Abstract
For traditional fragile watermarking schemes, isolated-block tamper which will destroy the minutiae of the fingerprint image can hardly be efficiently detected. In this paper, we propose a multi-block dependency based fragile watermarking scheme to overcome this shortcoming. The images are split into image blocks with size of 8 × 8; a 64-bit watermark is generated for each image block, and then equally partitioned into eight parts. Each part of the watermark is embedded into another image block which is selected by the corresponding secret key. Theoretic analysis and experimental results demonstrate that the proposed method not only can detect and localize the isolated-block tamper on fingerprint images with high detection probability and low false detection probability, but also enhances the systematic security obviously.













Similar content being viewed by others
References
Ahmed AF, Selvanadin KB (2008) Fingerprint reference verification method using a phase encoding based watermarking technique. J Electron Imaging 17:1–9
Anthony TS, Zhu XZ, Shen J (2008) Fragile Watermarking based on encoding of the zeroes of the Z-Transform. IEEE Trans Inf Forensics Security 3(3):567–569
Celik M, Sharma G, Saber E (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11:585–595
Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27:439–446
Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36:1300–1307
Deguillaume F, Voloshynovskiy S (2003) Secure hybrid robust watermarking resistant against tampering and copy attack. Signal Process 83:2133–2170
Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J Electron Imaging 11:262–274
He HJ, Zhang JS, Tai HM (2008) Digital watermarking scheme exploiting nondeterministic dependence for image authentication. IHW 5284:147–160
He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89:1557–1566
He HJ, Zhang JS, Tai HM (2009) Self-recovery fragile watermarking using block-neighborhood tampering characterization. IHW 5806:132–145
He HJ, Zhang JS, Tai HM (2010) A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization. Multimed Tools Appl 1:1–18
Holliman H, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9:432–441
Li CT, Yuan Y (2006) Block-chain based fragile watermarking scheme with superior localization. Opt Eng 45:1–6
Liu SH, Yao HX, Gao W, Liu YL (2007) An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl Math Comput 185:869–882
Noore A, Singh R, Vatsa M, Houck M (2007) Enhancing security of fingerprints through contextual biometric watermarking. Forensic Sci Int 169:188–194
Ohkita K, Yoshida M, Kitamura I, Fujiwara T (2009) Improving capability of locating tampered pixels of statistical fragile watermarking. In: Proceedings of the 8th international workshop on digital watermarking, vol 5703, pp 279–293
Ratha NK, Villanueva MAF, Connell JH, Bolle RM (2004) A secure protocol for data hiding in compressed fingerprint images. Lect Notes Comput Sci 3087:205–216
Suthaharan S (2004) Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn Lett 25:1893–1903
Tsai YJ, Venu GJ (2005) A minutia-based partial fingerprint recognition system. Pattern Recogn 38:1672–1684
Wong P (1998) A public key watermark for image verification and authentication. In: Proc Int Conf Image Processing 1:455–459
Wu JH, Bin B, Zhu BB, Li SP, Lin FZ (2004) Efficient oracle attacks on Yeung–Mintzer and variant authentication schemes. In: IEEE international conference on multimedia & Expo (ICME), pp 931–934
Yeung MM, Pankanti S (1999) Verification watermarks on fingerprint recognition and retrieval. In: Proc. of SPIE conference on security and watermarking of multimedia contents, San Jose, pp 66–78
Yu M, He HJ, Zhang JS (2007) A digital authentication watermarking scheme for JPEG images with superior localization and security. Sci China F Inf Sci 50:491–509
Zebbiche AK, Khelifi F, Bouridane A (2008) An efficient watermarking technique for the protection of fingerprint images. In: EURASIP journal on information security, pp 1–20
Zhang XP, Wang SZ (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process Lett 14:727–730
Zhang J, Tian L, Tai HM (2004) A new watermarking method based on chaotic maps. In: Proc. IEEE ICME’04, vol 89, pp 157–163
Acknowledgements
This work was supported by the National Natural Science Foundation of China (No. 60873158), the National Basic Research Program of China (No. 2010CB 327902), the Fundamental Research Funds for the Central Universities, and the Opening Funding of the State Key Laboratory of Virtual Reality Technology and Systems.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, C., Wang, Y., Ma, B. et al. Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimed Tools Appl 64, 757–776 (2013). https://doi.org/10.1007/s11042-011-0974-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-011-0974-z