Inside risks: the uses and abuses of biometrics
Communications of the ACM
Secure data hiding in wavelet compressed fingerprint images
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
A Stochastic Approach to Content Adaptive Digital Image Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Hiding a Face in a Fingerprint Image
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 3 - Volume 3
IEEE Transactions on Pattern Analysis and Machine Intelligence
Protecting Fingerprint Data Using Watermarking
AHS '06 Proceedings of the first NASA/ESA conference on Adaptive Hardware and Systems
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Speaker identification security improvement by means of speech watermarking
Pattern Recognition
Human visual system based adaptive digital image watermarking
Signal Processing
Three measures for secure palmprint identification
Pattern Recognition
CISW '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops
EURASIP Journal on Advances in Signal Processing
Dual watermark for image tamper detection and recovery
Pattern Recognition
Feature based RDWT watermarking for multimodal biometric system
Image and Vision Computing
Performance evaluation of watermarking techniques for secure multimodal biometric systems
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
A robust-fragile dual watermarking system in the DCT domain
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Protecting biometric data for personal identification
SINOBIOMETRICS'04 Proceedings of the 5th Chinese conference on Advances in Biometric Person Authentication
A secure multimodal biometric verification scheme
IWBRS'05 Proceedings of the 2005 international conference on Advances in Biometric Person Authentication
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Protecting biometric templates with image watermarking techniques
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Protecting biometric templates using authentication watermarking
PCM'10 Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I
Attack against robust watermarking-based multimodal biometric recognition systems
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
Robust watermarking in iris recognition: application scenarios and impact on recognition performance
ACM SIGAPP Applied Computing Review
Watermarking as a means to enhance biometric systems: a critical survey
IH'11 Proceedings of the 13th international conference on Information hiding
Sparse reconstruction based watermarking for secure biometric authentication
CCBR'11 Proceedings of the 6th Chinese conference on Biometric recognition
Yet another multiple-image encryption by rotating random grids
Signal Processing
Image security and biometrics: a review
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Hi-index | 0.08 |
In this paper, we propose multimodal biometric image watermarking scheme through a two-stage integrity verification method using the hidden thumbnail feature vectors for safe authentication of multimodal biometrics data, face and fingerprint, respectively. It is basically blind and spread spectrum-based robust watermarking method. The proposed method enables us to detect a tampered region by controlling watermark embedding strength to meet the requirement of predefined watermark extraction threshold. The key idea is that the thumbnail feature vectors of a face image as a watermark pattern are utilized by embedding into a fingerprint image in order to verify the integrity of respective biometric data. The first stage of integrity verification for a fingerprint image is done by deciding the validity of extracted thumbnail patterns. The second stage of integrity verification for a face image is done by one-to-one matching between the thumbnail feature vectors extracted from a face image and the thumbnail one of the received face image. Experimental results showed that the proposed method has a high detection rate of the forged biometric data and guarantees the security assurance.