Skip to main content

Cryptographic Image Fusion for Personal ID Image Authentication

  • Conference paper
Control, Computation and Information Systems (ICLICC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 140))

  • 1122 Accesses

Abstract

Personnel identification by ID images is the main authentication source of the security system. For multiple authentication unique biometric authentication features like finger print, signature and personal identification marks can also be used. Instead of sending these features additionally, they can be embedded in the personal ID images itself. In this paper we propose an algorithm for image fusion for personal ID image using blind and zero watermarking. By using the secret key the embedded information can be extracted. Experimental result shows that the algorithm is robust against various attacks like JPEG compression and few image processing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Somasundaram, K., Palaniappan, N.: Adaptive Low Bit Rate Facial Feature Enhanced Residual Image Coding Method Using SPIHT for Compressing Personal ID Images. International Journal of Electronics and Communications (2010) (in Press)

    Google Scholar 

  2. Hsieh, M., Tseng, D., Huang, Y.: Hiding Digital Watermarks Using Multiresolution Wavelet Transform. IEEE Transactions on Industrial Electronics 48-5, 875–882 (2001)

    Article  Google Scholar 

  3. Tseng, H., Hsieh, C.: A Robust Watermarking Scheme for Digital Images Using Self Reference. In: Huang, X., Chen, Y., Ao, S. (eds.) Advances in Communication Systems and Electrical Engineering. LNEE, vol. 4, pp. 479–495. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Potdar, V.M., Han, S., Chang, E.: A Survey of Digital Image Watermarking Techniques. In: 3rd IEEE International Conference on Industrial Informatics, pp. 709–716 (2005)

    Google Scholar 

  5. Noore, A., Singh, R., Vatsa, M., Houck, M.M.: Enhancing Security of Fingerprints through contextual biometric watermarking. Elsevier – Forensic Science International 169-2, 188–194 (2007)

    Article  Google Scholar 

  6. Liu, J., Lou, D., Chang, M., Tso, H.: A Robust Watermarking Scheme Using Self-reference Image. Elsevier Computer Standards & Interfaces 28-3, 356–367 (2006)

    Article  Google Scholar 

  7. ISO/IEC 19794-5, Information Technology – Biometric Data Interchange Formats, Part 5: Face Image data

    Google Scholar 

  8. Jain, V., Mukherjee, A.: The Indian Face Database (2002), http://vis-www.cs.umass.edu/~vidit/IndianFaceDatabase/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Somasundaram, K., Palaniappan, N. (2011). Cryptographic Image Fusion for Personal ID Image Authentication. In: Balasubramaniam, P. (eds) Control, Computation and Information Systems. ICLICC 2011. Communications in Computer and Information Science, vol 140. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19263-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19263-0_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19262-3

  • Online ISBN: 978-3-642-19263-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics