Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(256.61KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Securing Biometric Images using Reversible Watermarking
Sabu m Thampi, Ann Jisma Jacob
Pages - 382 - 389     |    Revised - 01-09-2011     |    Published - 05-10-2011
Volume - 5   Issue - 4    |    Publication Date - September / October 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Biometric, SSIM Index, Reversible Watermarking, Difference Expansion
ABSTRACT
Biometric security is a fast growing area. Protecting biometric data is very important since it can be misused by attackers. In order to increase security of biometric data there are different methods in which watermarking is widely accepted. A more acceptable, new important development in this area is reversible watermarking in which the original image can be completely restored and the watermark can be retrieved. But reversible watermarking in biometrics is an understudied area. Reversible watermarking maintains high quality of biometric data. This paper proposes Rotational Replacement of LSB as a reversible watermarking scheme for biometric images. PSNR is the regular method used for quality measurement of biometric data. In this paper we also prove that SSIM Index can be used as a better alternate for effective quality assessment for reversible watermarked biometric data by comparing with the well known reversible watermarking scheme using Difference Expansion.
CITED BY (2)  
1 Amer, S. (2014, January). Capstone Experience with Watermarking. In Proceedings of the International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
2 Lili Zong, GU Qiao-lun, & high iron bars. (2012). Based on public key reversible watermarking. Journal of Computer Applications, 32 (4), 971-975.
1 Google Scholar 
2 CiteSeerX 
3 Scribd 
4 SlideShare 
5 PdfSR 
1 Z. Wang, A. Conrad, H. Rahim, and E. Simoncelli, “Image Quality Assessment: From Error Visibility to Structural Similarity,” IEEE Trans. Image Processing, Vol. 13, No. 4, April 2004.
2 J.M.Barton, “’Method and apparatus for embedding authentication information within digital data,’’ U.S.Patent 5 646 997.1997.
3 J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., Vol. 13, pp. 890–896, Aug.2003.
4 A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Trans. Image Process., Vol.13, no. 8, pp. 1147–1156, Aug. 2004.
5 [5] Multibiometric Authentication- An Overview of Recent Developments -Term Project CS574, Spring 2003, Available: http://www.ub-net.de on April 2010.
6 Ya-Hui Shiao, Tzong-Jer Chen, Keh-Shih Chuang, Cheng-Hsun Lin and Chun-Chao Chuang, “Quality of Compressed Medical Images,” Journal of Digital Imaging, Vol. 20, No. 2, 149-159, DOI: 10.1007/s10278-007-9013-z.
7 Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, and Yen-Ping Chu, “Reversible Watermarking: Current Status and Key Issues,” International Journal of Network Security, Vol.2, No.3, PP.161–171, May 2006.
8 Lixin Luo, Zhenyong Chen, Ming Chen, Xiao Zeng, and Zhang Xiong, “Reversible Image Watermarking Using Interpolation Technique,” IEEE Transactions on information forensics and security,Vol.5,No.1, March 2010.
Dr. Sabu m Thampi
rajagiri school of engineering and technology - India
sabu.thampi@iiitmk.ac.in
Mr. Ann Jisma Jacob
- India