Skip to main content
Log in

Multi-block dependency based fragile watermarking scheme for fingerprint images protection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

For traditional fragile watermarking schemes, isolated-block tamper which will destroy the minutiae of the fingerprint image can hardly be efficiently detected. In this paper, we propose a multi-block dependency based fragile watermarking scheme to overcome this shortcoming. The images are split into image blocks with size of 8 × 8; a 64-bit watermark is generated for each image block, and then equally partitioned into eight parts. Each part of the watermark is embedded into another image block which is selected by the corresponding secret key. Theoretic analysis and experimental results demonstrate that the proposed method not only can detect and localize the isolated-block tamper on fingerprint images with high detection probability and low false detection probability, but also enhances the systematic security obviously.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Ahmed AF, Selvanadin KB (2008) Fingerprint reference verification method using a phase encoding based watermarking technique. J Electron Imaging 17:1–9

    Article  Google Scholar 

  2. Anthony TS, Zhu XZ, Shen J (2008) Fragile Watermarking based on encoding of the zeroes of the Z-Transform. IEEE Trans Inf Forensics Security 3(3):567–569

    Article  Google Scholar 

  3. Celik M, Sharma G, Saber E (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11:585–595

    Article  Google Scholar 

  4. Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27:439–446

    Article  Google Scholar 

  5. Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36:1300–1307

    Article  Google Scholar 

  6. Deguillaume F, Voloshynovskiy S (2003) Secure hybrid robust watermarking resistant against tampering and copy attack. Signal Process 83:2133–2170

    Article  MATH  Google Scholar 

  7. Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J Electron Imaging 11:262–274

    Article  Google Scholar 

  8. He HJ, Zhang JS, Tai HM (2008) Digital watermarking scheme exploiting nondeterministic dependence for image authentication. IHW 5284:147–160

    Google Scholar 

  9. He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89:1557–1566

    Article  MATH  Google Scholar 

  10. He HJ, Zhang JS, Tai HM (2009) Self-recovery fragile watermarking using block-neighborhood tampering characterization. IHW 5806:132–145

    Google Scholar 

  11. He HJ, Zhang JS, Tai HM (2010) A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization. Multimed Tools Appl 1:1–18

    Google Scholar 

  12. Holliman H, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9:432–441

    Article  Google Scholar 

  13. Li CT, Yuan Y (2006) Block-chain based fragile watermarking scheme with superior localization. Opt Eng 45:1–6

    Google Scholar 

  14. Liu SH, Yao HX, Gao W, Liu YL (2007) An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl Math Comput 185:869–882

    Article  MATH  Google Scholar 

  15. Noore A, Singh R, Vatsa M, Houck M (2007) Enhancing security of fingerprints through contextual biometric watermarking. Forensic Sci Int 169:188–194

    Article  Google Scholar 

  16. Ohkita K, Yoshida M, Kitamura I, Fujiwara T (2009) Improving capability of locating tampered pixels of statistical fragile watermarking. In: Proceedings of the 8th international workshop on digital watermarking, vol 5703, pp 279–293

  17. Ratha NK, Villanueva MAF, Connell JH, Bolle RM (2004) A secure protocol for data hiding in compressed fingerprint images. Lect Notes Comput Sci 3087:205–216

    Article  Google Scholar 

  18. Suthaharan S (2004) Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn Lett 25:1893–1903

    Article  Google Scholar 

  19. Tsai YJ, Venu GJ (2005) A minutia-based partial fingerprint recognition system. Pattern Recogn 38:1672–1684

    Article  Google Scholar 

  20. Wong P (1998) A public key watermark for image verification and authentication. In: Proc Int Conf Image Processing 1:455–459

  21. Wu JH, Bin B, Zhu BB, Li SP, Lin FZ (2004) Efficient oracle attacks on Yeung–Mintzer and variant authentication schemes. In: IEEE international conference on multimedia & Expo (ICME), pp 931–934

  22. Yeung MM, Pankanti S (1999) Verification watermarks on fingerprint recognition and retrieval. In: Proc. of SPIE conference on security and watermarking of multimedia contents, San Jose, pp 66–78

  23. Yu M, He HJ, Zhang JS (2007) A digital authentication watermarking scheme for JPEG images with superior localization and security. Sci China F Inf Sci 50:491–509

    Article  MathSciNet  MATH  Google Scholar 

  24. Zebbiche AK, Khelifi F, Bouridane A (2008) An efficient watermarking technique for the protection of fingerprint images. In: EURASIP journal on information security, pp 1–20

  25. Zhang XP, Wang SZ (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process Lett 14:727–730

    Article  Google Scholar 

  26. Zhang J, Tian L, Tai HM (2004) A new watermarking method based on chaotic maps. In: Proc. IEEE ICME’04, vol 89, pp 157–163

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (No. 60873158), the National Basic Research Program of China (No. 2010CB 327902), the Fundamental Research Funds for the Central Universities, and the Opening Funding of the State Key Laboratory of Virtual Reality Technology and Systems.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunlei Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, C., Wang, Y., Ma, B. et al. Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimed Tools Appl 64, 757–776 (2013). https://doi.org/10.1007/s11042-011-0974-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-011-0974-z

Keywords

Navigation