Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(946.7KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Image Intrinsic Local Property
Mita C. Paunwala, Suparva Patnaik
Pages - 28 - 42     |    Revised - 01-05-2011     |    Published - 31-05-2011
Volume - 5   Issue - 2    |    Publication Date - May / June 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Biometric Watermarking, Fingerprint Matching, Image Manipulation, Security System, Edge Block Analysis
ABSTRACT
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
CITED BY (0)  
1 Google Scholar
2 Academic Index
3 CiteSeerX
4 refSeek
5 iSEEK
6 Libsearch
7 Bielefeld Academic Search Engine (BASE)
8 OpenJ-Gate
9 Scribd
10 WorldCat
11 SlideShare
12 PdfSR
1 N.K. Ratha, J.H. Connell, and R.M. Bolle, “An Analysis of Minutiae Matching Strength,” Proc. Third Int’l.Conf. Audio- and Video-Based Biometric Person Authentication, pp. 223-228, June 2001.
2 B. Schneier, “The Uses and Abuses of Biometrics,” Comm. ACM, vol. 42, no. 8, p. 136, Aug. 1999.
3 Yi Chen, “Extended Feature Set and Touchless Imaging for Fingerprint Matching”, Ph.D Theses, University of Michigan State, 2009.
4 Salil Prabhakar, “Fingerprint Classification and Matching Using a Filterbank”, Ph.D Theses, University of Michigan State, 2001.
5 Panyayot Chaikan, Montri Karnjanadecha, “The Use of Top-View Finger Image for Personal Identification” Proceedings of the 5th International IEEE Symposium on image and Signal Processing and Analysis, 343-346, Nov. 2007.
6 A. K. Jain D. Maltoni, D. Maio and S. Prabhakar. Handbook of Fingerprint Recognition. Springer, New York, 2003.
7 Ashourian, M.; Enteshary, R., “IEEE Conference on Convergent Technologies for Asia- Pacific Region”, TENCON, Vol. 1, pp 428-431, 2003.
8 B. Verma, S. Jain, D. P. Agarwal, and A. Phadikar, "A New color image watermarking scheme," Infocomp, Journal of computer science, vol. 5,N.2, pp. 37-42, 2006.
9 X. Wu and Z.-H. Guan, "A novel digital watermark algorithm based on chaotic maps," Physics Letters A, vol. 365, pp. 403-406, 2007.
10 Feng Yang, Lei Li, “An adaptive, SVM -based watermarking in frequency domain”, International Conference on Wavelet Analysis and Pattern Recognition, pp. 465 – 469, Hongkong, 30 sep., 2008.
11 L. Chun-Shien, H. Shih-Kun, S. Chwen-Jye, and L. Hong-Yuan Mark, "Cocktail watermarking for digital image protection," Multimedia, IEEE Transactions on, vol. 2, pp.209-224, 2000.
12 W. Lu, H. Lu, and F.L. Chung, "Robust digital image watermarking based on subsampling," Applied Mathematics and Computation, vol.181, pp. 886-893, 2006.
13 Wang-sheng Fang, Kang Chen, “A Wavelet Watermarking Based on HVS and Watermarking Capacity Analysis”, IEEE International Conference on Multimedia Information Networking and Security, pp. 141-144, Hubei, Dec., 2009.
14 Hongping Xu, Xiaoxia Wan, “International Conference on Computer Science and Software Engineering”, pp. 245- 248,Hubei, Dec., 2008.
15 Yanhong Zhang, “Blind watermark algorithm based on HVS and RBF neural network in DWT domain”, WSEAS Transactions on Computers, Volume 8, Issue 1, January 2009.
16 Nagar Abhishk, Nandkumar Karthik, Jain Anil k., “Biometric Template Transformation: a security analysis,” Proc. SPIE, the International Society for Optical Engineering, vol.7541, 2010.
17 Noore A., Singh R., Vatsa M. and Houck M.M., “ Enhancing Security of Fingerprints Through Contextual Biometric Watermarking”, Journal of Forensic Science International, Vol. 169, Issue 2, Pp. 188-194 ,July 2007.
18 S. Pankanti and M.M. Yeung, “Verification Watermarks on Fingerprint Recognition and Retrieval,” Proc. SPIE, vol. 3657, pp. 66-78, 1999.
19 Chander Kant, Ranjender Nath & Sheetal Chaudhary, “Biometrics Security using steganography”, International Journal of Security, Vol. 2 : Issue (1).
20 S. Jain, “Digital Watermarking Techniques: A Case Study in Fingerprints & Faces,” Indian Conf. Computer Vision, Graphics, and Image Processing, pp. 139-144, Dec. 2000.
21 B. Gunsel, U. Uludag, and A.M. Tekalp, “Robust Watermarking of Fingerprint Images,” Pattern Recognition, vol. 35, no. 12, pp. 2739-2747, Dec. 2002.
22 Yulin Wang , Alan Pearmain, “Blind image data hiding based on self reference” Pattern Recognition Letters 25, 1681–1689, 2004.
23 Hiller and Lieberman, “ Introduction to Operations Research,” Seventh edition, Tata McGraw-Hill, 2001.
24 Choi, Y., Aizawa, I., “Digital watermarking using interblock correlation”, In: Proc. Internat. Conf. on Image Processing, vol. 2, pp. 16–220, 24–28 October 1999.
25 J. Qi. and Y. Wang, "A robust fingerprint matching method", Pattern Recognition, vol. 35, pp.1655-1671, 2005.
26 X. Jiang, W.Y. Yau,” Fingerprint minutiae matching based on the local and global structures”, Proc. of the 15th International Conference on Pattern Recognition, vol. 2, pp. 1038–1041, 2000.
Dr. Mita C. Paunwala
- India
Professor Suparva Patnaik
- India
ssp@eced.svnit.ac.in