skip to main content
10.1145/1073170.1073195acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Composite signature based watermarking for fingerprint authentication

Published:01 August 2005Publication History

ABSTRACT

Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authentication, to biometrics to assist in forensic analysis. Using a signature extracted from the Fourier phase of the original image, we hide an encoded signature back into the original image forming a watermarked image. The hiding occurs in the Fourier transform frequency domain. The detection process computes the Fourier transform of the watermarked images, extracts the embedded signature and then correlates it with a calculated signature. Various correlation metrics determine the identity degree of biometric authentication. We show how a composite filter can be used in conjunction with Phasemark™ for robust authentication of fingerprints.

References

  1. William Stallings, Cryptography and Network Security-Principles and Practices, 3rd ed. Prentice Hall, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ingemar Cox, Jeffrey Bloom, Matthew Miller, Digital Watermarking: Principles & Practice, 2001, Morgan Kauffman Publishers, ISBN 1-55860-714-5, ch. 1--2.Google ScholarGoogle Scholar
  3. A. K. Jain, A. Ross and S. Prabhakar, "An Introduction to Biometric Recognition", IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, pp. 4--20, January 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A.K. Jain, L. Hong, S. Pankanti, and R. Bolle, "An identity-authentication system using fingerprints," Proc. of the IEEE, vol. 85, no. 9, 1365--1388, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Claus Vielhauer and Ralf Steinmetz, "Approaches to Biometric watermarks for owner authentification," Proc. SPIE, vol. 4314, pp. 645--651.Google ScholarGoogle Scholar
  6. U. Uludag, Sharath Pankanti, S. Prabhakar, and A. K. Jain, "Biometric Cryptosystems issues and Challenges," Proc. IEEE, vol. 92, no. 6, pp. 948--960, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  7. Farid Ahmed and Ira S. Moskowitz, "A Correlation-based Watermarking Method for Image Authentication Applications," Optical Engineering Journal, Aug 2004.Google ScholarGoogle Scholar
  8. B. Gunsel, U. Uludag, and A. M. Tekalp, "Robust Watermarking of Fingerprint Images," Pattern Recognition, vol. 35, no. 12, pp. 2739--2747, Dec 2002.Google ScholarGoogle ScholarCross RefCross Ref
  9. A. K. Jain, Umut Uludag, "Hiding Biometric Data," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 25, no. 11, pp. 1494--1498, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B.V.K. Vijayakumar, Marios Savvides, C. Xie, K. Venkatramani, and J. Thornton, "Using Composite Correlation Filters for Biometric Verification," Proc. SPIE, Vol. 5106, pp. 13--21, 2003.Google ScholarGoogle Scholar
  11. Farid Ahmed and M. A. Karim, "Binarized composite filter design using majority-granted nonlinearity," Computers and Electrical Engineering, Vol. 23, No. 5, pp.283--299 (1998).Google ScholarGoogle ScholarCross RefCross Ref
  12. Fingerprint Verification Competition http://bias.csr.unibo.it/fvc2004/download.asp FVC Fingerprint database.Google ScholarGoogle Scholar
  13. J. L. Horner and J. R. Leger, "Pattern Recognition with Binary phase-only filters," Appl. Opt., vol. 24, pp. 609--611, 1985.Google ScholarGoogle ScholarCross RefCross Ref
  14. Farid Ahmed and M. A. Karim, "A Filter-feature-based Rotation Invariant Joint Fourier Transform Correlator," Applied Optics, Vol. 34, No. 32, pp. 7556--7560 (1995).Google ScholarGoogle ScholarCross RefCross Ref
  15. Farid Ahmed and Ira S. Moskowitz, "Phase Signature-based Image Authentication Watermark Robust to Compression and Coding," Mathematics of Data/Image Coding, Compression, and Encryption VII, with Applications, ed. M.S. Schmalz, Proc. Of SPIE Vol. 5561, pp. 133--144, Denver, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  16. B.V.K. Vijay Kumar and L. Hassebrook, "Performance Measures for Correlation Filters," App Opt, Vol. 29, no. 20, pp. 2997--3006.Google ScholarGoogle Scholar

Index Terms

  1. Composite signature based watermarking for fingerprint authentication

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MM&Sec '05: Proceedings of the 7th workshop on Multimedia and security
        August 2005
        164 pages
        ISBN:1595930329
        DOI:10.1145/1073170

        Copyright © 2005 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 August 2005

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate128of318submissions,40%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader