skip to main content
10.1145/3320326.3320409acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnissConference Proceedingsconference-collections
research-article

DTCWT-DCT watermarking method for multimodal biometric authentication

Authors Info & Claims
Published:27 March 2019Publication History

ABSTRACT

This paper provides a multimodal biometric watermarking algorithm to protect and well authenticate biometric data. It uses the DTCWT-DCT as a combination of two domain transform techniques to fuse face and fingerprint modalities. Two pseudorandom sequences are used to embed the bits of the quantized spectral minutiae representation used as a watermark into the face image. The embedding is done only in high-frequency sub-bands of the DTCWT decomposition, after applying the DCT transform to improve the authentication system security. The conducted experimental results based on ORL face and FVC2002 DB1 fingerprint databases proved the ability of the proposed approach to withstand the conventional digital image watermarking attacks. Also, good performance is showed in term of attaining an accuracy rate of 100%.

References

  1. Mohammed Alkhathami, Fengling Han, and Ron Van Schyndel. 2013. Fingerprint image watermarking approach using DTCWT without corrupting minutiae. In 6th International Congress on Image and Signal Processing (CISP). IEEE, 1717--1723.Google ScholarGoogle ScholarCross RefCross Ref
  2. Naima Bousnina, Sanaa Ghouzali, Lafkih Meryem, Nafea Ohood, Mikram Mounia, Abdul Wadood, and Aboutajdine Driss. 2016. Watermarking for protected fingerprint authentication. In 12th International Conference on Innovations in Information Technology (IIT). IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  3. Deng Cai, Xiaofei He, Jiawei Han, and Hong-Jiang Zhang. 2006. Orthogonal laplacianfaces for face recognition. IEEE Transactions on Image Processin 15 (2006), 3608--3614. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Naser Damer, Alexander Opel, and Alexander Nouak. 2013. Performance an-chored score normalization for multi-biometric fusion. In Advances in Visual Computing, Vol. 8034. Springer, Berlin, Heidelberg, 68--75.Google ScholarGoogle Scholar
  5. Ashraf El-Sisi. 2011. Design and implementation biometric access control system using fingerprint for restricted area based on gabor filter. The International Arab Journal of Information Technology 8, 4 (2011), 355--363.Google ScholarGoogle Scholar
  6. Sanaa Ghouzali. 2015. Watermarking based multi-biometric fusion approach. In Codes, Cryptology, and Information Security, Vol. 9084. Springer, Cham, 342--351.Google ScholarGoogle Scholar
  7. Lamia Rzouga Haddada, Bernadette Dorizzi, and Najoua Essoukri Ben Amara. 2017. A combined watermarking approach for securing biometric data. Journal of Signal Processing: Image Communication 55 (2017), 23--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jutta Hämmerle-Uhl, Karl Raab, and Andreas Uhl. 2011. Watermarking as a means to enhance biometric systems: A critical survey. In Information Hiding (1611-3349), Tomáš Filler, Tomáš Pevný, Scott Craver, and Andrew Ker (Eds.), Vol. 6958. Springer, Berlin, Heidelberg, 238--254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Md. Rajibul Islam, Md. Shohel Sayeed, and Andrews Samraj. 2008. Biometric template protection using watermarking with hidden password encryption. In International Symposium on Information Technology. IEEE, 296--303.Google ScholarGoogle Scholar
  10. Chunlei Li, Ruimin Yang, Zhoufeng Liu, Jianjun Li, and Zhenduo Guo. 2016. Semi-fragile self-recoverable watermarking scheme for face image protection. Computers & Electrical Engineering 54 (2016), 484--493. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Dario Maio, Davide Maltoni, Raffaele Cappelli, James Wayman, and Anil K. Jain. 2002. FVC2000: fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligenc 24, 3 (2002), 402--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ohoud Nafea, Sanaa Ghouzali, Wadood Abdul, and Emad ul Haq Qazi. 2016. Hybrid multi-biometric template protection using watermarking. Comput. J. 59 (2016), 1392--1407.Google ScholarGoogle ScholarCross RefCross Ref
  13. Abhishek Nagar, Karthik Nanda kumar, and Anil K. Jain. 2010. Biometric Template Transformation: A Security Analysis. In Media Forensics and Security, Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, and Edward J. Delp (Eds.), Vol. 7541. SPIE Proceedings, San Jose, California, United States.Google ScholarGoogle Scholar
  14. Preeti Parashar and Rajeev Kumar Singh. 2014. A Survey: Digital Image Watermarking Techniques. International Journal of Signal Processing, Image Processing and Pattern Recognition 7, 6 (2014), 111--124.Google ScholarGoogle ScholarCross RefCross Ref
  15. S. Radharani and M.L. Valarmathi. 2010. A Study on Watermarking Schemes for Image Authentication. International Journal of Computer Applications 2, 4 (2010), 24--32.Google ScholarGoogle ScholarCross RefCross Ref
  16. K. Ramani, V. Prasad, and Varadarajan Sourirajan. 2010. Protecting digital images using DTCWT-DCT. In Information and Communication Technologies, Vol. 101. Springer, Berlin, Heidelberg, 36--44.Google ScholarGoogle Scholar
  17. Rohit Thanki and Komal Borisagar. 2015. Sparse watermarking technique for improving security of biometric system. In Procedia Computer Science, Vol. 70. Elsevier, 251--258.Google ScholarGoogle Scholar
  18. Wioletta Wójtowicz and Marek R. Ogiela. 2016. Digital images authentication scheme based on bimodal biometric watermarking in an independent domain. Journal of Visual Communication and Image Representation 38 (2016), 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Haiyun Xu, Raymond N. J. Veldhuis, Asker M. Bazen, Tom A. M. Kevenaar, Anton H. M. Akkermans, and Berk Gökberk. 2009. Fingerprint verification using spectral minutiae representations. Transactions on Information Forensics and Security Journal 4 (2009), 397--409. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Haiyun Xu, Raymond N. J. Veldhuis, Tom A. M. Kevenaar, and Ton A. H. M. Akkermans. 2009. A fast minutiae-based fingerprint recognition system. IEEE Systems Journal 3 (2009), 418--427.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. DTCWT-DCT watermarking method for multimodal biometric authentication

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      NISS '19: Proceedings of the 2nd International Conference on Networking, Information Systems & Security
      March 2019
      512 pages
      ISBN:9781450366458
      DOI:10.1145/3320326

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 March 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader