ABSTRACT
This paper provides a multimodal biometric watermarking algorithm to protect and well authenticate biometric data. It uses the DTCWT-DCT as a combination of two domain transform techniques to fuse face and fingerprint modalities. Two pseudorandom sequences are used to embed the bits of the quantized spectral minutiae representation used as a watermark into the face image. The embedding is done only in high-frequency sub-bands of the DTCWT decomposition, after applying the DCT transform to improve the authentication system security. The conducted experimental results based on ORL face and FVC2002 DB1 fingerprint databases proved the ability of the proposed approach to withstand the conventional digital image watermarking attacks. Also, good performance is showed in term of attaining an accuracy rate of 100%.
- Mohammed Alkhathami, Fengling Han, and Ron Van Schyndel. 2013. Fingerprint image watermarking approach using DTCWT without corrupting minutiae. In 6th International Congress on Image and Signal Processing (CISP). IEEE, 1717--1723.Google ScholarCross Ref
- Naima Bousnina, Sanaa Ghouzali, Lafkih Meryem, Nafea Ohood, Mikram Mounia, Abdul Wadood, and Aboutajdine Driss. 2016. Watermarking for protected fingerprint authentication. In 12th International Conference on Innovations in Information Technology (IIT). IEEE, 1--5.Google ScholarCross Ref
- Deng Cai, Xiaofei He, Jiawei Han, and Hong-Jiang Zhang. 2006. Orthogonal laplacianfaces for face recognition. IEEE Transactions on Image Processin 15 (2006), 3608--3614. Google ScholarDigital Library
- Naser Damer, Alexander Opel, and Alexander Nouak. 2013. Performance an-chored score normalization for multi-biometric fusion. In Advances in Visual Computing, Vol. 8034. Springer, Berlin, Heidelberg, 68--75.Google Scholar
- Ashraf El-Sisi. 2011. Design and implementation biometric access control system using fingerprint for restricted area based on gabor filter. The International Arab Journal of Information Technology 8, 4 (2011), 355--363.Google Scholar
- Sanaa Ghouzali. 2015. Watermarking based multi-biometric fusion approach. In Codes, Cryptology, and Information Security, Vol. 9084. Springer, Cham, 342--351.Google Scholar
- Lamia Rzouga Haddada, Bernadette Dorizzi, and Najoua Essoukri Ben Amara. 2017. A combined watermarking approach for securing biometric data. Journal of Signal Processing: Image Communication 55 (2017), 23--31. Google ScholarDigital Library
- Jutta Hämmerle-Uhl, Karl Raab, and Andreas Uhl. 2011. Watermarking as a means to enhance biometric systems: A critical survey. In Information Hiding (1611-3349), Tomáš Filler, Tomáš Pevný, Scott Craver, and Andrew Ker (Eds.), Vol. 6958. Springer, Berlin, Heidelberg, 238--254. Google ScholarDigital Library
- Md. Rajibul Islam, Md. Shohel Sayeed, and Andrews Samraj. 2008. Biometric template protection using watermarking with hidden password encryption. In International Symposium on Information Technology. IEEE, 296--303.Google Scholar
- Chunlei Li, Ruimin Yang, Zhoufeng Liu, Jianjun Li, and Zhenduo Guo. 2016. Semi-fragile self-recoverable watermarking scheme for face image protection. Computers & Electrical Engineering 54 (2016), 484--493. Google ScholarDigital Library
- Dario Maio, Davide Maltoni, Raffaele Cappelli, James Wayman, and Anil K. Jain. 2002. FVC2000: fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligenc 24, 3 (2002), 402--412. Google ScholarDigital Library
- Ohoud Nafea, Sanaa Ghouzali, Wadood Abdul, and Emad ul Haq Qazi. 2016. Hybrid multi-biometric template protection using watermarking. Comput. J. 59 (2016), 1392--1407.Google ScholarCross Ref
- Abhishek Nagar, Karthik Nanda kumar, and Anil K. Jain. 2010. Biometric Template Transformation: A Security Analysis. In Media Forensics and Security, Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, and Edward J. Delp (Eds.), Vol. 7541. SPIE Proceedings, San Jose, California, United States.Google Scholar
- Preeti Parashar and Rajeev Kumar Singh. 2014. A Survey: Digital Image Watermarking Techniques. International Journal of Signal Processing, Image Processing and Pattern Recognition 7, 6 (2014), 111--124.Google ScholarCross Ref
- S. Radharani and M.L. Valarmathi. 2010. A Study on Watermarking Schemes for Image Authentication. International Journal of Computer Applications 2, 4 (2010), 24--32.Google ScholarCross Ref
- K. Ramani, V. Prasad, and Varadarajan Sourirajan. 2010. Protecting digital images using DTCWT-DCT. In Information and Communication Technologies, Vol. 101. Springer, Berlin, Heidelberg, 36--44.Google Scholar
- Rohit Thanki and Komal Borisagar. 2015. Sparse watermarking technique for improving security of biometric system. In Procedia Computer Science, Vol. 70. Elsevier, 251--258.Google Scholar
- Wioletta Wójtowicz and Marek R. Ogiela. 2016. Digital images authentication scheme based on bimodal biometric watermarking in an independent domain. Journal of Visual Communication and Image Representation 38 (2016), 1--10. Google ScholarDigital Library
- Haiyun Xu, Raymond N. J. Veldhuis, Asker M. Bazen, Tom A. M. Kevenaar, Anton H. M. Akkermans, and Berk Gökberk. 2009. Fingerprint verification using spectral minutiae representations. Transactions on Information Forensics and Security Journal 4 (2009), 397--409. Google ScholarDigital Library
- Haiyun Xu, Raymond N. J. Veldhuis, Tom A. M. Kevenaar, and Ton A. H. M. Akkermans. 2009. A fast minutiae-based fingerprint recognition system. IEEE Systems Journal 3 (2009), 418--427.Google ScholarCross Ref
Index Terms
- DTCWT-DCT watermarking method for multimodal biometric authentication
Recommendations
Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking
As malicious attacks greatly threaten the security and reliability of biometric systems, ensuring the authenticity of biometric data is becoming increasingly important. In this paper we propose a watermarking-based two-stage authentication framework to ...
A secure algorithm for biometric-based digital image watermarking in DCT domain
This paper addresses the problem of ownership of digital watermark by inserting a biometric-based watermark in the digital host signal. The biometric-based digital watermark is made secure using an encryption technique using Arnold catmap before ...
Protecting biometric templates using authentication watermarking
PCM'10: Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part IIn this paper, we propose a novel scheme for protecting biometric templates using salient region-based authentication watermarking. Firstly, a novel multi-level authentication watermarking scheme is proposed, which is used to verify the integrity of ...
Comments