Skip to main content

Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System

  • Conference paper
  • First Online:
  • 1294 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9023))

Abstract

Security is an important issue in biometric recognition systems. In recent years, many researchers proposed to use watermarking to improve the security of biometric systems, but some people concern whether the embedded watermarks will influence recognition results. In this paper, we investigate the effects of several fragile and semi-fragile watermarking methods on the iris recognition performance. Experimental results demonstrate that, even images are fully embedded, fragile watermarking methods nearly have no effects on the recognition performance, while semi-fragile watermarking methods which embed watermark in the visually important components of images have larger effects on the recognition performance than the semi-fragile watermarking methods that embed watermark in the visually unimportant components of images. And embedding parameters, such as embedding strength and watermark length, also have some influences on the recognition results.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25, 1494–1498 (2003)

    Google Scholar 

  2. Schneier, B.: The uses and abuses of biometrics. Commun. ACM 42(8), 136 (1999)

    Google Scholar 

  3. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)

    Google Scholar 

  4. Ratha, N.K., Connell, J.H., Bolle, R.M.: Secure data hiding in wavelet compressed fingerprint images. In: ACM Multimedia Conference, pp. 127–130 (2000)

    Google Scholar 

  5. Jain, A.K., Uludag, U.: Hiding Fingerprint Minutiae in Images. In: Proceedings of 3rd Workshop on Automatic Identification Advanced Technologies (2002)

    Google Scholar 

  6. Vatsa, M., Singh, R., Mitra, P., Noore, A.: Digital watermarking based secure multimodal biometric system. IEEE Int. Conf. Syst. Man Cybern. 3, 2983–2987 (2004)

    Google Scholar 

  7. Zebbiche, K., Ghouti, L., Khelifi, F., Bouridane, A.: Protecting fingerprint data using watermarking, In: First NASA/ESA Conference on Adaptive Hardware and Systems, AHS 2006. pp. 451–456, June 2006

    Google Scholar 

  8. Park, K.R., Jeong, D.S., Kang, B.J., Lee, E.C.: A study on iris feature watermarking on face data. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds.) ICANNGA 2007. LNCS, vol. 4432, pp. 415–423. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Hoang, T., Tran, D., Sharma, D.: Remote multimodal biometric authentication using bit priority-based fragile watermarking. In: International Conference on Pattern Recognition, pp. 1–4 (2008)

    Google Scholar 

  10. Kim, W., Lee, H.: Multimodal biometric image watermarking using two-stage integrity verification. Sig. Process. 89, 2385–2399 (2009)

    MATH  Google Scholar 

  11. Ma, B., Li, C., Wang, Y., Zhang, Z., Wang, Y.: Block pyramid based adaptive quantization watermarking for multimodal biometric authentication. In: International Conference on Pattern Recognition, pp. 1277–1280 (2010)

    Google Scholar 

  12. Wang, S., Hu, R., Yu, H., Zheng, X., Damper, R.I.: Augmenting remote multimodal person verification by embedding voice characteristics into face images. In: IEEE International Conference on Multimedia and Expo Workshops (ICMEW) 2013, pp. 1–6, July 2013

    Google Scholar 

  13. Hämmerle-Uhl, J., Raab, K., Uhl, A.: Watermarking as a means to enhance biometric systems: a critical survey. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 238–254. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  14. H\(\ddot{a}\)mmerle-Uhl, J., Raab, K., Uhl, A.: Experimental study on the impact of robust watermarking on iris recognition accuracy. In: ACM Symposium on Applied Computing, pp. 1479–1484 (2010)

    Google Scholar 

  15. Hämmerle-Uhl, J., Raab, K., Uhl, A.: Attack against robust watermarking-based multimodal biometric recognition systems. In: Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C., Fairhurst, M.C. (eds.) BioID 2011. LNCS, vol. 6583, pp. 25–36. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  16. Ma, B., Li, C., Zhang, Z., Wang, Y.: Biometric information hiding: promoting multimedia security with content and identity authentication. In: IEEE China Summit International Conference on Signal and Information Processing (ChinaSIP), 2013, pp. 442–446, July 2013

    Google Scholar 

  17. Dong,. J., Tan, T.: Effects of watermarking on iris recognition performance. In: 10th International Conference on Control, Automation, Robotics and Vision, 2008. ICARCV 2008. pp. 1156–1161, Dec 2008

    Google Scholar 

  18. Iris Recognition Technology. http://en.techshino.com/tech/detail.html?id=3. Accessed on June 2014

  19. Sun, Z., Tan, T.: Ordinal Measures for Iris Recognition. IEEE Trans. Pattern Anal. Mach. Intell. 31(12), 2211–2226 (2009)

    Google Scholar 

  20. University of Bath Iris Image Database (2009). http://www.bath.ac.uk/elec-eng/pages/sipg/irisweb/

  21. Chinese Academy of Sciences Institute of Automation. http://biometrics.idealtest.org/dbDetailForUser.do?id=4. Accessed on June 2014

  22. Iris Challenge Evaluation (2009). http://iris.nist.gov/ice/

  23. Wang, L., Sun, Z., Tan, T.: Robust regularized feature selection for iris recognition via linear programming. In: 21st International Conference on Pattern Recognition (ICPR), 2012, pp. 3358–3361, 11–15 November 2012

    Google Scholar 

  24. Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: International Conference on Image Processing, pp. 680–683 (1997)

    Google Scholar 

  25. Lin, C.-Y., Chang, S.-F.: Semifragile watermarking for authenticating JPEG visual content. Storage and Retrieval for Image and Video Databases 3971, 140–151 (2000)

    Google Scholar 

  26. Zhu, Y., Li, C.-T., Zhao, H.-J.: Structural digital signature and semi-fragile fingerprinting for image authentication in wavelet domain (2007)

    Google Scholar 

  27. Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22, 187–200 (2011)

    Google Scholar 

  28. Inoue, H., Miyazaki, A., Katsura, T.: A digital watermark for images using the wavelet transform. Integr. Comput. C Aided Eng. 7(2), 105–115 (2000)

    Google Scholar 

  29. Sun, R., Sun, H., Yao, T.: A SVD and quantization based semi-fragile watermarking technique for image authentication. In: International Conference on Signal Processing Proceedings (2002)

    Google Scholar 

Download references

Acknowledgments

This work is funded by the National Basic Research Program of China (Grant No. 2012CB316300), the National Nature Science Foundation of China (Grant No.61303262), and the National Key Technology R&D Program (Grant No.2012BAH04F02).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Dong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wang, Z., Dong, J., Wang, W., Tan, T. (2015). Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19321-2_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19320-5

  • Online ISBN: 978-3-319-19321-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics