Skip to main content

Multilevel Semi-fragile Watermarking Technique for Improving Biometric Fingerprint System Security

  • Conference paper
Intelligent Interactive Technologies and Multimedia (IITM 2013)

Abstract

Classical biometric system are prone to compromise at several points. Two of the vulnerable points are : 1. biometric database 2. biometric feature matcher subsystem. We propose a two level watermarking scheme to secure these vulnerable points. Watermark W1 is used for database authentication and made resistive to lossy compression. It is derived using block based singular values (SV’s) of a fingerprint image. W1 establish linkages between watermark and fingerprint image. Watermark W2 is used to secure feature matcher subsystem. It is computed using second and third order moments of the fingerprint image. W2 is made resistive to mild affine transformation and lossy compression to incorporate practical aspects of biometric fingerprint system. The proposed watermarking method not only provides protection to database and matcher subsystem, it also gives security against copy attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barreto, P.S.L.M., Kim, H.Y., Rijmen, V.: Toward secure public-key blockwise fragile authentication watermarking. Proc. IEE. 149(2), 57–62 (2002)

    Article  Google Scholar 

  2. Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11(6), 585–595 (2002)

    Article  Google Scholar 

  3. Jaejin, L., Chee, S.W.: A watermarking sequence using parities of error control coding for image authentication and correction. IEEE Trans. Consum. Electron. 46(2), 313–317 (2000)

    Article  Google Scholar 

  4. Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 87(7), 1167–1180 (1999)

    Article  Google Scholar 

  5. Kutter, M., Voloshynovskiy, S., Herrigel, A.: The Watermark Copy Attack. In: Proc. of the SPIE, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 371–379 (January 2000)

    Google Scholar 

  6. Barr, J., Bradley, B., Hanniga, B.: Using Digital Watermarks with Image Signatures to Mitigate the Threat of the Copy Attack. In: Proc. ICASSP, vol. 3, pp. 69–72 (April 2003)

    Google Scholar 

  7. Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. on Multimedia 4(1), 121–128 (2002)

    Article  Google Scholar 

  8. Zhou, B., Chen, J.: A geometric distortion resilient image watermarking algorithm based on SVD. Chinese Journal on Image and Graphics 9, 506–512 (2004)

    Google Scholar 

  9. Ganic, E., Eskicioglu, A.M.: Robust DWT-SVD domain watermarking: Embedding data in all frequencies. In: Proc. Workshop Multimedia Security, Magdeburg, Germany, pp. 166–174 (September 2004)

    Google Scholar 

  10. Bhatnagar, G., Raman, B.: A new robust reference watermarking scheme based on DWT - SVD. Comput. Standards and Interfaces 31(5), 1002–1013 (2009)

    Article  Google Scholar 

  11. Lai, C.-C., Tsai, C.-C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instru. and Measur. 59(11), 3060–3063 (2010)

    Article  Google Scholar 

  12. Wang, D.-S., Li, J.-P., Wen, X.-Y.: Biometric Image Integrity Authentication Based on SVD and Fragile Watermarking. In: IEEE Congress on Image and Signal Processing, CISP 2008, vol. 5, pp. 679–682 (May 2008)

    Google Scholar 

  13. El Bakrawy, L.M., Ghali, N.I., Hassanien, A.E., Peters, J.F.: Strict Authentication of Multimodal Biometric Images Using Near Sets. In: Gaspar-Cunha, A., Takahashi, R., Schaefer, G., Costa, L. (eds.) Soft Computing in Industrial Applications. AISC, vol. 96, pp. 249–258. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  14. Vatsa, M., Singh, R., Noore, A., Houck, M.M., Morries, K.: Robust biometric image watermarking for fingerprint and face images. IEICE Electronics Express 5(2), 23–28 (2006)

    Article  Google Scholar 

  15. Wu, Y.: On the security of SVD-Based ownership watermarking. IEEE Trans. on Multimedia 7(4) (August 2005)

    Google Scholar 

  16. Ratha, N.K.: Effect of controlled image acquisition on fingerprint matching. In: IEEE Fourteenth International Conference on Pattern Recognition, vol. 2, pp. 1659–1661 (1998)

    Google Scholar 

  17. Zheng, D., Liu, Y., Zhao, J., El Saddik, A.: A survey of RST invariant image watermarking algorithms. ACM Computing Surveys 39(2), Article 5 (June 2007)

    Google Scholar 

  18. Gonzalez, Woods: Digital Image processing using MATLAB, pp. 610–613. Tata McGraw Hill (2010)

    Google Scholar 

  19. Lin, C.Y., Chang, S.-F.: A Robust Image Authentication Algorithm Surviving JPEG Compression. In: SPIE, Storage and Retrieval of Image/Video Database, pp. 296–307 (1998)

    Google Scholar 

  20. Raval, M.S., Rege, P.P.: Discrete wavelet transform based multiple watermarking scheme. In: Proceeding IEEE TENCON 2003, pp. 935–938 (October 2003)

    Google Scholar 

  21. http://bias.csr.unibo.it/fvc2004/databases.asp

  22. http://egovstandards.gov.in/standardsandFramework/biometricstandards/fingerprin_image_data_standard_ver1.0.pdf

  23. Watson, C.I., Wilson, C.L.: Effect of Image Size and Compression on One-to-One Fingerprint Matching, National institute of standard and technology, U.S, NISTIR 7201 (February 2005)

    Google Scholar 

  24. Jain, A.K., Prabhakar, S., Pankanti, S.: A Filterbank-based Representation for Classification and Matching of Fingerprints. In: International Joint Conference on Neural Networks (IJCNN), Washington DC, pp. 3284–3285 (July 1999)

    Google Scholar 

  25. Prabhakar, S.: Fingerprint Classification and Matching Using a Filterbank, Ph.D. thesis, Michigan State University (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Joshi, M.V., Joshi, V.B., Raval, M.S. (2013). Multilevel Semi-fragile Watermarking Technique for Improving Biometric Fingerprint System Security. In: Agrawal, A., Tripathi, R.C., Do, E.YL., Tiwari, M.D. (eds) Intelligent Interactive Technologies and Multimedia. IITM 2013. Communications in Computer and Information Science, vol 276. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37463-0_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37463-0_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37462-3

  • Online ISBN: 978-3-642-37463-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics