PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A Fingerprint-Based Digital Images Watermarking for Identity Authentication

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper the combination of fingerprint verification methods with watermarking technology to provide copyright protection and authentication of digital images is proposed. The goal of this study is to investigate how watermarking processing affects the quality of biometric watermarks. Performed experiments showed that extracted fingerprint images have roughly equal verification performance even if some watermarked images undergo additional degradation. Proposed methodology will be improved using more sophisticated fingerprint verification methods and subsequently incorporated into multimodal watermarking schemes.
Rocznik
Strony
85--96
Opis fizyczny
Bibliogr. 21 poz., rys., tab.
Twórcy
  • Cracow University of Technology, al. Jana Pawła II 37, 31-864 Cracow, Poland
Bibliografia
  • [1] Arnold M., Schmucker M., Wolthusen S.D., Techniques and applications of digital watermarking and content protection, Artech House, Boston (2003).
  • [2] Bringer J., Chabanne H., Kindarji B., Identification with encrypted biometric data, Security and Communication Networks 4 (2011): 548-562.
  • [3] Cox I.J., Miller M.L., Bloom J., Fridrich J., Kalker J., Digital watermarking and steganography, Morgan Kaufmann Publishers, Burlington (2008).
  • [4] Dittmann J., Wohlmacher P., Nahrstedt K., Using cryptographic and watermarking algorithms, IEEE MultiMedia 8 (2001): 54-65.
  • [5] Hong L., Wan Y., Jain A. K., Fingerprint image enhancement: Algorithm and performance evaluation, IEEE Transactions on Pattern Analysis and Machine Intelligence 20 (1998): 777-789.
  • [6] Jain A.K., Ross A., Prabhakar S., Biometrics: A Tool for Information Security, IEEE Transactions on Circuits and Systems for Video Technology 14 (2004): 4-20.
  • [7] Jain A.K., Ross A., Prabhakar S., An Introduction to Biometric Recognition, IEEE Transactions on Information Forensics and Security 1 (2006): 125-143.
  • [8] Jain A.K., Uludag U., Hiding biometric data, IEEE Transactions on Pattern Analysis and Machine Intelligence 25n(2003): 1494-1498.
  • [9] Katzenbeisser S., Petitcolas F.A., Information hiding techniques for steganography and digital watermarking, Artech House, Norwood (2000).
  • [10] Maltoni D., Maio D., Jain A.K., Prabhakar, S., Handbook of Fingerprint Recognition, Springer, London (2009).
  • [11] Manoochehri M., Pourghassem H., Shahgholian G., A Novel Synthetic Image Watermarking Algorithm Based on Discrete Wavelet Transform and Fourier-Mellin Transform, In: IEEE 3rd International Conference on Communication Software and Networks (ICCSN), IEEE Press, New York (2011): 265-269.
  • [12] Noore A., Singh R., Vasta M., Houck M.M., Enhancing security of fingerprints through contextual biometric watermarking, Forensic Science International, 169 (2007): 188-194.
  • [13] Ogiela M.R., Ogiela U., DNA-like linguistic secret sharing for strategic information systems, International journal of information managemant, 32 (2012): 175-181.
  • [14] Ouyang Z., Feng J., Su F. Cai A., Fingerprint Matching With Rotation-Descriptor Texture Features, In: 18th International Conference on Pattern Recognition (ICPR), IEEE Press, New York (2006): 417-420.
  • [15] Pankanti S., Yeung M.M., Verification Watermarks on Fingerprint Recognition and Retrieval, Proc. SPIE 3657 (1999): 66-78.
  • [16] Reid P., Biometrics for Network Security. Prentice Hall PTR, New Delhi (2003).
  • [17] Thai R., Fingerprint image enhancement and minutiae extraction, Programme report, University of Western Australia (2003).
  • [18] Tripathi K.P., A comparative study of biometric technologies with reference to human interface, International Journal of Computer Applications, 14 (2011): 10-15.
  • [19] Fingerprint Verification Competition 2002, available at http://bias.csr.unibo.it/fvc2002, accessed: 14.04.2014.
  • [20] Fingerprint SDUMLA-HMT database, available at http://mla.sdu.edu.cn/sdumla-hmt.html, accessed: 13.05.2014.
  • [21] Software for minutiae extraction and matching, available at http://mla.sdu.edu.cn/sdumlahmt.html, accessed: 14.04.2014. Pobrane z czasopisma Annales AI- Informatica http://ai.annales.umcs.pl Data: 22/01/2019 20:42:38
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-4d63f63d-a67d-41df-b8fe-28cc956898d1
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.