ABSTRACT
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authentication, to biometrics to assist in forensic analysis. Using a signature extracted from the Fourier phase of the original image, we hide an encoded signature back into the original image forming a watermarked image. The hiding occurs in the Fourier transform frequency domain. The detection process computes the Fourier transform of the watermarked images, extracts the embedded signature and then correlates it with a calculated signature. Various correlation metrics determine the identity degree of biometric authentication. We show how a composite filter can be used in conjunction with Phasemark™ for robust authentication of fingerprints.
- William Stallings, Cryptography and Network Security-Principles and Practices, 3rd ed. Prentice Hall, 2003. Google ScholarDigital Library
- Ingemar Cox, Jeffrey Bloom, Matthew Miller, Digital Watermarking: Principles & Practice, 2001, Morgan Kauffman Publishers, ISBN 1-55860-714-5, ch. 1--2.Google Scholar
- A. K. Jain, A. Ross and S. Prabhakar, "An Introduction to Biometric Recognition", IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, pp. 4--20, January 2004. Google ScholarDigital Library
- A.K. Jain, L. Hong, S. Pankanti, and R. Bolle, "An identity-authentication system using fingerprints," Proc. of the IEEE, vol. 85, no. 9, 1365--1388, 1997. Google ScholarDigital Library
- Claus Vielhauer and Ralf Steinmetz, "Approaches to Biometric watermarks for owner authentification," Proc. SPIE, vol. 4314, pp. 645--651.Google Scholar
- U. Uludag, Sharath Pankanti, S. Prabhakar, and A. K. Jain, "Biometric Cryptosystems issues and Challenges," Proc. IEEE, vol. 92, no. 6, pp. 948--960, 2004.Google ScholarCross Ref
- Farid Ahmed and Ira S. Moskowitz, "A Correlation-based Watermarking Method for Image Authentication Applications," Optical Engineering Journal, Aug 2004.Google Scholar
- B. Gunsel, U. Uludag, and A. M. Tekalp, "Robust Watermarking of Fingerprint Images," Pattern Recognition, vol. 35, no. 12, pp. 2739--2747, Dec 2002.Google ScholarCross Ref
- A. K. Jain, Umut Uludag, "Hiding Biometric Data," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 25, no. 11, pp. 1494--1498, 2003. Google ScholarDigital Library
- B.V.K. Vijayakumar, Marios Savvides, C. Xie, K. Venkatramani, and J. Thornton, "Using Composite Correlation Filters for Biometric Verification," Proc. SPIE, Vol. 5106, pp. 13--21, 2003.Google Scholar
- Farid Ahmed and M. A. Karim, "Binarized composite filter design using majority-granted nonlinearity," Computers and Electrical Engineering, Vol. 23, No. 5, pp.283--299 (1998).Google ScholarCross Ref
- Fingerprint Verification Competition http://bias.csr.unibo.it/fvc2004/download.asp FVC Fingerprint database.Google Scholar
- J. L. Horner and J. R. Leger, "Pattern Recognition with Binary phase-only filters," Appl. Opt., vol. 24, pp. 609--611, 1985.Google ScholarCross Ref
- Farid Ahmed and M. A. Karim, "A Filter-feature-based Rotation Invariant Joint Fourier Transform Correlator," Applied Optics, Vol. 34, No. 32, pp. 7556--7560 (1995).Google ScholarCross Ref
- Farid Ahmed and Ira S. Moskowitz, "Phase Signature-based Image Authentication Watermark Robust to Compression and Coding," Mathematics of Data/Image Coding, Compression, and Encryption VII, with Applications, ed. M.S. Schmalz, Proc. Of SPIE Vol. 5561, pp. 133--144, Denver, 2004.Google ScholarCross Ref
- B.V.K. Vijay Kumar and L. Hassebrook, "Performance Measures for Correlation Filters," App Opt, Vol. 29, no. 20, pp. 2997--3006.Google Scholar
Index Terms
- Composite signature based watermarking for fingerprint authentication
Recommendations
A watermarking-based image ownership and tampering authentication scheme
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is ...
A multiple reversible watermarking technique for fingerprint authentication
The classical fingerprint recognition system can be compromised at the database and the sensor. Therefore, to beef up security of the fingerprint recognition system, reversible watermarking is proposed to protect these two points. Reversible watermarks ...
A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image ...
Comments