Abstract
In this paper, we have combined watermarking and biometrics for possible improvement in owner identification/verification technology. We have proposed and compared wavelet based four blind invisible watermarking methods that have used face image as watermark. Two watermarking methods are based on the discrete wavelet transform (DWT) and rest two watermarking methods are based on the redundant discrete wavelet transform (RDWT). One watermarking method in each transform incorporates weighted binary coding to achieve improved reliability of extracted watermark. Other watermarking methods replace original image coefficients with face image coefficients. We have observed that DWT based watermarking methods outperform RDWT based watermarking methods. We have compared the robustness of the proposed watermarking methods against various common image processing attacks/operations. We have observed that DWT based watermarking method coupled with weighted binary coding has the best performance without attacks; peak signal to noise ratio value of watermarked image is greater than 50 dB and normalized correlation coefficient value of extracted watermark is 1 at the watermark embedding strength of 1. Moreover, the same watermarking method has the best robustness against most of the attacks.
Similar content being viewed by others
References
Unique Identification Authority of India Planning Commission Government of India (2009) Unique identification authority of India (UIDAI). http://uidai.gov.in/. Accessed 1 Jan 2014
Bao P, Ma X (2005) Image adaptive watermarking using wavelet domain singular value decomposition. Trans Circuits Syst Video Technol 15(1):96–102
Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791
Bhatnagar G, Raman B (2009) A new robust reference watermarking scheme based on dwt-svd. Comput Stand Interfaces 31(5):1002–1013
Bhatnagar G, Raman B (2011) A new robust reference logo watermarking scheme. Multimed Tools Appl 52(2–3):621–640
Bhatnagar G, Wu Q, Raman B (2012) A new robust adjustable logo watermarking scheme. Comput Secur 31(1):40–58
Cao JG, Fowler JE, Younan NH (2001) An image-adaptive watermark based on a redundant wavelet transform. In: Proceedings of IEEE international conference on image processing 2001, vol 2. Thessaloniki, pp 277–280
Cheddad A, Condell J, Curran K, McKevitt P (2008) Biometric inspired digital image steganography. In: Proceedings of IEEE 15th annual international conference and workshop on the Engineering of Computer Based Systems, ECBS 2008. Belfast, pp 159–168
Chung Y, Moon D, Moon K, Pan S (2005) Hiding biometric data for secure transmission. In: Knowledge-based intelligent information and engineering systems. Lecture notes in computer science, vol 3683, pp 1049–1057
Dawei Z, Guanrong C, Wenbo L (2004) A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons Fractals 22(1):47–54
Ding S, Li C, Liu Z (2010) Protecting hidden transmission of biometrics using authentication watermarking. In: Proceeding of WASE International Conference on Information Engineering (ICIE) 2010, vol 2. Beidaihe, pp 105–108
Dugad R, Ratakonda K, Ahuja N (1998) A new wavelet-based scheme for watermarking images. In: Proceedings of IEEE international conference on image processing, 1998, vol 2. Chicago, pp 419–423
Fallahpour M, Megías D (2011) High capacity audio watermarking using the high frequency band of the wavelet domain. Multimed Tools Appl 52(2–3):485–498
Fouad M, El Saddik A, Petriu E (2010) Combining dwt and lsb watermarking to secure revocable iris templates. In: Proceddings of IEEE 10th international conference on Information Sciences Signal Processing and their Applications (ISSPA), 2010. Kuala Lumpur, pp 25–28
Fridrich J (2000) Visual hash for oblivious watermarking. In: Wong PW, Delp EJ (eds)SPIE international society for optics and photonics, security and watermarking of multimedia contents II, vol 3971. San Jose, pp 286–294
Ghouti L, Bouridane A, Ibrahim M K, Boussakta S (2006) Digital image watermarking using balanced multiwavelets. IEEE Trans Signal Process 54(4):1519–1536
Gunsel B, Uludag U, Murat Tekalp A (2002) Robust watermarking of fingerprint images. Pattern Recogn 35(12):2739–2747
Hassanien A E (2006) Hiding iris data for authentication of digital images using wavelet theory. Pattern Recogn Image Anal 16(4):637–643
Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441
Hong I, Kim I, Han SS (2001) A blind watermarking technique using wavelet transform. In: IEEE International Symposium on Industrial Electronics (ISIE), 2001, vol 3. Pusan, pp 1946–1950
Hsieh MS, Tseng DC, Huang YH (2001) Hiding digital watermarks using multiresolution wavelet transform. IEEE Trans Ind Electron 48(5):875–882
Hsu C T, Wu J L (1998) Multiresolution watermarking for digital images. IEEE Trans Circ Syst II Analog Digit Signal Process 45(8):1097–1101
Jain A K, Nandakumar K (2012) Biometric authentication: system security and user privacy. IEEE Comput 45(11):87–92
Jain AK, Uludag U (2003) Hiding biometric data. IEEE Trans Pattern Anal Mach Intell 25(11):1494–1498
Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20
Keyvanpour MR, Merrikh-Bayat F (2011) Robust dynamic block-based image watermarking in dwt domain. Procedia Comput Sci 3:238–242
Khan MK, Xie L, Zhang J (2007) Robust hiding of fingerprint-biometric data into audio signals. In: Advances in biometrics lecture notes in computer science, vol 4642, pp 702–712
Khan MK, Zhang J, Tian L (2007) Chaotic secure content-based hidden transmission of biometric templates. Chaos Solitons Fractals 32(5):1749–1759
Kim JR, Moon YS (1999) A robust wavelet-based digital watermarking using level-adaptive thresholding. In: Proceedings of IEEE International Conference on Image Processing (ICIP), 1999, vol 2. Kobe, pp 226–230
Kim T, Chung Y, Jung S, Moon D (2006) Secure remote fingerprint verification using dual watermarks. In: Digital rights management technologies, issues, challenges and systems. Lecture notes in computer science, vol 3919. Springer, pp 217–227
Kim Wg, Lee H (2009) Multimodal biometric image watermarking using two-stage integrity verification. Signal Process 89(12):2385–2399
Korus P, Białas J, Dziech A (2012) A new approach to high-capacity annotation watermarking based on digital fountain codes. Multimed Tools Appl 1–19. doi:10.1007/s11042-011-0986-8
Kougianos E, Mohanty SP, Mahapatra RN (2009) Hardware assisted watermarking for multimedia. Comput Electr Eng 35(2):339–358
Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87(7):1167–1180
Kundur D, Hatzinakos D (2004) Toward robust logo watermarking using multiresolution image fusion principles. IEEE Trans Multimedia 6(1):185–198
Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063
Li C, Wang Y, Liu L (2009) A biometric templates secure transmission method based on bi-layer watermarking and pki. In: IEEE international conference on multimedia information networking and security, 2009, MINES’09, vol 2. Hubei, pp 95–98
Li CT, Yang FM, Lee CS (2002) Oblivious fragile watermarking scheme for image authentication. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2002, vol 4. Orlando, pp IV–3445–IV–3448
Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 10(5):746–757
Lin WH, Wang YR, Horng SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11509–11516
Liu JL, Lou DC, Chang MC, Tso HK (2006) A robust watermarking scheme using self-reference image. Comput Stand Interfaces 28(3):356–367
Ma B, Wang Y, Li C, Zhang Z, Huang D (2013) Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking. Multimed Tools Appl 1–30. doi:10.1007/s11042-013-1372-5
Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Trans Image Process 10(4):643–649
Mohanty S P (2009) A secure digital camera architecture for integrated real-time digital rights management. J Syst Archit 55(10):468–480
Mohanty SP, Bhargava BK (2008) Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks. ACM Trans. Multimed Comput Commun Appl 5(2):12
Morimoto N (1999) Digital watermarking technology with practical applications. Informing Sci Spec Issue Multimed Informing Technol Part 1 2(4):107–111
Noore A, Singh R, Vatsa M, Houck MM (2007) Enhancing security of fingerprints through contextual biometric watermarking. Forensic Sci Int 169(2):188–194
Park KR, Jeong DS, Kang BJ, Lee EC (2007) A study on iris feature watermarking on face data, vol 4432
Parker KM, Fowler JE (2005) Redundant-wavelet watermarking with pixel-wise masking. In: IEEE International Conference on Image Processing, ICIP 2005, vol 2005, pp I685–I688
Podilchuk CI, Zeng W (1998) Image-adaptive watermarking using visual models. IEEE J Select Areas Commun 16(4):525–539
Prabhakar S, Pankanti S, Jain AK (2003) Biometric recognition: security and privacy concerns. IEEE Secur Priv 1(2):33–42
Qi M, Lu Y, Du N, Zhang Y, Wang C, Kong J (2010) A novel image hiding approach based on correlation analysis for secure multimodal biometrics. J Netw Comput Appl 33(3):247–257
Rani A, Raman B, Kumar S (2013) A robust watermarking scheme exploiting balanced neural tree for rightful ownership protection. Multimed Tools Appl 1–24. doi:10.1007/s11042-013-1528-3
Ratha NK, Connell JH, Bolle RM (2000) Secure data hiding in wavelet compressed fingerprint images. In: Proceedings of the 2000 ACM workshops on multimedia. ACM, USA, pp 127–130
Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634
Reddy AA, Chatterji BN (2005) A new wavelet based logo-watermarking scheme. Pattern Recogn Lett 26(7):1019–1027
Roy SD, Li X, Shoshan Y, Fish A, Yadid-Pecht O (2013) Hardware implementation of a digital watermarking system for video authentication. IEEE Trans Circ Syst Video Technol 22(2):289–301
Shejul AA, Kulkarni UL (2010) A dwt based approach for steganography using biometrics. In: IEEE international conference on Data Storage and Data Engineering (DSDE) 2010.Bangalore, pp 39–43
Soheili MR (2008) Redundant watermarking using wavelet packets. In: IEEE/ACS International Conference on Computer Systems and Applications, AICCSA. Doha, pp 591–598
Subramanyam A, Emmanuel S, Kankanhalli MS (2012) Robust watermarking of compressed and encrypted jpeg2000 images. IEEE Trans Multimed 14(3):703–716
Tay R, Havlicek J (2002) Image watermarking using wavelets. In: IEEE the 45th Midwest Symposium on Circuits and Systems, MWSCAS 2002, vol 3, pp III–258–III–261
Vatsa M, Singh R, Mitra P, Noore A (2004) Comparing robustness of watermarking algorithms on biometrics data. In: Workshop proceedings biometrics: challenges arising from theory to practice. Cambridge, pp 5–8
Vatsa M, Singh R, Noore A (2009) Feature based rdwt watermarking for multimodal biometric system. Image Vis Comput 27(3):293–304
Wang N, Men C (2013) Reversible fragile watermarking for locating tampered blocks in 2d vector maps. Multimed Tools Appl 67(3):709–739. doi:10.1007/s11042-012-1333-4
Wei Z, Qin P, Fu Y (1998) Perceptual digital watermark of images using wavelet transform. IEEE Trans Consumer Electron 44(4):1267–1272
Yang Hy, Wang Xy, Wang Cp (2012) A robust digital watermarking algorithm in undecimated discrete wavelet transform domain. Comput Electr Eng 39(3):893–906
Zebbiche K, Ghouti L, Khelifi F, Bouridane A (2006) Protecting fingerprint data using watermarking. In: First NASA/ESA conference on Adaptive Hardware and Systems, AHS 2006. Istanbul, pp 451–456
Zebbiche K, Khelifi F, Bouridane A (2008) An efficient watermarking technique for the protection of fingerprint images. EURASIP J Inf Secur 4:1–20. doi:10.1155/2008/918601
Zhang XD, Feng J, Lo KT (2003) Image watermarking using tree-based spatial-frequency feature of wavelet transform. J Vis Commun Image Represent 14(4):474–491
Acknowledgment
One of the authors, Himanshu Agarwal, acknowledges the University Grants Commission (UGC), of New Delhi, India for granting him a scholarship under the JRF scheme for his research.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Agarwal, H., Raman, B. & Venkat, I. Blind reliable invisible watermarking method in wavelet domain for face image watermark. Multimed Tools Appl 74, 6897–6935 (2015). https://doi.org/10.1007/s11042-014-1934-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-1934-1