Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29381


Select areas to restrict search in scientific publication database:
9998046
Effects of Reversible Watermarking on Iris Recognition Performance
Abstract:
Fragile watermarking has been proposed as a means of adding additional security or functionality to biometric systems, particularly for authentication and tamper detection. In this paper we describe an experimental study on the effect of watermarking iris images with a particular class of fragile algorithm, reversible algorithms, and the ability to correctly perform iris recognition. We investigate two scenarios, matching watermarked images to unmodified images, and matching watermarked images to watermarked images. We show that different watermarking schemes give very different results for a given capacity, highlighting the importance ofinvestigation. At high embedding rates most algorithms cause significant reduction in recognition performance. However, in many cases, for low embedding rates, recognition accuracy is improved by the watermarking process.
Digital Object Identifier (DOI):

References:
Biometric Working Group, "Biometric security concerns,” Biometric Working Group, UK Government, Tech. Rep., 2003.
[2] C. Roberts, "Biometric attack vectors and defences,” Computers & Security, vol. 26, no. 1, pp. 14 – 25, 2007.
[3] J. Hammerle-Uhl, ¨ K. Raab, and A. Uhl, "Watermarking as a means to enhance biometric systems: a critical survey,” in Proceedings of the 13th international conference on Information hiding,ser. IH’11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 238–254.
[4] ——, "Experimentalstudy on the impact of robust watermarking on iris recognition accuracy,” in Proceedings of the 2010 ACM Symposium on Applied Computing. ACM, 2010, pp. 1479–1484.
[5] J. Dong and T. Tan, "Effects of watermarking on iris recognition performance,” in Proc. 10th Int. Conf. Control, Automation, Robotics and Vision ICARCV 2008, 2008, pp. 1156–1161.
[6] J.-B. Feng, I.-C. Lin, C.-S. Tsai, and Y.-P. Chu, "Reversible watermarking: Current status and key issues,” I. J. Network Security, vol. 2, no. 3, pp. 161–170, 2006.
[7] A. K. Jain, U. Uludag, and R.-L. Hsu, "Hiding a face in a fingerprint image,” in Proc. 16th Int Pattern Recognition Conf, vol. 3, 2002, pp. 756–759.
[8] A. Hassanien, "Hiding iris data for authentication of digital images using wavelet theory,” Pattern Recognition and Image Analysis, vol. 16, pp. 637–643, 2006, 10.1134/S1054661806040092.
[9] P. Blythe and J. Fridrich, "Secure digital camera,” in in Proceedings of Digital Forensic Research Workshop (DFRWS, 2004, pp. 17–19.
[10] M. M. Yeung and S. Pankanti, "Verification watermarks on fingerprint recognition and retrieval,” in Proc. SPIE EI, 1999, pp. 66–78.
[11] N. Bartlow, N. Kalka, B. Cukic, and A. Ross, "Protecting iris images through asymmetric digital watermarking,” in Proc. IEEE Workshop Automatic Identification Advanced Technologies, 2007, pp. 192–197.
[12] T. Hoang, D. Tran, and D. Sharma, "Remote multimodal biometric authentication using bit priority-based fragile watermarking,” in Proc. 19th Int. Conf. Pattern Recognition ICPR 2008, 2008, pp. 1–4.
[13] A. Jain and U. Uludag, "Hiding fingerprint minutiae in images,” in Proceedings of Third Workshop on Automatic Identification Advanced Technologies (AutoID), 2002, 2002, pp. 97–102.
[14] A. Noore, R. Singh, M. Vatsa, and M. M. Houck, "Enhancing security of fingerprintsthrough contextual biometric watermarking,” Forensic Sci Int, vol. 169, no. 2, pp. 188–194, Jul. 2007.
[15] M. Vatsa, R. Singh, and A. Noore, "Feature based rdwt watermarking for multimodal biometric system,” Image Vision Comput., vol. 27, pp. 293–304, February 2009.
[16] R. Huber, H. Stogner ¨ , and A. Uhl, "Two-factor biometric recognition with integrated tamper-protection watermarking,” in Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security,ser. CMS’11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 72–84.
[17] A. K. Jain and U. Uludag, "Hiding biometric data,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 11, pp. 1494–1498, 2003.
[18] T. Satonaka, "Biometric watermark authentication with multiple verification rule,” in Proc. 12th IEEE Workshop Neural Networks for Signal Processing, 2002, pp. 597–606.
[19] J. Daugman, "High confidence visual recognition of persons by a test of statistical independence,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp. 1148–1161, 1993.
[20] E. Krichen, A. Mellakh, S. Salicetti, and B. Dorizzi, "Osiris (open source for iris) reference system,” BioSecure Project, Tech. Rep., 2008.
[Online]. Available: http:/www.biosecure.info
[21] C. Xu and J. Prince, "Snakes, shapes, and gradient vector flow,” IEEE Transactions on Image Processing, vol. 7, no. 3, pp. 359–369, 1998.
[22] P. Phillips, K. Bowyer, P. Flynn, X. Liu, and W. Scruggs, "The iris challenge evaluation 2005,” in Biometrics: Theory, Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference on. IEEE, 2008, pp. 1–8.
[23] M. Celik, G. Sharma, A. Tekalp, and E. Saber, "Lossless generalized-lsb data embedding,” IEEE Transactions on Image Processing, vol. 14, no. 2, pp. 253–266, 2005.
[24] J. Tian, "Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems For Video Technology, vol. 13, no. 8, pp. 890–896, 2003.
[25] V. Sachnev, H. Kim, J. Nam, S. Suresh, and Y. Shi, "Reversible watermarking algorithm using sorting and prediction,” IEEE Transactions on Circuits and Systems For Video Technology, vol. 19, no. 7, pp. 989–999, 2009.
[26] S. Weng, Y. Zhao,J. Pan, and R. Ni, "Reversible watermarking based on invariability and adjustment on pixel pairs,” Signal Processing Letters, IEEE, vol. 15, pp. 721–724, 2008.
[27] Y. Li, C. Yeh, and C. Chang, "Data hiding based on the similarity between neighboring pixels with reversibility,” Digital Signal Processing, vol. 20, no. 4, pp. 1116–1128, 2010.
[28] B. Yang, M. Schmucker, W. Funk, C. Busch, and S. Sun, "Integer dct-based reversible watermarking for images using companding technique,” in Proceedings of SPIE, vol. 5306. Citeseer, 2004, pp. 5306–41.
[29] S. Lee, C. Yoo, and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform,” Information Forensics and Security, IEEE Transactions on, vol. 2, no. 3, pp. 321–330, 2007.
[30] Z. Wang, A. Bovik, H. Sheikh, and E. Simoncelli, "Image quality assessment: From error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, 2004.
[31] E. DeLong, D. DeLong, and D. Clarke-Pearson, "Comparing the areas under two or more correlated receiver operating characteristic curves: a nonparametric approach.” Biometrics, vol. 44, no. 3, pp. 837–845, 1988.
Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007