Buradasınız

An Improved Watermarking Algorithm for Hiding Biometric Data

Journal Name:

Publication Year:

Abstract (2. Language): 
This paper presents a novel watermarking algorithm for authentication based on fusion strategy of faces and fingerprint biometrics. The Discrete Wavelet Transform is used for embedding the minutiae data in face image of the same individual. The performance of the watermarking algorithm is experimentally validated and the results show that the extracting the minutiae data with no error is possible. Experimentation has been done using six different attacks. The results of the method reveal better resistance in comparison to the existence methods.

REFERENCES

References: 

[1] Jain A.K and Uludag U., “Hiding Biometric Data,” IEEE Transactions
on Pattern Analysis and Machine Intelligence, vol. 25, NO. 11, pp.
1494-1498, November 2003.
[2] [2] Pankanti S. and Yeung M.M., “Verification Watermarks on
fingerprint Recognition and Retrieval,” Proc. SPIE, vol. 3657, pp.66-78,
1999.
[3] [3] A.K. Jain, K.Nandakumar, and A.Nager, “Biometric Template
Security,” EURASIP Journal on Advances in Signal Processing, 2008,
pp. 1-17.
[4] [4] B.Gunsel, U.Uludaga and A.M. Tekalp, “Robust Watermarking of
Fingerprint Images,” Pattern Recognition, 35(12), 2002, pp. 2739-2747.
[5] [5] D. Kundur and D.Hatzinakos, “Digital Watermarking Using
Multiresolution Wavelet Decomposition,” International conference on
acoustic Speech and Signal Processing (ICASSP), Seattle, May.1999,
pp. 2969-2972.
[6] [6] F. Petitcolas, R. Anderson, and M. Kuhn, “Information hiding – A
survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, 1999.
[7] [7] Salah M. Rahal, Hatim A. Aboalssamh, Khalid N. Muteb,”
Multimodal Biometric Authentication System – MBAS,” 2nd IEEE
International Conf. On Communication & Technologies, April 24-28,
2006 Damascus, Syria.
[8] [8] A.K. Jain and U. Uludag, “Hiding Fingerprint Minutiae in
Images,” Proc. International Conference on Pattern Recognition, 3(3),
2002, pp. 756-759.
[9] [9] A. Abu-EErrub, A. Al-Haj, “Optimized DWT Based Image
Watermarking,” IEEE, 2008
[10] [10] J. Delaigle, C. De Vleeschouwer, B. Macq, “Psychovisual
Approach to Digital Picture Watermarking,” Journal of Electronic
Imaging, vol. 7, no. 3, pp. 628-640, 1998.
[11] [11] R.C. Gonzalez, R.E. Woods, Digital Image Processing, New
Jersey: Prentice Hall, Upper Saddle River, 2002.
[12] [12] C. V. Serdean, M. Tomlinson, J. Wade, A.M. Ambroze,
“Protecting Intellectual Rights: Digital Watermarking in the wavelet
domain,” IEEE Int. Workshop Trends and Recent Achievements in IT,
pp. 16-18, 2002.
[13] [13] R.safarbakhsh, S.zzaboli, A. Tabibiazar, “Digital Watermarking on
Still Images Using Wavelet Transform,” in Proc. International
Conference on Information Technology: Coding and Computing
ITCC’04,IEEE, 2004.
[14] [14] A. Graphs, “An Introduction to Wavelets,” IEEE Computational
Science and Engineering, vol. 2, no. 2, pp.50-61, 1995.
[15] [15] B.Furht, D. Kirovski, “Encryption and Authentications:
Techniques and Applications,” USA: Auerbach, 2006
[16] [16] R. K Chhotaray. K.B Shiva Kumar, K. B Raja and Sabyasachi
Pattanaik, “Bit length replacement steganography based on dct
coefficients,” International Journal of Engineering Science and
Technology, 2:3561-3570, 2010.
[17] [17] Chia-chen Lin, “High capacity data hiding scheme for dct-based
images,” Journal of Information Hiding and Multimeda Signal
Processing, 2010.
[18] [18] Ajit Danti and Preethi Acharya, “Randomized embedding scheme
based on dct coefficients for image steganography,” IJCA Special Issue
on Recent Trends in Image Processing and Pattern Recognition, 2010

Thank you for copying data from http://www.arastirmax.com