to revoke or replace) as an identity, because of its per-manence nature since they should remain stable over the life time of an individual.Secure storage of user data is not a new problem, basically in UNIX basedsystems, where user credential are stored in a shadow password file, there thepasswords are hashed using a one-way hash function and computed hash valuesare stored in database. When user enters a password to enter into the system,password is hashed and matched against the stored hash value; user is consideredas a legitimate user if and only if both hash values are same. But, these techniquescannot be adapted thoroughly to protect biometric template because biometric
Water-
MarkingChaotic
Mixing
Fig. 2 Watermarking procedure
Image and Template Security for Palmprint 5
image is dependent on many factors like capturing device, rotation, etc., but tra-ditional cryptographic techniques do not allow even a single bit of error. So,storage of biometric template in a secure way has become an increasing importantissue in biometric authentication systems; to address these types of problems,several methods have been proposed in the literature, and these methods can beclassified into biocryptosystems and cancellable systems. Biocryptosystems meansintegration of biometrics with cryptography, and numerous advantages can beobtained by this combination. Cancellable biometrics have been introduced inKanade et al. [22], where the template protection has been achieved by trans-forming the template into other domain, where data cannot be reverted back to itsoriginal form; for recognition, the input template is also transformed and thenmatched. If the data are lost, then biometric template can be reissued with can-cellable systems.
3.1 Proposed System
The main objective of this method is to enhance security to the palmprint templatewhich is stored in the database. First is template construction then security; well-defined methods are used for template construction. Log-Gabor filter is used forfeature extraction in palmprint images. This filter is already used for textureextraction in iris images [23]. For all our experiments, we used IIT-Delhi database[24]; local features as for template construction for that palmprint image aredivided into 25 (5 9 5) non-overlapping sub-blocks (images). Then, computestandard deviation on each sub-block that gives the feature vector (FV) of theparticular image. FV = [SD(1), SD(2),…SD(n)] where SD(i) is the standarddeviation of the ith block and ‘n’ is 25, so that here every template consists of25 values.
First generate random number range in 1–25, then arrange the generated tem-plate according to the input random number as shown in Fig. 3. If our first randomnumber is 10, then get tenth standard deviation value from original template andstore it in the first position in the new template and so on, but in this approach, theconstraint is duplicate random numbers are not allowed. If it is allowed, there ispossibility of losing some features. Then for every template, store both shuffledtemplate and random numbers in the database, but an intruder can access therandom numbers, and he can reshuffle the transformed template to the originalform with this random number. So, to avoid such problems, here we encrypted therandom numbers and stored the encrypted form (cipher text) of random numbers inthe database instead of storing them as it is in the database. The password forencryption of random numbers is with the administrator of the database so thatnobody else cannot access the template; here, it is very difficult to the attacker tofind the original template from the shuffled template because the number ofpossibilities is around 25. It is computationally infeasible. Figure 4 shows theprocedure for matching input template to the enrolled template. Here, first decrypt