Abstract
Classical biometric system are prone to compromise at several points. Two of the vulnerable points are : 1. biometric database 2. biometric feature matcher subsystem. We propose a two level watermarking scheme to secure these vulnerable points. Watermark W1 is used for database authentication and made resistive to lossy compression. It is derived using block based singular values (SV’s) of a fingerprint image. W1 establish linkages between watermark and fingerprint image. Watermark W2 is used to secure feature matcher subsystem. It is computed using second and third order moments of the fingerprint image. W2 is made resistive to mild affine transformation and lossy compression to incorporate practical aspects of biometric fingerprint system. The proposed watermarking method not only provides protection to database and matcher subsystem, it also gives security against copy attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barreto, P.S.L.M., Kim, H.Y., Rijmen, V.: Toward secure public-key blockwise fragile authentication watermarking. Proc. IEE. 149(2), 57–62 (2002)
Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11(6), 585–595 (2002)
Jaejin, L., Chee, S.W.: A watermarking sequence using parities of error control coding for image authentication and correction. IEEE Trans. Consum. Electron. 46(2), 313–317 (2000)
Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 87(7), 1167–1180 (1999)
Kutter, M., Voloshynovskiy, S., Herrigel, A.: The Watermark Copy Attack. In: Proc. of the SPIE, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 371–379 (January 2000)
Barr, J., Bradley, B., Hanniga, B.: Using Digital Watermarks with Image Signatures to Mitigate the Threat of the Copy Attack. In: Proc. ICASSP, vol. 3, pp. 69–72 (April 2003)
Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. on Multimedia 4(1), 121–128 (2002)
Zhou, B., Chen, J.: A geometric distortion resilient image watermarking algorithm based on SVD. Chinese Journal on Image and Graphics 9, 506–512 (2004)
Ganic, E., Eskicioglu, A.M.: Robust DWT-SVD domain watermarking: Embedding data in all frequencies. In: Proc. Workshop Multimedia Security, Magdeburg, Germany, pp. 166–174 (September 2004)
Bhatnagar, G., Raman, B.: A new robust reference watermarking scheme based on DWT - SVD. Comput. Standards and Interfaces 31(5), 1002–1013 (2009)
Lai, C.-C., Tsai, C.-C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instru. and Measur. 59(11), 3060–3063 (2010)
Wang, D.-S., Li, J.-P., Wen, X.-Y.: Biometric Image Integrity Authentication Based on SVD and Fragile Watermarking. In: IEEE Congress on Image and Signal Processing, CISP 2008, vol. 5, pp. 679–682 (May 2008)
El Bakrawy, L.M., Ghali, N.I., Hassanien, A.E., Peters, J.F.: Strict Authentication of Multimodal Biometric Images Using Near Sets. In: Gaspar-Cunha, A., Takahashi, R., Schaefer, G., Costa, L. (eds.) Soft Computing in Industrial Applications. AISC, vol. 96, pp. 249–258. Springer, Heidelberg (2011)
Vatsa, M., Singh, R., Noore, A., Houck, M.M., Morries, K.: Robust biometric image watermarking for fingerprint and face images. IEICE Electronics Express 5(2), 23–28 (2006)
Wu, Y.: On the security of SVD-Based ownership watermarking. IEEE Trans. on Multimedia 7(4) (August 2005)
Ratha, N.K.: Effect of controlled image acquisition on fingerprint matching. In: IEEE Fourteenth International Conference on Pattern Recognition, vol. 2, pp. 1659–1661 (1998)
Zheng, D., Liu, Y., Zhao, J., El Saddik, A.: A survey of RST invariant image watermarking algorithms. ACM Computing Surveys 39(2), Article 5 (June 2007)
Gonzalez, Woods: Digital Image processing using MATLAB, pp. 610–613. Tata McGraw Hill (2010)
Lin, C.Y., Chang, S.-F.: A Robust Image Authentication Algorithm Surviving JPEG Compression. In: SPIE, Storage and Retrieval of Image/Video Database, pp. 296–307 (1998)
Raval, M.S., Rege, P.P.: Discrete wavelet transform based multiple watermarking scheme. In: Proceeding IEEE TENCON 2003, pp. 935–938 (October 2003)
Watson, C.I., Wilson, C.L.: Effect of Image Size and Compression on One-to-One Fingerprint Matching, National institute of standard and technology, U.S, NISTIR 7201 (February 2005)
Jain, A.K., Prabhakar, S., Pankanti, S.: A Filterbank-based Representation for Classification and Matching of Fingerprints. In: International Joint Conference on Neural Networks (IJCNN), Washington DC, pp. 3284–3285 (July 1999)
Prabhakar, S.: Fingerprint Classification and Matching Using a Filterbank, Ph.D. thesis, Michigan State University (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Joshi, M.V., Joshi, V.B., Raval, M.S. (2013). Multilevel Semi-fragile Watermarking Technique for Improving Biometric Fingerprint System Security. In: Agrawal, A., Tripathi, R.C., Do, E.YL., Tiwari, M.D. (eds) Intelligent Interactive Technologies and Multimedia. IITM 2013. Communications in Computer and Information Science, vol 276. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37463-0_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-37463-0_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37462-3
Online ISBN: 978-3-642-37463-0
eBook Packages: Computer ScienceComputer Science (R0)