Identification and authentication using visual cryptography based fingerprint watermarking over natural image
Tóm tắt
Protection of biometric data is gaining interest and hence digital watermarking techniques are one of the best ways to protect biometric data from accidental or intentional attacks. We have proposed fingerprint watermarking scheme over natural image based on visual cryptography for identification and authentication. The scheme does not embed the fingerprint directly onto the natural image instead using the concept of visual cryptography fingerprint is divided into parts called as shares. The verification share is generated at the time of fingerprint embedding process and while performing identification and authentication master share is generated. Fingerprint is extracted using these two shares. Correlation value between original fingerprint and extracted fingerprint is the deciding factor for identification and authentication. The experimental results show that the scheme is robust against various watermarking attacks.
Tài liệu tham khảo
Low CY, Teoh AB, Tee C (2009) Fusion of LSB and DWT biometric watermarking using offline handwritten signature for copyright protection. In: Proceedings of the third international conference on advances in biometrics, vol 5558. Lecture notes In computer science, pp 786–795
Ratha NK, Connell JH, Bolle RM (2000) Secure data hiding in wavelet compressed fingerprint images. In: Proceeding of the ACM multimedia workshops, Los Angeles, pp 127–130
Schaathun HG (2006) On watermarking/fingerprinting for copyright protection. In: Proceedings of the first international conference on innovative computing, information and control, vol 3. IEEE Computer Society, pp 50–53
Jain S (2000) Digital watermarking techniques: a case study in fingerprints and faces. In: Proceedings ICVGIP 2000, pp 139–144
Maiorana E, Campisi P, Neri A (2007) Biometric signature authentication using radon transform-based watermarking techniques. In: IEEE biometrics symposium, pp 1–6
Tzouveli P, Ntalianis K, Kollias S (2005) Human face watermarking based on zernike moments. In: Proceedings of the fifth IEEE international symposium on signal processing and information technology, pp 399–404
Ryoung K, Jeong DS, Kang BJ, Lee EC (2007) A study on iris feature watermarking on face data. In: Proceedings of the 8th international conference on adaptive and natural computing algorithms, part II, vol 4432. Lecture notes in computer science, pp 414–423
Lee Y, Kang HJ, Ki YH (2005) Copyright authentication enhancement of digital watermarking based on intelligent human visual system scheme, knowledge-based intelligent information and engineering systems. Intell Watermarking Algorithms Appl 3682:567–572
Coatrieux G, Lamard M, Daccache W, Puentes W, Roux C (2006) A low distorsion and reversible watermark: application to angiographic images of the retina. In: 27th annual international conference of the engineering in medicine and biology society, 2005 IEEE-EMBS, pp 2224–2227
Hou Y-C, Chen P-M (2000) An asymmetric watermarking scheme based on visual cryptography. Proc ICSP 2:992–995
Shamir A (1996) How to share a secret. Commun ACM 22:612–613
Naor M, Shamir A (1995) Visual cryptography: advances in cryptology—Eurocrypt’94. In: Proceeding, LNCS, vol 950. Springer-Verlag, pp 1–12
Naor M, Shamir A (1996) Visual cryptography II: improving the contrast via the cover base. Workshop on security protocols, Cambridge