ABSTRACT
Watermarking has been suggested as a means to improve security of biometric systems or to add additional functionalities to such systems. We experimentally investigate the impact of applying a set of blind robust watermarking schemes on the recognition performance of two iris recognition algorithms. We find that different watermarking schemes result in a very different amount of impact rendering the choice of a particular watermarking scheme an important issue to be considered in the investigated context.
- P. Ambalakat. Security of biometric authentication systems. In Proceedings of The 21st Annual Computer Science Conference, Rensselaer at Hartford, Connecticut, USA, Apr. 2002.Google Scholar
- M. Barni, F. Bartolini, and A. Piva. Improved wavelet-based watermarking through pixel-wise masking. IEEE Transactions on Image Processing, 10(5):783--791, May 2001. Google ScholarDigital Library
- N. Bartlow, N. Kalka, B. Cukic, and A. Ross. Protecting iris images through asymmetric digital watermarking. In IEEE Workshop on Automatic Identification Advanced Technologies, pages 192--197, West Virginia University, Morgantown, WV, USA, June 2007.Google ScholarCross Ref
- O. Bruyndonckx, J.-J. Quisquater, and B. M. Macq. Spatial method for copyright labeling of digital images. In Proceedings of the IEEE International Workshop on Nonlinear Signal and Image Processing, pages 456--459, Marmaras, Greece, 1995.Google Scholar
- B. Bunsel, U. Uludag, and A. M. Tekalp. Robust watermarking of fingerprint images. Pattern Recognition Journal, 35(12):2739--2747, 2002.Google ScholarCross Ref
- J.-G. Cao, J. Fowler, and N. Younan. An image-adaptive watermark based on a redundant wavelet transform. In Proceedings of the IEEE International Conference on Image Processing (ICIP'01), Thessaloniki, Oct. 2001.Google ScholarCross Ref
- T.-S. Chen, J. Chen, and J.-G. Chen. A simple and efficient watermark technique based on JPEG2000 codec. ACM Multimedia Systems Journal, 10(1):16--26, June 2004.Google ScholarDigital Library
- R. Dugad, K. Ratakonda, and N. Ahuja. A new wavelet-based scheme for watermarking images. In Proceedings of the IEEE International Conference on Image Processing (ICIP'98), Chicago, IL, USA, Oct. 1998.Google ScholarCross Ref
- J.-B. Feng, I.-C. Lin, C.-S. Tsai, and Y.-P. Chu. Reversible watermarking: current status and key issues. International Journal on Network Security, 2(3):161--171, 2006.Google Scholar
- A. Jain, A. Ross, and U. Uludag. Biometric template security: Challenges and solutions. In Proceedings of the 13th European Signal Processing Conference, EUSIPCO '05, Antalya, Turkey, Sept. 2005.Google Scholar
- A. K. Jain and U. Uludag. Hiding fingerprint minutiae in images. In Proceedings of AutoID 2002, 3. Workshop on Automatic Identification Advanced Technologies, pages 97--102, Tarrytown, New York, USA, Mar. 2002.Google Scholar
- M. Khan, L. Xie, and J. Zhang. Robust hiding of fingerprint-biometric data into audio signals. In Advances in Biometrics, volume 4642 of LNCS, pages 702--712, 2007. Google ScholarDigital Library
- T. Kim, Y. Chung, S. Jung, and D. Moon. Secure remote fingerprint verification using dual watermarks. In Digital Rights Management. Technologies, Issues, Challenges and Systems, volume 3919 of LNCS, pages 217--227, 2006. Google ScholarDigital Library
- E. Koch and J. Zhao. Towards robust and hidden image copyright labeling. In Proceedings of the IEEE International Workshop on Nonlinear Signal and Image Processing, pages 452--455, Marmaras, Greece, June 1995.Google Scholar
- D. Kundur. Watermarking with diversity: Insights and implications. IEEE Multimedia, 8(4):46--52, Oct. 2001. Google ScholarDigital Library
- L. Ma, T. Tan, Y. Wang, and D. Zhang. Efficient iris recognition by characterizing key local variations. IEEE Transactions on Image Processing, 13:739--750, 2004. Google ScholarDigital Library
- P. Meerwald and A. Uhl. A survey of wavelet-domain watermarking algorithms. In P. W. Wong and E. J. Delp, editors, Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, volume 4314, San Jose, CA, USA, Jan. 2001. SPIE.Google ScholarCross Ref
- K. Park, D. Jeong, B. Kang, and E. Lee. A study on iris feature watermarking on face data. In ICANNGA '07: Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II, pages 415--423, Berlin, Heidelberg, 2007. Springer-Verlag. Google ScholarDigital Library
- O. G. Pla, E. T. Lin, and E. J. Delp. A wavelet watermarking algorithm based on a tree structure. In E. J. Delp and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306 of Proceedings of SPIE, pages 571--580, San Jose, CA, USA, Jan. 2004. SPIE.Google Scholar
- U. Uludag, B. Gunsel, and M. Ballan. A spatial method for watermarking of fingerprint images. In Proceedings of the 1st International Workshop on Pattern Recognition in Information Systems, PRIS '01, pages 26--33, Setubal, Portugal, July 2001. Google ScholarDigital Library
- M. Vatsa, R. Singh, and A. Noore. Improving biometric recognition accuracy and robustness using DWT and SVM watermarking. IEICE Electronics Express, 2(12):362--367, 2005.Google ScholarCross Ref
- M. Vatsa, R. Singh, and A. Noore. Feature based RDWT watermarking for multimodal biometric system. Image and Vision Computing, 27(3):293--304, Feb. 2009. Google ScholarDigital Library
- G.-D. Wu and P.-H. Huang. Image watermarking using structure based wavelet tree quantization. In Proceedings of the 6th IEEE/ACIS International Conference on Computer and Information Science, 2007. ICIS 2007, pages 315--319. IEEE, July 2007.Google ScholarCross Ref
- L. Xie and G. R. Arce. Joint wavelet compression and authentication watermarking. In Proceedings of the IEEE International Conference on Image Processing (ICIP'98), Chicago, IL, USA, Oct. 1998.Google Scholar
- K. Zebbiche, L. Ghouti, F. Khelifi, and A. Bouridane. Protecting fingerprint data using watermarking. In Proceedings of the 1st NASA/ESA Conference on Adaptive Hardware and Systems, AHS'06, pages 451--456, Istanbul, Turkey, June 2006. Google ScholarDigital Library
- K. Zebbiche and F. Khelifi. Region-based watermarking of biometric images: Case study in fingerprint images. International Journal of Digital Multimedia Broadcasting, 2008, Mar. 2008.Google ScholarCross Ref
- K. Zebbiche, F. Khelifi, and A. Bouridane. An efficient watermarking technique for the protection of fingerprint images. EURASIP Journal on Information Security, 2008, 2008.Google Scholar
Index Terms
- Experimental study on the impact of robust watermarking on iris recognition accuracy
Recommendations
Robust watermarking in iris recognition: application scenarios and impact on recognition performance
Watermarking has been suggested as a means to improve security of biometric systems. We discuss application scenarios for resolving various security issues in this context. As embedding watermarks changes biometric data, degraded recognition performance ...
Blind reliable invisible watermarking method in wavelet domain for face image watermark
In this paper, we have combined watermarking and biometrics for possible improvement in owner identification/verification technology. We have proposed and compared wavelet based four blind invisible watermarking methods that have used face image as ...
Visible watermarking with reversibility of multimedia images for ownership declarations
Digital watermarking technology is primarily the joining of the rightful owner of the protected media. Once the media are suspected to be illegally used, an open algorithm can be used to extract the digital watermark for the purpose of showing the media'...
Comments