Skip to main content

A Commutative Encryption and Reversible Watermarking for Fingerprint Image

  • Conference paper
  • First Online:
  • 1167 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9569))

Abstract

In this work, authors propose a novel scheme with commutative encryption and reversible watermarking for a fingerprint image. Due to commutative property one can embed and extract watermark in either plain or encrypted fingerprint image, irrespective of order in which encryption or watermarking is applied. The encryption and the watermarking keys are shared using secret key sharing mechanism. The biometric database consists of encrypted and watermarked fingerprint images. After successful authentication, watermarking is inverted to get back the plain fingerprint. The proposed scheme protects many of the vulnerable points of a biometric authentication system. Also native biometric authentication accuracy remains unaffected due to reversible watermarking. As per best of our knowledge, this is the first scheme to include homomorphism between encryption and reversible watermarking. Advantages of the proposed method compared to existing techniques are; (1) higher embedding capacity; (2) better peak signal to noise ratio for the decrypted marked image; (3) use of an optimal key length to preserve security while lowering computational cost; (4) simpler cryptographic key management; (5) smaller side information.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Fingerprint database: Fvc 2000 (2000). http://bias.csr.unibo.it/fvc2000/databases.asp

  2. Fingerprint database: Fvc 2002 (2002). http://bias.csr.unibo.it/fvc2002/databases.asp

  3. Fingerprint database: Fvc 2004 (2004). http://bias.csr.unibo.it/fvc2004/databases.asp

  4. Unique identification authority of india - uidai (2012). http://uidai.gov.in/

  5. Bartlow, N., Kalka, N., Cukic, B., Ross, A.: Protecting IRIS images through asymmetric digital watermarking. In: 2007 IEEE Workshop on Automatic Identification Advanced Technologies, pp. 192–197. IEEE (2007)

    Google Scholar 

  6. Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)

    Article  Google Scholar 

  7. Huber, R., Stögner, H., Uhl, A.: Semi-fragile watermarking in biometric systems: template self-embedding. In: Real, P., Diaz-Pernil, D., Molina-Abril, H., Berciano, A., Kropatsch, W. (eds.) CAIP 2011, Part II. LNCS, vol. 6855, pp. 34–41. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  8. Jain, A.K., Kumar, A.: Biometrics of next generation: An overview. Second Generation Biometrics (2010)

    Google Scholar 

  9. Joshi, V.B., Raval, M.S., Gupta, D., Rege, P.P., Parulkar, S.: A multiple reversible watermarking technique for fingerprint authentication. Multimedia Syst., 1–12 (2015)

    Google Scholar 

  10. Khan, M.K., Zhang, J.-S., Tian, L.: Protecting biometric data for personal identification. In: Li, S.Z., Lai, J.-H., Tan, T., Feng, G.-C., Wang, Y. (eds.) SINOBIOMETRICS 2004. LNCS, vol. 3338, pp. 629–638. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Li, C., Wang, Y., Ma, B., Zhang, Z.: Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimedia Tools Appl. 64(3), 757–776 (2013)

    Article  Google Scholar 

  12. Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)

    Article  Google Scholar 

  13. NSTC, Committee on Technology, Committee on Homeland, National Security, Subcommittee on Biometrics: Fingerprint recognition (2006). http://www.biometrics.gov/documents/fingerprintrec.pdf

  14. Raval, M.S.: A secure steganographic technique for blind steganalysis resistance. In: Seventh International Conference on Advances in Pattern Recognition, 2009. ICAPR 2009, pp. 25–28. IEEE (2009)

    Google Scholar 

  15. Schmidt, G.: Relational mathematics, no. 132 in encyclopedia of mathematics and its applications (2010)

    Google Scholar 

  16. Wang, D.S., Li, J.P., Wen, X.Y.: Biometric image integrity authentication based on SVD and fragile watermarking. In: Congress on Image and Signal Processing, 2008. CISP 2008. vol. 5, pp. 679–682. IEEE (2008)

    Google Scholar 

  17. Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Sign. Process. 94, 118–127 (2014)

    Article  Google Scholar 

  18. Zhang, X.: Reversible data hiding in encrypted image. Sign. Process. Lett. IEEE 18(4), 255–258 (2011)

    Article  Google Scholar 

  19. Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)

    Article  Google Scholar 

  20. Zhang, X.: Commutative reversible data hiding and encryption. Secur. Commun. Netw. 6(11), 1396–1403 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vaibhav B. Joshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Joshi, V.B., Gupta, D., Raval, M.S. (2016). A Commutative Encryption and Reversible Watermarking for Fingerprint Image. In: Shi, YQ., Kim, H., Pérez-González, F., Echizen, I. (eds) Digital-Forensics and Watermarking. IWDW 2015. Lecture Notes in Computer Science(), vol 9569. Springer, Cham. https://doi.org/10.1007/978-3-319-31960-5_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31960-5_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31959-9

  • Online ISBN: 978-3-319-31960-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics