Watermarking as a Means to Enhance Biometric Systems: A Critical Survey

  • Jutta Hämmerle-Uhl
  • Karl Raab
  • Andreas Uhl
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6958)


Watermarking is discussed as possible means to enhance biometric systems. Application scenarios for the employment of watermarks as found in literature are discussed and analysed with respect to required watermark properties, possible attacks, and eventual (cryptographic) alternatives.


Recognition Performance Watermark Scheme Biometric Data Biometric System Iris Recognition 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ahmad, S., Lu, Z.-M.: A joint biometrics and watermarking based framework for fingerprinting, copyright protection, proof of ownership, and security applications. In: Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007), pp. 676–679 (2007)Google Scholar
  2. 2.
    Ahmed, F., Moskowitz, I.S.: Composite signature based watermarking for fingerprint authentication. In: Proceedings of the ACM Workshop on Multimedia and Security (MMSEC 2005), pp. 799–802 (2005)Google Scholar
  3. 3.
    Bartlow, N., Kalka, N., Cukic, B., Ross, A.: Protecting iris images through asymmetric digital watermarking. In: IEEE Workshop on Automatic Identification Advanced Technologies, vol. 4432, pp. 192–197. West Virginia University, Morgantown (2007)CrossRefGoogle Scholar
  4. 4.
    Blythe, P., Fridrich, J.: Secure digital camera. In: Digital Forensic Research Workshop, Baltimore, MD, USA (August 2004)Google Scholar
  5. 5.
    Chung, Y., Moon, D., Moon, K., Pan, S.: Hiding biometric data for secure transmission. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1049–1057. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Ding, S., Li, C., Liu, Z.: Protecting hidden transmission of biometrics using authentication watermarking. In: Proceedings of the 2010 WASE International Conference on Information Engineering (ICIE), pp. 105–108 (2010)Google Scholar
  7. 7.
    Dong, J., Tan, T.: Effects of watermarking on iris recognition performance. In: Proceedings of the 10th International Conference on Control, Automation, Robotics and Vision (ICARCV 2008), pp. 1156–1161 (2008)Google Scholar
  8. 8.
    Feng, J.-B., Lin, I.-C., Tsai, C.-S., Chu, Y.-P.: Reversible watermarking: current status and key issues. International Journal on Network Security 2(3), 161–171 (2006)Google Scholar
  9. 9.
    Gunsel, B., Uludag, U., Tekalp, A.M.: Robust watermarking of fingerprint images. Pattern Recognition Journal 35(12), 2739–2747 (2002)CrossRefzbMATHGoogle Scholar
  10. 10.
    Hämmerle-Uhl, J., Raab, K., Uhl, A.: Experimental study on the impact of robust watermarking on iris recognition accuracy (best paper award, applications track). In: Proceedings of the 25th ACM Symposium on Applied Computing, pp. 1479–1484 (2010)Google Scholar
  11. 11.
    Hämmerle-Uhl, J., Raab, K., Uhl, A.: Attack against Robust Watermarking-Based Multimodal Biometric Recognition Systems. In: Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C., Fairhurst, M.C. (eds.) BioID 2011. LNCS, vol. 6583, pp. 25–36. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  12. 12.
    Hassanien, A.E., Abraham, A., Grosan, C.: Spiking neural network and wavelets for hiding iris data in digital images. Soft Computing - A Fusion of Foundations, Methodologies and Applications 13(4), 401–416 (2008)Google Scholar
  13. 13.
    Hoang, T., Tran, D., Sharma, D.: Remote multimodal biometric authentication using bit priority-based fragile watermarking. In: Proceedings of the 19th International Conference on Pattern Recognition, Tampa, Florida, USA, pp. 1–4 (December 2008)Google Scholar
  14. 14.
    Hong, S., Kim, H., Lee, S., Chung, Y.: Analyzing the secure and energy efficient transmissions of compressed fingerprint images using encryption and watermarking. In: Proceedings of the 2008 International Conference on Information Security and Assurance, pp. 316–320 (2008)Google Scholar
  15. 15.
    Hui, L., Yu-ping, H.: Wavelet tree quantization-based biometric watermarking for offline handwritten signature. In: Proceedings of the 2009 International Asia Symposium on Intelligent Interaction and Affective Computing, pp. 71–74 (2009)Google Scholar
  16. 16.
    Jain, A.K., Uludag, U.: Hiding fingerprint minutiae in images. In: Proceedings of AutoID 2002, 3rd Workshop on Automatic Identification Advanced Technologies, Tarrytown, New York, USA, pp. 97–102 (March 2002)Google Scholar
  17. 17.
    Jain, A.K., Ross, A., Uludag, U.: Biometric template security: Challenges and solutions. In: Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005, Antalya, Turkey (September 2005)Google Scholar
  18. 18.
    Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 1494–1498 (2003)CrossRefGoogle Scholar
  19. 19.
    Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP Journal on Advances in Signal Processing, 1–17 (2008)Google Scholar
  20. 20.
    Khan, M.K., Xie, L., Zhang, J.S.: Robust hiding of fingerprint-biometric data into audio signals. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 702–712. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  21. 21.
    Kim, W.-G., Lee, H.K.: Multimodal biometric image watermarking using two-stage integrity verification. Signal Processing 89(12), 2385–2399 (2009)CrossRefzbMATHGoogle Scholar
  22. 22.
    Kim, W.-G., Lee, S.H., Seo, Y.-S.: Image Fingerprinting Scheme for Print-and-Capture Model. In: Zhuang, Y.-t., Yang, S.-Q., Rui, Y., He, Q. (eds.) PCM 2006. LNCS, vol. 4261, pp. 106–113. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  23. 23.
    Komninos, N., Dimitriou, T.: Protecting biometric templates with image watermarking techniques. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 114–123. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  24. 24.
    Kundur, D., Hatzinakos, D.: Digital watermarking using multiresolution wavelet decomposition. In: Proceedings of the 1998 International Conference on Acoustics, Speech and Signal Processing (ICASSP 1998), Seattle, WA, USA, vol. 5, pp. 2969–2972 (May 1998)Google Scholar
  25. 25.
    Kutter, M., Jordan, F., Bossen, F.: Digital signature of color images using amplitude modulation. In: Sethi, I.K., Jain, R.C. (eds.) Proceedings of the SPIE Conference on Storage and Retrieval for Image and Video Databases, San Jose, USA, vol. 2952, pp. 518–526 (1997)Google Scholar
  26. 26.
    Lang, A., Dittmann, J.: Digital watermarking of biometric speech references: impact to the eer system performance. In: Delp, E.J., Wong, P.W. (eds.) Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, p. 650513 (2007)Google Scholar
  27. 27.
    Lee, H., Lim, J., Yu, S., Kim, S., Lee, S.: Biometric image authentication using watermarking. In: Proceedings of the International Joint Conference SICE-ICASE 2006, pp. 3950–3953 (2006)Google Scholar
  28. 28.
    Li, C., Ma, B., Wang, Y., Zhang, Z.: Protecting biometric templates using authentication watermarking. In: Qiu, G., Lam, K.M., Kiya, H., Xue, X.-Y., Kuo, C.-C.J., Lew, M.S. (eds.) PCM 2010. LNCS, vol. 6297, pp. 709–718. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  29. 29.
    Low, C.-Y., Teoh, A.B.-J., Tee, C.: Fusion of LSB and DWT Biometric Watermarking Using Offline Handwritten Signature for Copyright Protection. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 786–795. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  30. 30.
    Maiorana, E., Campisi, P., Neri, A.: Biometric signature authentication using radon transform-based watermarking techniques. In: Proceedings of the 2007 Biometrics Symposium (2007)Google Scholar
  31. 31.
    Moon, D., Kim, T., Jung, S.-H., Chung, Y., Moon, K., Ahn, D., Kim, S.K.: Performance evaluation of watermarking techniques for secure multimodal biometric systems. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005 part II. LNCS (LNAI), vol. 3802, pp. 635–642. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  32. 32.
    Motwani, R.C., Harris, F.C., Bekris, K.E.: A proposed digital rights management system for 3d graphics using biometric watermarks. In: Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference CCNC 2010, pp. 1075–1080 (2010)Google Scholar
  33. 33.
    Noore, A., Singh, R., Vatsa, M., Houck, M.M.: Enhancing security of fingerprints through contextual biometric watermarking. Forensic Science International 169, 188–194 (2007)CrossRefGoogle Scholar
  34. 34.
    Park, K.R., Jeong, D.S., Kang, B.J., Lee, E.C.: A Study on Iris Feature Watermarking on Face Data. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds.) ICANNGA 2007. LNCS, vol. 4432, pp. 415–423. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  35. 35.
    Qi, M., Lu, Y., Du, N., Zhang, Y., Wang, C., Kong, J.: A novel image hiding approach based on correlation analysis for secure multimodal biometrics. Journal of Network and Computer Applications 33(3), 247–257 (2010)CrossRefGoogle Scholar
  36. 36.
    Rajibul, M.I., Shohel, M.S., Andrews, S.: Biometric template protection using watermarking with hidden password encryption. In: Proceedings of the International Symposium on Information Technology 2008 (ITSIM 2008), pp. 296–303 (2008)Google Scholar
  37. 37.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: Secure data hiding in wavelet compressed fingerprint images. In: ACM Multimedia 2000, Los Angeles, CA, USA (November 2000)Google Scholar
  38. 38.
    Ratha, N.K., Figueroa-Villanueva, M.A., Connell, J.H., Bolle, R.M.: A secure protocol for data hiding in compressed fingerprint images. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 205–216. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  39. 39.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3), 614–634 (2001)CrossRefGoogle Scholar
  40. 40.
    Roberts, C.: Biometric attack vectors and defenses. Computers & Security 26, 14–25 (2007)CrossRefGoogle Scholar
  41. 41.
    Satonaka, T.: Biometric watermark authentication with multiple verification rule. In: Proceedings of the 12th IEEE Workshop on Neural Networks in Signal Processing, pp. 597–606 (2002)Google Scholar
  42. 42.
    Uludag, U., Gunsel, B., Ballan, M.: A spatial method for watermarking of fingerprint images. In: Proceedings of the 1st International Workshop on Pattern Recognition in Information Systems, PRIS 2001, Setubal, Portugal, pp. 26–33 (July 2001)Google Scholar
  43. 43.
    Vatsa, M., Singh, R., Noore, A.: Improving biometric recognition accuracy and robustness using DWT and SVM watermarking. IEICE Electronics Express 2(12), 362–367 (2005)CrossRefGoogle Scholar
  44. 44.
    Vatsa, M., Singh, R., Noore, A.: Feature based RDWT watermarking for multimodal biometric system. Image and Vision Computing 27(3), 293–304 (2009)CrossRefGoogle Scholar
  45. 45.
    Vatsa, M., Singh, R., Noore, A., Houck, M.M., Morris, K.: Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 3(2), 23–28 (2006)CrossRefGoogle Scholar
  46. 46.
    Vielhauer, C., Steinmetz, R.: Approaches to biometric watermarks for owner authentification. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, vol. 4314 (January 2001)Google Scholar
  47. 47.
    Wang, D.-S., Li, J.-P., Hu, D.-K., Yan, Y.-H.: A novel biometric image integrity authentication using fragile watermarking and Arnold transform. In: Li, J.P., Bloshanskii, I., Ni, L.M., Pandey, S.S., Yang, S.X. (eds.) Proceedings of the International Conference on Information Computing and Automatation, pp. 799–802 (2007)Google Scholar
  48. 48.
    Yeung, M.M., Pankanti, S.: Verification watermarks on fingerprint recognition and retrieval. Journal of Electronal Imaging, Special Issue on Image Security and Digital Watermarking 9(4), 468–476 (2000)Google Scholar
  49. 49.
    Zebbiche, K., Ghouti, L., Khelifi, F., Bouridane, A.: Protecting fingerprint data using watermarking. In: Proceedings of the 1st NASA/ESA Conference on Adaptive Hardware and Systems, AHS 2006, Istanbul, Turkey, pp. 451–456 (June 2006)Google Scholar
  50. 50.
    Zebbiche, K., Khelifi, F.: Region-based watermarking of biometric images: Case study in fingerprint images. International Journal of Digital Multimedia Broadcasting (March 2008)Google Scholar
  51. 51.
    Zebbiche, K., Khelifi, F., Bouridane, A.: An efficient watermarking technique for the protection of fingerprint images. EURASIP Journal on Information Security (February 2008)Google Scholar
  52. 52.
    Zeitz, C., Scheidat, T., Dittmann, J., Vielhauer, C.: Security issues of internet-based biometric authentication systems: risks of man-in-the-middle and BioPhishing on the example of BioWebAuth. In: Delp, E.J., Wong, P.W., Dittmann, J., Nemon, N.D. (eds.) Proceedings of SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, pp. 0R-1 –0R12, (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Jutta Hämmerle-Uhl
    • 1
  • Karl Raab
    • 1
  • Andreas Uhl
    • 1
  1. 1.Multimedia Signal Processing and Security Lab (WaveLab), Department of Computer SciencesUniversity of SalzburgAustria

Personalised recommendations