Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 197215, 10 pages
http://dx.doi.org/10.1155/2015/197215
Research Article

An Improved Information Hiding Method Based on Sparse Representation

1School of Computer Science and Information Technology, Northeast Normal University, Changchun 130017, China
2School of Mathematics and Statistics, Northeast Normal University, Changchun 130017, China
3College of Information Science and Technology, Bohai University, Jinzhou 121013, China

Received 5 November 2014; Revised 9 December 2014; Accepted 9 December 2014

Academic Editor: Hui Zhang

Copyright © 2015 Minghai Yao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of the cover image, the sparse representation method is adopted to exploit the correlation between the cover and biometric images. Thus, the biometric image is divided into two parts. The first part is the reconstructed image, and the other part is the residual image. The biometric authentication image cannot be restored by any one part. The residual image and sparse representation coefficients are embedded into the cover image. Then, for the sake of causing much less attention of attackers, the visual attention mechanism is employed to select embedding location and embedding sequence of secret information. Finally, the reversible watermarking algorithm based on histogram is utilized for embedding the secret information. For verifying the validity of the algorithm, the PolyU multispectral palmprint and the CASIA iris databases are used as biometric information. The experimental results show that the proposed method exhibits good security, invisibility, and high capacity.