Skip to main content

Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3802))

Abstract

In this paper, we describe various watermarking techniques for secure user verification in the remote, multimodal biometric systems employing both fingerprint and face information, and compare their effects on user verification and watermark detection accuracies quantitatively. To evaluate the performance of watermarking for multimodal biometric systems, we first consider possible two scenarios – embedding facial features into a fingerprint image and embedding fingerprint features into a facial image. Additionally, to evaluate the performance of dual watermarking for secure biometric systems, we consider another two scenarios – with/without considering the characteristics of the fingerprint in embedding the dual watermark. Based on the experimental results, we confirm that embedding fingerprint features into a facial image can provide superior performance in terms of the user verification accuracy. Also, the dual watermarking with considering the characteristics of the fingerprint in embedding the dual watermark can provide superior performance in terms of the watermark detection accuracy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jain, A., Bole, R., Panakanti, S.: Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)

    Google Scholar 

  2. Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  3. Bolle, R., Connell, J., Ratha, N.: Biometric Perils and Patches. Pattern Recognition 35, 2727–2738 (2002)

    Article  MATH  Google Scholar 

  4. Stallings, W.: Cryptography and Network Security. Pearson Ed. Inc., London (2003)

    Google Scholar 

  5. Lee, H., et al.: An Audio Watermarking By Modifying Tonal Maskers. ETRI Journal 27(5) (2005)

    Google Scholar 

  6. Jung, S., et al.: An Improved Detection Technique for Spread Spectrum Audio Watermarking with a Spectral Envelope Filter. ETRI Journal 25(1), 52–54 (2003)

    Article  Google Scholar 

  7. Jain, A., Uludag, U., Hsu, R.: Hiding a Face in a Fingerprint Image. In: Proc. of Int. Conf. on Pattern Recognition, pp. 52–54 (2002)

    Google Scholar 

  8. Yeung, M., Pankanti, S.: Verification Watermarks on Fingerprint Recognition and Retrieval. Journal of Electronic Imaging 9(4), 468–476 (2000)

    Article  Google Scholar 

  9. Pan, S., et al.: A Memory-Efficient Fingerprint Verification Algorithm using A Multi-Resolution Accumulator Array for Match-on-Card. ETRI Journal 25(3), 179–186 (2003)

    Article  Google Scholar 

  10. Turk, M., Petland, A.: Face Recognition using Eigenface. In: Proc. of IEEE Conf. on Computer Vision and Pattern Recognition (1991)

    Google Scholar 

  11. Dugad, R., Ratakonda, K., Ahuja, N.: A New Wavelet-based Scheme for Watermarking Images. In: Proc. of the ICIP (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Moon, D. et al. (2005). Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_94

Download citation

  • DOI: https://doi.org/10.1007/11596981_94

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30819-5

  • Online ISBN: 978-3-540-31598-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics