Protecting Biometric Templates with Image Watermarking Techniques

  • Nikos Komninos
  • Tassos Dimitriou
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4642)


Biometric templates are subject to modifications for identity fraud especially when they are stored in databases. In this paper, a new approach to protecting biometric templates with image watermarking techniques is proposed. The novelty of this approach is that we have combined lattice and block-wise image watermarking techniques to maintain image quality along with cryptographic techniques to embed fingerprint templates into facial images and vice-versa. Thus, protecting them from being modified.


Biometric templates fingerprints face pictures authentication watermarking 


  1. 1.
    Brunelli, R., Poggio, T.: Face recognition: features versus templates. IEEE Trans. On Pattern Analysis and Machine Intelligence 15, 1042–1052 (1993)CrossRefGoogle Scholar
  2. 2.
    Jain, A.K., Uludag, U.: Hiding Fingerprint Minutiae in Images. In: AutoID. Proc. Automatic Identification Advanced Technologies, New York, pp. 97–102 (March 14-15, 2002)Google Scholar
  3. 3.
    Jain, A.K., Uludag, U., Hsu, R.-L.: Hiding a face in a fingerprint image. In: ICPR. Proc. International Conference on Pattern Recognition, Canada (August 11-15, 2002)Google Scholar
  4. 4.
    Kung, S.Y., Mak, M.W., Lin, S.H.: Biometric Authentication: A Machine Learning Approach. Prentice Hall Information and System Sciences Series (2005)Google Scholar
  5. 5.
    Lucilla, C.F., Astrid, M., Markus, F., Claus, V., Ralf, S., Edward, D.J.: Biometric Authentication for ID cards with hologram watermarks. In: SPIE 2002. Proc. Security and Watermarking of Multimedia Contents, vol. 4675, pp. 629–640 (2002)Google Scholar
  6. 6.
    Peticolas, F., Anderson, R., Kuhn, M.: Information hiding – a survey. IEEE Proceedings 87(7), 1062–1078 (1999)CrossRefGoogle Scholar
  7. 7.
    Wong, P.H.W., Au, O.C., Yueng, Y.M.: Novel blind watermarking technique for images. IEEE Trans. On Circuits and Systems for Video Technology 13(8), 813–830 (2003)CrossRefGoogle Scholar
  8. 8.
    Hao, F., Anderson, R., Daugman, J.: Combining Crypto with Biometrics Effectively. IEEE Transaction on Computers 55(9), 1081–1088 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Nikos Komninos
    • 1
  • Tassos Dimitriou
    • 1
  1. 1.Athens Information Technology, GR-19002 Peania AttikiGreece

Personalised recommendations