IBM Systems Journal
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
A Novel Digital Watermarking Method for New Viewpoint Video Based on Depth Map
ISDA '08 Proceedings of the 2008 Eighth International Conference on Intelligent Systems Design and Applications - Volume 02
Reversible data hiding based on histogram modification of pixel differences
IEEE Transactions on Circuits and Systems for Video Technology
Biometric Based Unique Key Generation for Authentic Audio Watermarking
PReMI '09 Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence
Reversible image watermarking using interpolation technique
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Image Processing
Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
This paper addresses the problem of ownership of digital watermark by inserting a biometric-based watermark in the digital host signal. The biometric-based digital watermark is made secure using an encryption technique using Arnold catmap before embedding. Biometric-based watermark is a potential solution of watermark ownership which can be physically or logically owned to prove ownership. This joint encryption and watermarking scheme has the potential of addressing the ownership of digital signals and keep the biometric data secure. Arnold transformation is used to encrypt the biometric data and discrete cosine transformation is used for embedding the watermark in the image. The watermarking method is chosen so that the data payload demand is met keeping the requirements of perceptual transparency and robustness. Experimental results of perceptual transparency indicates that the method maintains a good quality of transparency with a SNR more than 25 dB for the images. The proposed watermarking method is robust to signal processing attacks and the watermarks were identified using minutia feature point matching under these attacks. The overall design requirements of transparency, robustness and data payload are achieved optimally in this paper.