skip to main content
10.1145/1774088.1774405acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Experimental study on the impact of robust watermarking on iris recognition accuracy

Published:22 March 2010Publication History

ABSTRACT

Watermarking has been suggested as a means to improve security of biometric systems or to add additional functionalities to such systems. We experimentally investigate the impact of applying a set of blind robust watermarking schemes on the recognition performance of two iris recognition algorithms. We find that different watermarking schemes result in a very different amount of impact rendering the choice of a particular watermarking scheme an important issue to be considered in the investigated context.

References

  1. P. Ambalakat. Security of biometric authentication systems. In Proceedings of The 21st Annual Computer Science Conference, Rensselaer at Hartford, Connecticut, USA, Apr. 2002.Google ScholarGoogle Scholar
  2. M. Barni, F. Bartolini, and A. Piva. Improved wavelet-based watermarking through pixel-wise masking. IEEE Transactions on Image Processing, 10(5):783--791, May 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. N. Bartlow, N. Kalka, B. Cukic, and A. Ross. Protecting iris images through asymmetric digital watermarking. In IEEE Workshop on Automatic Identification Advanced Technologies, pages 192--197, West Virginia University, Morgantown, WV, USA, June 2007.Google ScholarGoogle ScholarCross RefCross Ref
  4. O. Bruyndonckx, J.-J. Quisquater, and B. M. Macq. Spatial method for copyright labeling of digital images. In Proceedings of the IEEE International Workshop on Nonlinear Signal and Image Processing, pages 456--459, Marmaras, Greece, 1995.Google ScholarGoogle Scholar
  5. B. Bunsel, U. Uludag, and A. M. Tekalp. Robust watermarking of fingerprint images. Pattern Recognition Journal, 35(12):2739--2747, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  6. J.-G. Cao, J. Fowler, and N. Younan. An image-adaptive watermark based on a redundant wavelet transform. In Proceedings of the IEEE International Conference on Image Processing (ICIP'01), Thessaloniki, Oct. 2001.Google ScholarGoogle ScholarCross RefCross Ref
  7. T.-S. Chen, J. Chen, and J.-G. Chen. A simple and efficient watermark technique based on JPEG2000 codec. ACM Multimedia Systems Journal, 10(1):16--26, June 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Dugad, K. Ratakonda, and N. Ahuja. A new wavelet-based scheme for watermarking images. In Proceedings of the IEEE International Conference on Image Processing (ICIP'98), Chicago, IL, USA, Oct. 1998.Google ScholarGoogle ScholarCross RefCross Ref
  9. J.-B. Feng, I.-C. Lin, C.-S. Tsai, and Y.-P. Chu. Reversible watermarking: current status and key issues. International Journal on Network Security, 2(3):161--171, 2006.Google ScholarGoogle Scholar
  10. A. Jain, A. Ross, and U. Uludag. Biometric template security: Challenges and solutions. In Proceedings of the 13th European Signal Processing Conference, EUSIPCO '05, Antalya, Turkey, Sept. 2005.Google ScholarGoogle Scholar
  11. A. K. Jain and U. Uludag. Hiding fingerprint minutiae in images. In Proceedings of AutoID 2002, 3. Workshop on Automatic Identification Advanced Technologies, pages 97--102, Tarrytown, New York, USA, Mar. 2002.Google ScholarGoogle Scholar
  12. M. Khan, L. Xie, and J. Zhang. Robust hiding of fingerprint-biometric data into audio signals. In Advances in Biometrics, volume 4642 of LNCS, pages 702--712, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. T. Kim, Y. Chung, S. Jung, and D. Moon. Secure remote fingerprint verification using dual watermarks. In Digital Rights Management. Technologies, Issues, Challenges and Systems, volume 3919 of LNCS, pages 217--227, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. E. Koch and J. Zhao. Towards robust and hidden image copyright labeling. In Proceedings of the IEEE International Workshop on Nonlinear Signal and Image Processing, pages 452--455, Marmaras, Greece, June 1995.Google ScholarGoogle Scholar
  15. D. Kundur. Watermarking with diversity: Insights and implications. IEEE Multimedia, 8(4):46--52, Oct. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. Ma, T. Tan, Y. Wang, and D. Zhang. Efficient iris recognition by characterizing key local variations. IEEE Transactions on Image Processing, 13:739--750, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. Meerwald and A. Uhl. A survey of wavelet-domain watermarking algorithms. In P. W. Wong and E. J. Delp, editors, Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, volume 4314, San Jose, CA, USA, Jan. 2001. SPIE.Google ScholarGoogle ScholarCross RefCross Ref
  18. K. Park, D. Jeong, B. Kang, and E. Lee. A study on iris feature watermarking on face data. In ICANNGA '07: Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II, pages 415--423, Berlin, Heidelberg, 2007. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. O. G. Pla, E. T. Lin, and E. J. Delp. A wavelet watermarking algorithm based on a tree structure. In E. J. Delp and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306 of Proceedings of SPIE, pages 571--580, San Jose, CA, USA, Jan. 2004. SPIE.Google ScholarGoogle Scholar
  20. U. Uludag, B. Gunsel, and M. Ballan. A spatial method for watermarking of fingerprint images. In Proceedings of the 1st International Workshop on Pattern Recognition in Information Systems, PRIS '01, pages 26--33, Setubal, Portugal, July 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Vatsa, R. Singh, and A. Noore. Improving biometric recognition accuracy and robustness using DWT and SVM watermarking. IEICE Electronics Express, 2(12):362--367, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  22. M. Vatsa, R. Singh, and A. Noore. Feature based RDWT watermarking for multimodal biometric system. Image and Vision Computing, 27(3):293--304, Feb. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. G.-D. Wu and P.-H. Huang. Image watermarking using structure based wavelet tree quantization. In Proceedings of the 6th IEEE/ACIS International Conference on Computer and Information Science, 2007. ICIS 2007, pages 315--319. IEEE, July 2007.Google ScholarGoogle ScholarCross RefCross Ref
  24. L. Xie and G. R. Arce. Joint wavelet compression and authentication watermarking. In Proceedings of the IEEE International Conference on Image Processing (ICIP'98), Chicago, IL, USA, Oct. 1998.Google ScholarGoogle Scholar
  25. K. Zebbiche, L. Ghouti, F. Khelifi, and A. Bouridane. Protecting fingerprint data using watermarking. In Proceedings of the 1st NASA/ESA Conference on Adaptive Hardware and Systems, AHS'06, pages 451--456, Istanbul, Turkey, June 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. K. Zebbiche and F. Khelifi. Region-based watermarking of biometric images: Case study in fingerprint images. International Journal of Digital Multimedia Broadcasting, 2008, Mar. 2008.Google ScholarGoogle ScholarCross RefCross Ref
  27. K. Zebbiche, F. Khelifi, and A. Bouridane. An efficient watermarking technique for the protection of fingerprint images. EURASIP Journal on Information Security, 2008, 2008.Google ScholarGoogle Scholar

Index Terms

  1. Experimental study on the impact of robust watermarking on iris recognition accuracy

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing
            March 2010
            2712 pages
            ISBN:9781605586397
            DOI:10.1145/1774088

            Copyright © 2010 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 22 March 2010

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            SAC '10 Paper Acceptance Rate364of1,353submissions,27%Overall Acceptance Rate1,650of6,669submissions,25%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader