Palmprint Authentication Based on DCT-Based Watermarking

Article Preview

Abstract:

With the rapid development of biometric technology, the security issues have drawn people's greater attention because some biometric features are Easy to forge and are not replaceable. As a result, the security issue of biometric system extremely critical to be solved. In this paper, we introduce a public watermarking algorithm which is based on Discrete Cosine Transformation (DCT). By using the proposed algorithm, the finger geometry is embedded into the region of interest (ROI) of palmprint image. This method has the ability to increase the security of both the palmprint image and the finger geometry. Experimental results performed on a database of 86 hands (10 impressions per hand) show that the proposed algorithm is effective, and the watermarking operation has little impact on the recognition performance.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

893-898

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. K. Jain and U. Uludag, Hiding Biometric Data, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, pp.1494-1498, (2003).

DOI: 10.1109/tpami.2003.1240122

Google Scholar

[2] N. K. Ratha, J. H. Connell, and R. M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM System Journal, vol. 40, pp.614-634, (2001).

DOI: 10.1147/sj.403.0614

Google Scholar

[3] A. K. Jain, A. Ross, and S. Pankanti, Biometrics: a tool for information security, Information Forensics and Security, IEEE Transactions on, vol. 1, pp.125-143, (2006).

DOI: 10.1109/tifs.2006.873653

Google Scholar

[4] M. M. Yeung and S. Pankanti, Verification watermarks on fingerprint recognition and retrieval, in Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, San Jose, California, 1999, pp.66-78.

DOI: 10.1117/12.344704

Google Scholar

[5] B. Gunsel, U. Uludag, and A. M. Tekalp, Robust watermarking of fingerprint images, Pattern Recognition, vol. 35, pp.2739-2747, (2002).

DOI: 10.1016/s0031-3203(01)00250-3

Google Scholar

[6] M. Vatsa, R. Singh, A. Noore, and M. Houck, Robust biometric image watermarking for fingerprint and face template protection, IEICE Electronics Express, vol. 3, pp.23-28, (2006).

DOI: 10.1587/elex.3.23

Google Scholar

[7] M. K. Khan, J. Zhang, and L. Tian, Chaotic secure content-based hidden transmission of biometric templates, Chaos, Solitons & Fractals, vol. 32, pp.1749-1759, (2007).

DOI: 10.1016/j.chaos.2005.12.015

Google Scholar

[8] M. Faundez-Zanuy, M. Hagmüller, and G. Kubin, Speaker identification security improvement by means of speech watermarking, Pattern Recognition, vol. 40, pp.3027-3034, (2007).

DOI: 10.1016/j.patcog.2007.02.016

Google Scholar

[9] M. Vatsa, R. Singh, and A. Noore, Feature based RDWT watermarking for multimodal biometric system, Image and Vision Computing, vol. 27, pp.293-304, (2009).

DOI: 10.1016/j.imavis.2007.05.003

Google Scholar

[10] W. -g. Kim and H. Lee, Multimodal biometric image watermarking using two-stage integrity verification, Signal Processing, vol. 89, pp.2385-2399, (2009).

DOI: 10.1016/j.sigpro.2009.04.014

Google Scholar

[11] R. C. Reininger and J. D. Gibson, Distributions of the two-dimensional DCT coefficients for images, IEEE Transactions on Communications, vol. 31 pp.835-839, (1983).

DOI: 10.1109/tcom.1983.1095893

Google Scholar

[12] S. R. Smoot and L. A. Rowe, Study of DCT coefficient distributions, in Proceedings of the SPIE Symposium on Electronic Imaging, 1996, pp.403-411.

Google Scholar

[13] H. Freeman, Computer processing of line-drawing images, ACM Computing Surveys (CSUR), vol. 6, pp.57-97, (1974).

DOI: 10.1145/356625.356627

Google Scholar