skip to main content
10.1145/1774088.1774405acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Experimental study on the impact of robust watermarking on iris recognition accuracy

Published: 22 March 2010 Publication History

Abstract

Watermarking has been suggested as a means to improve security of biometric systems or to add additional functionalities to such systems. We experimentally investigate the impact of applying a set of blind robust watermarking schemes on the recognition performance of two iris recognition algorithms. We find that different watermarking schemes result in a very different amount of impact rendering the choice of a particular watermarking scheme an important issue to be considered in the investigated context.

References

[1]
P. Ambalakat. Security of biometric authentication systems. In Proceedings of The 21st Annual Computer Science Conference, Rensselaer at Hartford, Connecticut, USA, Apr. 2002.
[2]
M. Barni, F. Bartolini, and A. Piva. Improved wavelet-based watermarking through pixel-wise masking. IEEE Transactions on Image Processing, 10(5):783--791, May 2001.
[3]
N. Bartlow, N. Kalka, B. Cukic, and A. Ross. Protecting iris images through asymmetric digital watermarking. In IEEE Workshop on Automatic Identification Advanced Technologies, pages 192--197, West Virginia University, Morgantown, WV, USA, June 2007.
[4]
O. Bruyndonckx, J.-J. Quisquater, and B. M. Macq. Spatial method for copyright labeling of digital images. In Proceedings of the IEEE International Workshop on Nonlinear Signal and Image Processing, pages 456--459, Marmaras, Greece, 1995.
[5]
B. Bunsel, U. Uludag, and A. M. Tekalp. Robust watermarking of fingerprint images. Pattern Recognition Journal, 35(12):2739--2747, 2002.
[6]
J.-G. Cao, J. Fowler, and N. Younan. An image-adaptive watermark based on a redundant wavelet transform. In Proceedings of the IEEE International Conference on Image Processing (ICIP'01), Thessaloniki, Oct. 2001.
[7]
T.-S. Chen, J. Chen, and J.-G. Chen. A simple and efficient watermark technique based on JPEG2000 codec. ACM Multimedia Systems Journal, 10(1):16--26, June 2004.
[8]
R. Dugad, K. Ratakonda, and N. Ahuja. A new wavelet-based scheme for watermarking images. In Proceedings of the IEEE International Conference on Image Processing (ICIP'98), Chicago, IL, USA, Oct. 1998.
[9]
J.-B. Feng, I.-C. Lin, C.-S. Tsai, and Y.-P. Chu. Reversible watermarking: current status and key issues. International Journal on Network Security, 2(3):161--171, 2006.
[10]
A. Jain, A. Ross, and U. Uludag. Biometric template security: Challenges and solutions. In Proceedings of the 13th European Signal Processing Conference, EUSIPCO '05, Antalya, Turkey, Sept. 2005.
[11]
A. K. Jain and U. Uludag. Hiding fingerprint minutiae in images. In Proceedings of AutoID 2002, 3. Workshop on Automatic Identification Advanced Technologies, pages 97--102, Tarrytown, New York, USA, Mar. 2002.
[12]
M. Khan, L. Xie, and J. Zhang. Robust hiding of fingerprint-biometric data into audio signals. In Advances in Biometrics, volume 4642 of LNCS, pages 702--712, 2007.
[13]
T. Kim, Y. Chung, S. Jung, and D. Moon. Secure remote fingerprint verification using dual watermarks. In Digital Rights Management. Technologies, Issues, Challenges and Systems, volume 3919 of LNCS, pages 217--227, 2006.
[14]
E. Koch and J. Zhao. Towards robust and hidden image copyright labeling. In Proceedings of the IEEE International Workshop on Nonlinear Signal and Image Processing, pages 452--455, Marmaras, Greece, June 1995.
[15]
D. Kundur. Watermarking with diversity: Insights and implications. IEEE Multimedia, 8(4):46--52, Oct. 2001.
[16]
L. Ma, T. Tan, Y. Wang, and D. Zhang. Efficient iris recognition by characterizing key local variations. IEEE Transactions on Image Processing, 13:739--750, 2004.
[17]
P. Meerwald and A. Uhl. A survey of wavelet-domain watermarking algorithms. In P. W. Wong and E. J. Delp, editors, Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, volume 4314, San Jose, CA, USA, Jan. 2001. SPIE.
[18]
K. Park, D. Jeong, B. Kang, and E. Lee. A study on iris feature watermarking on face data. In ICANNGA '07: Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II, pages 415--423, Berlin, Heidelberg, 2007. Springer-Verlag.
[19]
O. G. Pla, E. T. Lin, and E. J. Delp. A wavelet watermarking algorithm based on a tree structure. In E. J. Delp and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306 of Proceedings of SPIE, pages 571--580, San Jose, CA, USA, Jan. 2004. SPIE.
[20]
U. Uludag, B. Gunsel, and M. Ballan. A spatial method for watermarking of fingerprint images. In Proceedings of the 1st International Workshop on Pattern Recognition in Information Systems, PRIS '01, pages 26--33, Setubal, Portugal, July 2001.
[21]
M. Vatsa, R. Singh, and A. Noore. Improving biometric recognition accuracy and robustness using DWT and SVM watermarking. IEICE Electronics Express, 2(12):362--367, 2005.
[22]
M. Vatsa, R. Singh, and A. Noore. Feature based RDWT watermarking for multimodal biometric system. Image and Vision Computing, 27(3):293--304, Feb. 2009.
[23]
G.-D. Wu and P.-H. Huang. Image watermarking using structure based wavelet tree quantization. In Proceedings of the 6th IEEE/ACIS International Conference on Computer and Information Science, 2007. ICIS 2007, pages 315--319. IEEE, July 2007.
[24]
L. Xie and G. R. Arce. Joint wavelet compression and authentication watermarking. In Proceedings of the IEEE International Conference on Image Processing (ICIP'98), Chicago, IL, USA, Oct. 1998.
[25]
K. Zebbiche, L. Ghouti, F. Khelifi, and A. Bouridane. Protecting fingerprint data using watermarking. In Proceedings of the 1st NASA/ESA Conference on Adaptive Hardware and Systems, AHS'06, pages 451--456, Istanbul, Turkey, June 2006.
[26]
K. Zebbiche and F. Khelifi. Region-based watermarking of biometric images: Case study in fingerprint images. International Journal of Digital Multimedia Broadcasting, 2008, Mar. 2008.
[27]
K. Zebbiche, F. Khelifi, and A. Bouridane. An efficient watermarking technique for the protection of fingerprint images. EURASIP Journal on Information Security, 2008, 2008.

Cited By

View all
  • (2019)Secure EEG-Based User Authentication System Integrated with Robust WatermarkingProceedings of the 10th International Symposium on Information and Communication Technology10.1145/3368926.3369708(242-247)Online publication date: 4-Dec-2019
  • (2017)Experimental Study on the Effects of Watermarking Techniques on EEG-Based Application System PerformanceNeural Information Processing10.1007/978-3-319-70136-3_70(662-671)Online publication date: 26-Oct-2017
  • (2015)Effects of Fragile and Semi-fragile Watermarking on Iris Recognition SystemDigital-Forensics and Watermarking10.1007/978-3-319-19321-2_13(174-186)Online publication date: 28-May-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing
March 2010
2712 pages
ISBN:9781605586397
DOI:10.1145/1774088
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. biometrics
  2. watermarking

Qualifiers

  • Research-article

Conference

SAC'10
Sponsor:
SAC'10: The 2010 ACM Symposium on Applied Computing
March 22 - 26, 2010
Sierre, Switzerland

Acceptance Rates

SAC '10 Paper Acceptance Rate 364 of 1,353 submissions, 27%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Secure EEG-Based User Authentication System Integrated with Robust WatermarkingProceedings of the 10th International Symposium on Information and Communication Technology10.1145/3368926.3369708(242-247)Online publication date: 4-Dec-2019
  • (2017)Experimental Study on the Effects of Watermarking Techniques on EEG-Based Application System PerformanceNeural Information Processing10.1007/978-3-319-70136-3_70(662-671)Online publication date: 26-Oct-2017
  • (2015)Effects of Fragile and Semi-fragile Watermarking on Iris Recognition SystemDigital-Forensics and Watermarking10.1007/978-3-319-19321-2_13(174-186)Online publication date: 28-May-2015
  • (2014)Generation of iris sensor PRNU fingerprints from uncorrelated data2nd International Workshop on Biometrics and Forensics10.1109/IWBF.2014.6914262(1-6)Online publication date: Mar-2014
  • (2012)Advanced Comparison Techniques for Challenging Iris ImagesIris Biometrics10.1007/978-1-4614-5571-4_9(141-169)Online publication date: 15-Sep-2012
  • (2012)Image Compression Impact on Iris RecognitionIris Biometrics10.1007/978-1-4614-5571-4_8(97-140)Online publication date: 15-Sep-2012
  • (2012)Experiments on Iris Image ProcessingIris Biometrics10.1007/978-1-4614-5571-4_7(85-95)Online publication date: 15-Sep-2012
  • (2012)Multi-stage Real-Time Iris PreprocessingIris Biometrics10.1007/978-1-4614-5571-4_6(75-83)Online publication date: 15-Sep-2012
  • (2012)Iris Segmentation MethodologiesIris Biometrics10.1007/978-1-4614-5571-4_5(49-73)Online publication date: 15-Sep-2012
  • (2012)Eye DetectionIris Biometrics10.1007/978-1-4614-5571-4_4(39-48)Online publication date: 15-Sep-2012
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media