Abstract
In this work, authors propose a novel scheme with commutative encryption and reversible watermarking for a fingerprint image. Due to commutative property one can embed and extract watermark in either plain or encrypted fingerprint image, irrespective of order in which encryption or watermarking is applied. The encryption and the watermarking keys are shared using secret key sharing mechanism. The biometric database consists of encrypted and watermarked fingerprint images. After successful authentication, watermarking is inverted to get back the plain fingerprint. The proposed scheme protects many of the vulnerable points of a biometric authentication system. Also native biometric authentication accuracy remains unaffected due to reversible watermarking. As per best of our knowledge, this is the first scheme to include homomorphism between encryption and reversible watermarking. Advantages of the proposed method compared to existing techniques are; (1) higher embedding capacity; (2) better peak signal to noise ratio for the decrypted marked image; (3) use of an optimal key length to preserve security while lowering computational cost; (4) simpler cryptographic key management; (5) smaller side information.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Fingerprint database: Fvc 2000 (2000). http://bias.csr.unibo.it/fvc2000/databases.asp
Fingerprint database: Fvc 2002 (2002). http://bias.csr.unibo.it/fvc2002/databases.asp
Fingerprint database: Fvc 2004 (2004). http://bias.csr.unibo.it/fvc2004/databases.asp
Unique identification authority of india - uidai (2012). http://uidai.gov.in/
Bartlow, N., Kalka, N., Cukic, B., Ross, A.: Protecting IRIS images through asymmetric digital watermarking. In: 2007 IEEE Workshop on Automatic Identification Advanced Technologies, pp. 192–197. IEEE (2007)
Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)
Huber, R., Stögner, H., Uhl, A.: Semi-fragile watermarking in biometric systems: template self-embedding. In: Real, P., Diaz-Pernil, D., Molina-Abril, H., Berciano, A., Kropatsch, W. (eds.) CAIP 2011, Part II. LNCS, vol. 6855, pp. 34–41. Springer, Heidelberg (2011)
Jain, A.K., Kumar, A.: Biometrics of next generation: An overview. Second Generation Biometrics (2010)
Joshi, V.B., Raval, M.S., Gupta, D., Rege, P.P., Parulkar, S.: A multiple reversible watermarking technique for fingerprint authentication. Multimedia Syst., 1–12 (2015)
Khan, M.K., Zhang, J.-S., Tian, L.: Protecting biometric data for personal identification. In: Li, S.Z., Lai, J.-H., Tan, T., Feng, G.-C., Wang, Y. (eds.) SINOBIOMETRICS 2004. LNCS, vol. 3338, pp. 629–638. Springer, Heidelberg (2004)
Li, C., Wang, Y., Ma, B., Zhang, Z.: Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimedia Tools Appl. 64(3), 757–776 (2013)
Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)
NSTC, Committee on Technology, Committee on Homeland, National Security, Subcommittee on Biometrics: Fingerprint recognition (2006). http://www.biometrics.gov/documents/fingerprintrec.pdf
Raval, M.S.: A secure steganographic technique for blind steganalysis resistance. In: Seventh International Conference on Advances in Pattern Recognition, 2009. ICAPR 2009, pp. 25–28. IEEE (2009)
Schmidt, G.: Relational mathematics, no. 132 in encyclopedia of mathematics and its applications (2010)
Wang, D.S., Li, J.P., Wen, X.Y.: Biometric image integrity authentication based on SVD and fragile watermarking. In: Congress on Image and Signal Processing, 2008. CISP 2008. vol. 5, pp. 679–682. IEEE (2008)
Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Sign. Process. 94, 118–127 (2014)
Zhang, X.: Reversible data hiding in encrypted image. Sign. Process. Lett. IEEE 18(4), 255–258 (2011)
Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)
Zhang, X.: Commutative reversible data hiding and encryption. Secur. Commun. Netw. 6(11), 1396–1403 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Joshi, V.B., Gupta, D., Raval, M.S. (2016). A Commutative Encryption and Reversible Watermarking for Fingerprint Image. In: Shi, YQ., Kim, H., Pérez-González, F., Echizen, I. (eds) Digital-Forensics and Watermarking. IWDW 2015. Lecture Notes in Computer Science(), vol 9569. Springer, Cham. https://doi.org/10.1007/978-3-319-31960-5_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-31960-5_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31959-9
Online ISBN: 978-3-319-31960-5
eBook Packages: Computer ScienceComputer Science (R0)