Skip to main content

Advertisement

Log in

Biometric template protection with DCT-based watermarking

  • Original Paper
  • Published:
Machine Vision and Applications Aims and scope Submit manuscript

Abstract

In this paper we have addressed a solution of two big issues in design of multimodal system: template protection and fusion strategy. A robust biometric watermarking algorithm is proposed for biometric template protection. The fingerprint feature vector and iris features are used as watermark. Proposed DCT-based watermarking technique embeds watermark in low-frequency AC coefficients of selected 8 \(\times \) 8 DCT smoother blocks. Blocks are classified based on human visual system. The robustness of the proposed algorithm is compared with the few state-of-art literature when watermarked image is subjected to possible channel attacks. Decision level fusion strategy is used to improve the overall performance of multimodal system. That is achieved by conditionally limiting the threshold of the fingerprint system to a maximum value, obtained by projecting 50 % of the cross over error rate on to the FRR curve of the iris system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Jain, A., Pankanti, S., Bolle, R. (eds.) : BIOMETRICS: Personal Identification in Networked Society. Kluwer, New York (1999)

  2. Ribaric, S., Ribaric, D., Pavesic, N.: Multimodal biometric user-identification system for network-based applications. IEE Proc. Vision Image Signal Process. 150(6), 409–416 (2003)

    Article  Google Scholar 

  3. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Berlin (2003)

    MATH  Google Scholar 

  4. Uludag, U., Jain, A. K.: Attacks on biometric systems: a case study in fingerprints. In: Proceedings of SPIE, Security, Seganography and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622–633, (San Jose, CA), (2004)

  5. Ratha, N.K., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Proceedings of Third International Conference on Audio and Video Based Biometric Person Authentication, pp. 223–228 (2001)

  6. Jain, A.K., Uludag, U.: Hiding fingerprint minutiae in images. In: Proceedings of Third Workshop on Automatic Identification Advanced Technologies (AutoID), pp. 97–102 (2002)

  7. Preda, R.O., Vizireanu, D.N.: Robust wavelet-based video watermarking scheme for copyright protection using the human visual system. J. Electron. Imaging 20(1), 013022–013022-8 (2011)

    Google Scholar 

  8. Preda, R.O., Vizireanu, N.D.: Quantisation-based video watermarking in the wavelet domain with spatial and temporal redundancy. Int. J. Electron. 98(3), 393–405 (2011)

    Article  Google Scholar 

  9. Bhatnagar, G., Raman, B.: Wavelet packet transform based robust video watermarking technique. Sadhana Acad. Proc. Eng. Sci. (Springer) 37(3), 371–388 (2012)

    Google Scholar 

  10. Mansouri, A., Mahmoudi Aznaveh, A., Torkamani Azar, F: Secure digital image watermarking based on SVD-DCT. In: 13th International CSI Advances in Computer Science and Engineering, vol. 6, pp. 645–652 (2009)

  11. Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Trans Pattern Anal Mach Intell 25(11), 1494–1498 (2003)

    Article  Google Scholar 

  12. Vatsa, M., Singh, R., Noore, A.: Improving biometric recognition accuracy and robustness using DWT and SVM watermarking. IEICE Electron. Express 2(12), 362–367 (2005)

    Article  Google Scholar 

  13. Vatsa, M., Singh, R., Noore, A., Houck, M.M., Morris, K.: Robust biometric image watermarking for fingerprint and face template protection. IEICE Electron. Express 3(2), 23–28 (2006)

    Article  Google Scholar 

  14. Ratha, N.K., Connell, J.H., Bolle, R.M.: Secure data hiding in wavelet compressed fingerprint images. In: International Multimedia Conference, Proceedings of the 2000 ACM workshop on Multimedia, pp. 127–130 (2000)

  15. Jain, A.K., Uludag, U., Hsu, R.-L.: Hiding a face in a fingerprint image. Proc. Int. Conf. Pattern Recognit. 3, 756–759 (2002)

    Google Scholar 

  16. Noore, A., Singh, R., Vatsa, M., Houck, M.M.: Enhancing security of fingerprints through contextual biometric watermarking. J. Forensic Sci. Int. 169(2), 188–194 (2007)

    Article  Google Scholar 

  17. Komninos, N., Dimitriou, T.: Protecting biometric templates with image watermarking technique. In: International Conference on, Biometrics 2007, LNCS4642, pp. 114–123 (2007)

  18. Al-Assam, H., Sellahewa, H., Jassim, S.A.: Lightweight approach for biometric template protection. Proc. SPIE. 7351, 73510 (2009)

    Article  Google Scholar 

  19. Nagar, A., Nandkumar, K., Jain, A.K.: Biometric template transformation: a security analysis. In: Proceedings of SPIE the International Society for Optical Engineering, vol. 7541 (2010)

  20. Paunwala, M., Patanik, S.: Robust biometric watermarking using image intrinsic local property for e-database applications. In: IASTED International Conference on Computer Vision, Canada, vol. 1–3, pp. 240–247 (2011)

  21. Patel, H.M., Modi, C.K., Paunwala, M., Patnaik, S.: Human identification by partial iris segmentation using pupil circle growing based on binary integrated edge intensity curve. In: IEEE International Conference on Communication Systems and Network Technologies (CSNT-2011), vol. 1–3, pp. 333–338 (2011)

  22. Daugman, J.G.: High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell. 15(11), 1148–1161 (1993)

    Article  Google Scholar 

  23. Ng, T.W., Tay, T.L., Khor, S.W.: Iris recognition using rapid haar wavelet decomposition. In: 2nd International Conference on Signal Processing Systems (ICSPS) 1, 820–823 (2010)

  24. Pennebaker, W.B., Mitchell, J.L.: JPEG-Still Image Data Compression Standard. International Thomsan Publishing, Newyork (1993)

    Google Scholar 

  25. Hiller, F.S., Lieberman, G.J.: Introduction to Operations Research, 7th edn. Tata McGraw-Hill, India (2001)

  26. http://bias.csr.unibo.it/fvc2004/download.asp. Accessed 4 July 2013

  27. http://biometrics.idealtest.org/findTotalDbByMode.do?mode=Iris. Accessed 4 July 2013

  28. Wang, Y., Pearmain, A.: Blind image data hiding based on self reference. Pattern Recognit. Lett. 25, 1681–1689 (2004)

    Article  Google Scholar 

  29. Choi, Y., Aizawa, I.: Digital watermarking using inter block correlation. In: Proceedings of International Conference on Image Processing, vol. 2, pp. 216–220, 24–28 (1999)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mita Paunwala.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Paunwala, M., Patnaik, S. Biometric template protection with DCT-based watermarking. Machine Vision and Applications 25, 263–275 (2014). https://doi.org/10.1007/s00138-013-0533-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00138-013-0533-x

Keywords

Navigation