Skip to main content
Log in

A robust technique for biometric image authentication using invisible watermarking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the present digital era, the number of ways to misuse multimedia data increases day by day. The availability of high image editing tools can change the image so it becomes challenging to predict the data. Watermarking is one of the techniques which can protect the identity of users. This is a highly secured method to protect digital images. In the presented paper, we suggested a more robust image watermarking approach using DWT-SVD with Chaotic encryption. This work mainly focuses on the protection of biometric images. The entropy map (blocks of 4 × 4) is estimated to apply for 2D discrete wavelet transformation (DWT). The LL band is considered for the watermark embedding process because of holding more information about the original image. Further, an orthogonal matrix is obtained using (Singular value decomposition) SVD and edge entropy-based thresholding is used. The chaotic encryption is performed over a watermark image. The encrypted form of copyright image is used to embed into that orthogonal matrix for performing watermarking. The results evaluated using fingerprints and gait biometrics datasets show the robustness of the proposed approach. The performance of the technique is evaluated using BER, PSNR and NC. The watermark is less fragile after testing under various noise and geometrical attacks. The technique’s performance is also compared with recent techniques in this domain, where the proposed method outperforms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Abraham J, Paul V (2019) An imperceptible spatial domain color image watermarking scheme. J King Saud Univ – Comput Inf Sci 31(1):125–133

  2. Aggarwal A, Alshehri M, Kumar M, Sharma P, Alfarraj O, Deep V (2021) Principal component analysis, hidden Markov model, and artificial neural network inspired techniques to recognize faces. Concurr Comput Pract Exper 33(9):e6157 

  3. Ahmadi M, Norouzi A, Karimi N, Samavi S, Emami A (2020) ReDMark: Framework for residual diffusion watermarking based on deep networks. Expert Syst Appl 146:113157

  4. Alshoura WH, Zainol Z, Teh JS, Alawida M (2020) A new chaotic image watermarking scheme based on SVD and IWT. In: IEEE, Malaysia

  5. Anand A, Singh AK (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152(2020):72–80

    Article  Google Scholar 

  6. Arora M, Khurana M (2020) Secure image encryption technique based on jigsaw transform and chaotic scrambling using digital image watermarking. Springer Science + Business Media, LLC, part of Springer Nature 2020, Berlin

  7. Arumugham S, Rajagopalan S, Rayappan JBB, Amirtharajan R (2019) Tamper-resistant secure medical image carrier: An IWT–SVD–Chaos–FPGA Combination. King Fahd University of Petroleum & Minerals 2019

  8. Asikuzzaman M, Alam MJ, Lambert AJ,. M, Pickering R (2016) Robust DT CWT based DIBR 3D video watermarking using chrominance embedding. In: IEEE

  9. Aggarwal A, Kumar M (2021) Image surface texture analysis and classification using deep learning,. Multimed Tools Appl 80:1289–1309

    Article  Google Scholar 

  10. Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano-Miyatake M, Perez-Meana H (2020) Improving the management of medical imaging by using robust and secure dual watermarking. Biomed Signal Process Control 56:101695

    Article  Google Scholar 

  11. Chinese Academy of Sciences Institute of Automation, Database CASIA-Fingerprint V5, [Online]. Available: http://biometric.idealtest.org/. Accessed 12 July 2021

  12. Das S, Sunaniya AK, Maity R, Maity NP (2020) Parallel hardware implementation of efficient embedding bit rate control based contrast mapping algorithm for reversible invisible watermarking. IEEE Access 8:69072–69095

    Article  Google Scholar 

  13. Ernawan F, Kabir MN. A block-based RDWT-SVD image watermarking method using human visual system charactertics. Springer, Berlin

  14. Ernawan F, Kabir MN (2018) A robust image watermarking technique with an optimal DCT-psychovisual threshold. In: IEEE, Malaysia

  15. Hemdan EE-D (2020) An efficient and robust watermarking approach based on single value decompression, multi-level DWT, and wavelet fusion with scrambled medical images. Multimed Tools Appl 80(2021):1749–1777

    Google Scholar 

  16. Hosny KM, Darwish MM, Li K, Salah A (2018) Parallel multi-core CPU and GPU for fast and robust medical image watermarking. In: IEEE

  17. Hurrah NN, Parah SA, Sheikh JA (2019) A secure medical image watermarking technique for E-healthcare applications. Springer Nature Switzerland AG 2019, Cham

  18. Jia Y, Yin Z, Zhang X, Luo Y (2019) Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Process 163:238–246

  19. Kaggle (2019) 1000 Fundus images with 39 categories. [Online]. Available: https://www.kaggle.com/linchundan/fundusimage1000. Accessed Jan 2021

  20. Khare P, Srivastava VK (2020) A secured and robust medical image watermarking approach for protecting integrity of medical images. Wiley, New Delhi

  21. Kumar M, Hensman A (2013) Robust Digital Video Watermarking using Reversible Data Hiding and Visual Cryptography. In: 24th IET Irish Signals and Systems Conference (ISSC 2013), Letterkenny, Ireland

  22. Kumar M, Sriastava S, Hensman A (2016) A hybrid novel approach of video watermarking. Int J Signal Process Image Process Pattern Recognit 9(10):395–406

    Google Scholar 

  23. Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876–19897

    Article  Google Scholar 

  24. Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and Robust Digital Image Watermarking using Coefficient Differencing and Chaotic Encryption. In: IEEE

  25. Malik S, Reddlapalli RK (2018) Histogram and entropy based digital image watermarking scheme. Bharati Vidyapeeth’s Institute of Computer Applications and Management, New Delhi

  26. Nasrullah N, Sang J, Mateen M, Akbar MA, Xiang H, Xia X (2019) Reversible data hiding in compressed and encrypted images by using Kd-tree. Springer Science + Business Media, LLC, part of Springer Nature 2019, Berlin

  27. Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2015) Information hiding in medical images: a robust medical. In: Springer, New York

  28. Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy.  Signal Process 138:280–293

  29. Sabbane F, Tairi H (2019) Medical image watermarking technique based on polynomial decomposition. Springer Science + Business Media, LLC, part of Springer Nature 2019, Berlin

  30. Saha C, Hossain MF (2019) MRI watermarking technique using chaotic maps, NSCT and DCT. In: International Conference on Electrical, Computer and Communication Engineering (ECCE)

  31. Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible image watermarking in DWT–DCT–SVD domain. Natl Acad Sci Lett 37(2014):351–358

    Article  Google Scholar 

  32. Singh S, Singh R, Singh AK, Siddiqui TJ (2017) SVD-DCT based medical image watermarking in NSCT domain. In: Springer International Publishing, New York

  33. Su Q, Chen B (2017) Robust color image watermarking technique in the spatial domain. In: Springer-Verlag Berlin Heidelberg, Berlin

  34. Swaraja K, Meenakshi K, Kora P (2019) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. In: Biomedical Signal Processing and Control, India

  35. Tarif EB, Wibowo S, Wasimi S, Tareef A (2017) A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system. Multimed Tools Appl 77:2485–2503

    Article  Google Scholar 

  36. Thakkar FN,. V, Srivastava K (2016) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. In: Springer Science + Business Media, New York

  37. Thakur S, Singh AK, Ghrera SP, Mohan A (2018) Chaotic based secure watermarking approach for medical images. Multimed Tools Appl (Springer) 79:4263–4276

    Article  Google Scholar 

  38. Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT–DCT. Eng Sci Technol Int J 20(4):1366–1379

  39. Velazquez-Garcia L, Cedillo-Hernandez A, Cedillo-Hernandez M, Nakano-Miyatake M, Perez-Meana H (2022) Imperceptible–visible watermarking for copyright protection of digital videos based on temporal codes,. Sig Process Image Commun 102:116593

    Article  Google Scholar 

  40. Vo PH, Nguyen TS, Huynh VT, Vo TC, Do TN (2019) Secure and robust watermarking scheme in frequency domain using chaotic logistic map encoding. Springer Nature Switzerland AG 2020, Cham

  41. Wang B, Ding J, Wen Q, Liao X, Liu C (2009). An image watermarking algorithm based on DWT DCT and SVD. In 2009 IEEE International Conference on Network Infrastructure and Digital Content pp 1034–1038

  42. Wang Y, Luo Y, Wang Z, Pan H (2021) A hidden DCT-based invisible watermarking method for low-cost hardware implementations. Electronics 10(2):1465

    Article  Google Scholar 

  43. Xia Z, Wang X, Zhou W, Li R, Wang C, Zhang C (2019) Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms. Signal Process 157:108–118

  44. Xionga L, Donga D (2019) Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion. J Inf Secur Appl 47:78–85.

  45. Ye G, Jiao K, Pan C, Huang X (2018) An effective framework for chaotic image encryption based on 3D logistic map. Secur Commun Netw. https://doi.org/10.1155/2018/8402578

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Payal Garg.

Ethics declarations

Conflict of interest

The authors have no conflict of interest.

Competing interests

No competent interest applicable.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Garg, P., Jain, A. A robust technique for biometric image authentication using invisible watermarking. Multimed Tools Appl 82, 2237–2253 (2023). https://doi.org/10.1007/s11042-022-13314-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13314-z

Keywords

Navigation