Abstract
Personnel identification by ID images is the main authentication source of the security system. For multiple authentication unique biometric authentication features like finger print, signature and personal identification marks can also be used. Instead of sending these features additionally, they can be embedded in the personal ID images itself. In this paper we propose an algorithm for image fusion for personal ID image using blind and zero watermarking. By using the secret key the embedded information can be extracted. Experimental result shows that the algorithm is robust against various attacks like JPEG compression and few image processing methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Somasundaram, K., Palaniappan, N.: Adaptive Low Bit Rate Facial Feature Enhanced Residual Image Coding Method Using SPIHT for Compressing Personal ID Images. International Journal of Electronics and Communications (2010) (in Press)
Hsieh, M., Tseng, D., Huang, Y.: Hiding Digital Watermarks Using Multiresolution Wavelet Transform. IEEE Transactions on Industrial Electronics 48-5, 875–882 (2001)
Tseng, H., Hsieh, C.: A Robust Watermarking Scheme for Digital Images Using Self Reference. In: Huang, X., Chen, Y., Ao, S. (eds.) Advances in Communication Systems and Electrical Engineering. LNEE, vol. 4, pp. 479–495. Springer, Heidelberg (2008)
Potdar, V.M., Han, S., Chang, E.: A Survey of Digital Image Watermarking Techniques. In: 3rd IEEE International Conference on Industrial Informatics, pp. 709–716 (2005)
Noore, A., Singh, R., Vatsa, M., Houck, M.M.: Enhancing Security of Fingerprints through contextual biometric watermarking. Elsevier – Forensic Science International 169-2, 188–194 (2007)
Liu, J., Lou, D., Chang, M., Tso, H.: A Robust Watermarking Scheme Using Self-reference Image. Elsevier Computer Standards & Interfaces 28-3, 356–367 (2006)
ISO/IEC 19794-5, Information Technology – Biometric Data Interchange Formats, Part 5: Face Image data
Jain, V., Mukherjee, A.: The Indian Face Database (2002), http://vis-www.cs.umass.edu/~vidit/IndianFaceDatabase/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Somasundaram, K., Palaniappan, N. (2011). Cryptographic Image Fusion for Personal ID Image Authentication. In: Balasubramaniam, P. (eds) Control, Computation and Information Systems. ICLICC 2011. Communications in Computer and Information Science, vol 140. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19263-0_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-19263-0_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19262-3
Online ISBN: 978-3-642-19263-0
eBook Packages: Computer ScienceComputer Science (R0)