摘要

Recently, an engineering report on chaos-based security solution has been proposed for fingerprint data during communication and transmission (IEEE Trans. Instrum. Meas. 61 (April (4)) (2012) 876-887). It has been claimed that experimental results and security analysis demonstrate the efficiency of the security solution in this report. However, from a scientific perspective, we give a validity analysis. Firstly, we demonstrate that the reversibility of integer reversible hidden transform (RHT) cannot be guaranteed under the current constraint condition in the original paper and then counterexamples are given to verify demonstration. In addition, in its experiment and performance analysis parts, there also exist several problems. Finally, we put forward some suggestive remarks on the designing of security solution for fingerprint data.