Abstract
Watermarking is discussed as possible means to enhance biometric systems. Application scenarios for the employment of watermarks as found in literature are discussed and analysed with respect to required watermark properties, possible attacks, and eventual (cryptographic) alternatives.
This work has been partially supported by the Austrian Science Fund, TRP project no. L554.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ahmad, S., Lu, Z.-M.: A joint biometrics and watermarking based framework for fingerprinting, copyright protection, proof of ownership, and security applications. In: Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007), pp. 676–679 (2007)
Ahmed, F., Moskowitz, I.S.: Composite signature based watermarking for fingerprint authentication. In: Proceedings of the ACM Workshop on Multimedia and Security (MMSEC 2005), pp. 799–802 (2005)
Bartlow, N., Kalka, N., Cukic, B., Ross, A.: Protecting iris images through asymmetric digital watermarking. In: IEEE Workshop on Automatic Identification Advanced Technologies, vol. 4432, pp. 192–197. West Virginia University, Morgantown (2007)
Blythe, P., Fridrich, J.: Secure digital camera. In: Digital Forensic Research Workshop, Baltimore, MD, USA (August 2004)
Chung, Y., Moon, D., Moon, K., Pan, S.: Hiding biometric data for secure transmission. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1049–1057. Springer, Heidelberg (2005)
Ding, S., Li, C., Liu, Z.: Protecting hidden transmission of biometrics using authentication watermarking. In: Proceedings of the 2010 WASE International Conference on Information Engineering (ICIE), pp. 105–108 (2010)
Dong, J., Tan, T.: Effects of watermarking on iris recognition performance. In: Proceedings of the 10th International Conference on Control, Automation, Robotics and Vision (ICARCV 2008), pp. 1156–1161 (2008)
Feng, J.-B., Lin, I.-C., Tsai, C.-S., Chu, Y.-P.: Reversible watermarking: current status and key issues. International Journal on Network Security 2(3), 161–171 (2006)
Gunsel, B., Uludag, U., Tekalp, A.M.: Robust watermarking of fingerprint images. Pattern Recognition Journal 35(12), 2739–2747 (2002)
Hämmerle-Uhl, J., Raab, K., Uhl, A.: Experimental study on the impact of robust watermarking on iris recognition accuracy (best paper award, applications track). In: Proceedings of the 25th ACM Symposium on Applied Computing, pp. 1479–1484 (2010)
Hämmerle-Uhl, J., Raab, K., Uhl, A.: Attack against Robust Watermarking-Based Multimodal Biometric Recognition Systems. In: Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C., Fairhurst, M.C. (eds.) BioID 2011. LNCS, vol. 6583, pp. 25–36. Springer, Heidelberg (2011)
Hassanien, A.E., Abraham, A., Grosan, C.: Spiking neural network and wavelets for hiding iris data in digital images. Soft Computing - A Fusion of Foundations, Methodologies and Applications 13(4), 401–416 (2008)
Hoang, T., Tran, D., Sharma, D.: Remote multimodal biometric authentication using bit priority-based fragile watermarking. In: Proceedings of the 19th International Conference on Pattern Recognition, Tampa, Florida, USA, pp. 1–4 (December 2008)
Hong, S., Kim, H., Lee, S., Chung, Y.: Analyzing the secure and energy efficient transmissions of compressed fingerprint images using encryption and watermarking. In: Proceedings of the 2008 International Conference on Information Security and Assurance, pp. 316–320 (2008)
Hui, L., Yu-ping, H.: Wavelet tree quantization-based biometric watermarking for offline handwritten signature. In: Proceedings of the 2009 International Asia Symposium on Intelligent Interaction and Affective Computing, pp. 71–74 (2009)
Jain, A.K., Uludag, U.: Hiding fingerprint minutiae in images. In: Proceedings of AutoID 2002, 3rd Workshop on Automatic Identification Advanced Technologies, Tarrytown, New York, USA, pp. 97–102 (March 2002)
Jain, A.K., Ross, A., Uludag, U.: Biometric template security: Challenges and solutions. In: Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005, Antalya, Turkey (September 2005)
Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 1494–1498 (2003)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP Journal on Advances in Signal Processing, 1–17 (2008)
Khan, M.K., Xie, L., Zhang, J.S.: Robust hiding of fingerprint-biometric data into audio signals. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 702–712. Springer, Heidelberg (2007)
Kim, W.-G., Lee, H.K.: Multimodal biometric image watermarking using two-stage integrity verification. Signal Processing 89(12), 2385–2399 (2009)
Kim, W.-G., Lee, S.H., Seo, Y.-S.: Image Fingerprinting Scheme for Print-and-Capture Model. In: Zhuang, Y.-t., Yang, S.-Q., Rui, Y., He, Q. (eds.) PCM 2006. LNCS, vol. 4261, pp. 106–113. Springer, Heidelberg (2006)
Komninos, N., Dimitriou, T.: Protecting biometric templates with image watermarking techniques. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 114–123. Springer, Heidelberg (2007)
Kundur, D., Hatzinakos, D.: Digital watermarking using multiresolution wavelet decomposition. In: Proceedings of the 1998 International Conference on Acoustics, Speech and Signal Processing (ICASSP 1998), Seattle, WA, USA, vol. 5, pp. 2969–2972 (May 1998)
Kutter, M., Jordan, F., Bossen, F.: Digital signature of color images using amplitude modulation. In: Sethi, I.K., Jain, R.C. (eds.) Proceedings of the SPIE Conference on Storage and Retrieval for Image and Video Databases, San Jose, USA, vol. 2952, pp. 518–526 (1997)
Lang, A., Dittmann, J.: Digital watermarking of biometric speech references: impact to the eer system performance. In: Delp, E.J., Wong, P.W. (eds.) Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, p. 650513 (2007)
Lee, H., Lim, J., Yu, S., Kim, S., Lee, S.: Biometric image authentication using watermarking. In: Proceedings of the International Joint Conference SICE-ICASE 2006, pp. 3950–3953 (2006)
Li, C., Ma, B., Wang, Y., Zhang, Z.: Protecting biometric templates using authentication watermarking. In: Qiu, G., Lam, K.M., Kiya, H., Xue, X.-Y., Kuo, C.-C.J., Lew, M.S. (eds.) PCM 2010. LNCS, vol. 6297, pp. 709–718. Springer, Heidelberg (2010)
Low, C.-Y., Teoh, A.B.-J., Tee, C.: Fusion of LSB and DWT Biometric Watermarking Using Offline Handwritten Signature for Copyright Protection. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 786–795. Springer, Heidelberg (2009)
Maiorana, E., Campisi, P., Neri, A.: Biometric signature authentication using radon transform-based watermarking techniques. In: Proceedings of the 2007 Biometrics Symposium (2007)
Moon, D., Kim, T., Jung, S.-H., Chung, Y., Moon, K., Ahn, D., Kim, S.K.: Performance evaluation of watermarking techniques for secure multimodal biometric systems. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005 part II. LNCS (LNAI), vol. 3802, pp. 635–642. Springer, Heidelberg (2005)
Motwani, R.C., Harris, F.C., Bekris, K.E.: A proposed digital rights management system for 3d graphics using biometric watermarks. In: Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference CCNC 2010, pp. 1075–1080 (2010)
Noore, A., Singh, R., Vatsa, M., Houck, M.M.: Enhancing security of fingerprints through contextual biometric watermarking. Forensic Science International 169, 188–194 (2007)
Park, K.R., Jeong, D.S., Kang, B.J., Lee, E.C.: A Study on Iris Feature Watermarking on Face Data. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds.) ICANNGA 2007. LNCS, vol. 4432, pp. 415–423. Springer, Heidelberg (2007)
Qi, M., Lu, Y., Du, N., Zhang, Y., Wang, C., Kong, J.: A novel image hiding approach based on correlation analysis for secure multimodal biometrics. Journal of Network and Computer Applications 33(3), 247–257 (2010)
Rajibul, M.I., Shohel, M.S., Andrews, S.: Biometric template protection using watermarking with hidden password encryption. In: Proceedings of the International Symposium on Information Technology 2008 (ITSIM 2008), pp. 296–303 (2008)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Secure data hiding in wavelet compressed fingerprint images. In: ACM Multimedia 2000, Los Angeles, CA, USA (November 2000)
Ratha, N.K., Figueroa-Villanueva, M.A., Connell, J.H., Bolle, R.M.: A secure protocol for data hiding in compressed fingerprint images. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 205–216. Springer, Heidelberg (2004)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3), 614–634 (2001)
Roberts, C.: Biometric attack vectors and defenses. Computers & Security 26, 14–25 (2007)
Satonaka, T.: Biometric watermark authentication with multiple verification rule. In: Proceedings of the 12th IEEE Workshop on Neural Networks in Signal Processing, pp. 597–606 (2002)
Uludag, U., Gunsel, B., Ballan, M.: A spatial method for watermarking of fingerprint images. In: Proceedings of the 1st International Workshop on Pattern Recognition in Information Systems, PRIS 2001, Setubal, Portugal, pp. 26–33 (July 2001)
Vatsa, M., Singh, R., Noore, A.: Improving biometric recognition accuracy and robustness using DWT and SVM watermarking. IEICE Electronics Express 2(12), 362–367 (2005)
Vatsa, M., Singh, R., Noore, A.: Feature based RDWT watermarking for multimodal biometric system. Image and Vision Computing 27(3), 293–304 (2009)
Vatsa, M., Singh, R., Noore, A., Houck, M.M., Morris, K.: Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 3(2), 23–28 (2006)
Vielhauer, C., Steinmetz, R.: Approaches to biometric watermarks for owner authentification. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, vol. 4314 (January 2001)
Wang, D.-S., Li, J.-P., Hu, D.-K., Yan, Y.-H.: A novel biometric image integrity authentication using fragile watermarking and Arnold transform. In: Li, J.P., Bloshanskii, I., Ni, L.M., Pandey, S.S., Yang, S.X. (eds.) Proceedings of the International Conference on Information Computing and Automatation, pp. 799–802 (2007)
Yeung, M.M., Pankanti, S.: Verification watermarks on fingerprint recognition and retrieval. Journal of Electronal Imaging, Special Issue on Image Security and Digital Watermarking 9(4), 468–476 (2000)
Zebbiche, K., Ghouti, L., Khelifi, F., Bouridane, A.: Protecting fingerprint data using watermarking. In: Proceedings of the 1st NASA/ESA Conference on Adaptive Hardware and Systems, AHS 2006, Istanbul, Turkey, pp. 451–456 (June 2006)
Zebbiche, K., Khelifi, F.: Region-based watermarking of biometric images: Case study in fingerprint images. International Journal of Digital Multimedia Broadcasting (March 2008)
Zebbiche, K., Khelifi, F., Bouridane, A.: An efficient watermarking technique for the protection of fingerprint images. EURASIP Journal on Information Security (February 2008)
Zeitz, C., Scheidat, T., Dittmann, J., Vielhauer, C.: Security issues of internet-based biometric authentication systems: risks of man-in-the-middle and BioPhishing on the example of BioWebAuth. In: Delp, E.J., Wong, P.W., Dittmann, J., Nemon, N.D. (eds.) Proceedings of SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, pp. 0R-1 –0R12, (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hämmerle-Uhl, J., Raab, K., Uhl, A. (2011). Watermarking as a Means to Enhance Biometric Systems: A Critical Survey. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds) Information Hiding. IH 2011. Lecture Notes in Computer Science, vol 6958. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24178-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-24178-9_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24177-2
Online ISBN: 978-3-642-24178-9
eBook Packages: Computer ScienceComputer Science (R0)