Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Biometric Template Protection With Robust Semi – Blind Watermarking Using Image Intrinsic Local Property
Mita C. Paunwala, Suparva Patnaik
Pages - 28 - 42 | Revised - 01-05-2011 | Published - 31-05-2011
MORE INFORMATION
KEYWORDS
Biometric Watermarking, Fingerprint Matching, Image Manipulation, Security System, Edge Block Analysis
ABSTRACT
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
1 | Google Scholar |
2 | Academic Index |
3 | CiteSeerX |
4 | refSeek |
5 | iSEEK |
6 | Libsearch |
7 | Bielefeld Academic Search Engine (BASE) |
8 | OpenJ-Gate |
9 | Scribd |
10 | WorldCat |
11 | SlideShare |
12 | PdfSR |
A. K. Jain D. Maltoni, D. Maio and S. Prabhakar. Handbook of Fingerprint Recognition. Springer, New York, 2003. | |
Ashourian, M.; Enteshary, R., “IEEE Conference on Convergent Technologies for Asia- Pacific Region”, TENCON, Vol. 1, pp 428-431, 2003. | |
B. Gunsel, U. Uludag, and A.M. Tekalp, “Robust Watermarking of Fingerprint Images,” Pattern Recognition, vol. 35, no. 12, pp. 2739-2747, Dec. 2002. | |
B. Schneier, “The Uses and Abuses of Biometrics,” Comm. ACM, vol. 42, no. 8, p. 136, Aug. 1999. | |
B. Verma, S. Jain, D. P. Agarwal, and A. Phadikar, "A New color image watermarking scheme," Infocomp, Journal of computer science, vol. 5,N.2, pp. 37-42, 2006. | |
Chander Kant, Ranjender Nath & Sheetal Chaudhary, “Biometrics Security using steganography”, International Journal of Security, Vol. 2 : Issue (1). | |
Choi, Y., Aizawa, I., “Digital watermarking using interblock correlation”, In: Proc. Internat. Conf. on Image Processing, vol. 2, pp. 16–220, 24–28 October 1999. | |
Feng Yang, Lei Li, “An adaptive, SVM -based watermarking in frequency domain”, International Conference on Wavelet Analysis and Pattern Recognition, pp. 465 – 469, Hongkong, 30 sep., 2008. | |
Hiller and Lieberman, “ Introduction to Operations Research,” Seventh edition, Tata McGraw-Hill, 2001. | |
Hongping Xu, Xiaoxia Wan, “International Conference on Computer Science and Software Engineering”, pp. 245- 248,Hubei, Dec., 2008. | |
J. Qi. and Y. Wang, "A robust fingerprint matching method", Pattern Recognition, vol. 35, pp.1655-1671, 2005. | |
L. Chun-Shien, H. Shih-Kun, S. Chwen-Jye, and L. Hong-Yuan Mark, "Cocktail watermarking for digital image protection," Multimedia, IEEE Transactions on, vol. 2, pp.209-224, 2000. | |
N.K. Ratha, J.H. Connell, and R.M. Bolle, “An Analysis of Minutiae Matching Strength,” Proc. Third Int’l.Conf. Audio- and Video-Based Biometric Person Authentication, pp. 223-228, June 2001. | |
Nagar Abhishk, Nandkumar Karthik, Jain Anil k., “Biometric Template Transformation: a security analysis,” Proc. SPIE, the International Society for Optical Engineering, vol.7541, 2010. | |
Noore A., Singh R., Vatsa M. and Houck M.M., “ Enhancing Security of Fingerprints Through Contextual Biometric Watermarking”, Journal of Forensic Science International, Vol. 169, Issue 2, Pp. 188-194 ,July 2007. | |
Panyayot Chaikan, Montri Karnjanadecha, “The Use of Top-View Finger Image for Personal Identification” Proceedings of the 5th International IEEE Symposium on image and Signal Processing and Analysis, 343-346, Nov. 2007. | |
S. Jain, “Digital Watermarking Techniques: A Case Study in Fingerprints & Faces,” Indian Conf. Computer Vision, Graphics, and Image Processing, pp. 139-144, Dec. 2000. | |
S. Pankanti and M.M. Yeung, “Verification Watermarks on Fingerprint Recognition and Retrieval,” Proc. SPIE, vol. 3657, pp. 66-78, 1999. | |
Salil Prabhakar, “Fingerprint Classification and Matching Using a Filterbank”, Ph.D Theses, University of Michigan State, 2001. | |
W. Lu, H. Lu, and F.L. Chung, "Robust digital image watermarking based on subsampling," Applied Mathematics and Computation, vol.181, pp. 886-893, 2006. | |
Wang-sheng Fang, Kang Chen, “A Wavelet Watermarking Based on HVS and Watermarking Capacity Analysis”, IEEE International Conference on Multimedia Information Networking and Security, pp. 141-144, Hubei, Dec., 2009. | |
X. Jiang, W.Y. Yau,” Fingerprint minutiae matching based on the local and global structures”, Proc. of the 15th International Conference on Pattern Recognition, vol. 2, pp. 1038–1041, 2000. | |
X. Wu and Z.-H. Guan, "A novel digital watermark algorithm based on chaotic maps," Physics Letters A, vol. 365, pp. 403-406, 2007. | |
Yanhong Zhang, “Blind watermark algorithm based on HVS and RBF neural network in DWT domain”, WSEAS Transactions on Computers, Volume 8, Issue 1, January 2009. | |
Yi Chen, “Extended Feature Set and Touchless Imaging for Fingerprint Matching”, Ph.D Theses, University of Michigan State, 2009. | |
Yulin Wang , Alan Pearmain, “Blind image data hiding based on self reference” Pattern Recognition Letters 25, 1681–1689, 2004. | |
Dr. Mita C. Paunwala
- India
Professor Suparva Patnaik
- India
ssp@eced.svnit.ac.in
|
|
|
|
View all special issues >> | |
|
|