A DCT-domain system for robust image watermarking
Signal Processing
Inside risks: the uses and abuses of biometrics
Communications of the ACM
Secure data hiding in wavelet compressed fingerprint images
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
Synthetic Fingerprint-Image Generation
ICPR '00 Proceedings of the International Conference on Pattern Recognition - Volume 3
Composite signature based watermarking for fingerprint authentication
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Feature based RDWT watermarking for multimodal biometric system
Image and Vision Computing
Template Protection for On-Line Signature-Based Recognition Systems
Biometrics and Identity Management
An extended JADE-S based framework for developing secure Multi-Agent Systems
Computer Standards & Interfaces
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Multimodal biometrics: state of the art in fusion techniques
International Journal of Biometrics
An efficient watermarking technique for the protection of fingerprint images
EURASIP Journal on Information Security
Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals
Digital Signal Processing
Biometric cryptosystem using function based on-line signature recognition
Expert Systems with Applications: An International Journal
A novel image hiding approach based on correlation analysis for secure multimodal biometrics
Journal of Network and Computer Applications
A novel adaptive steganography based on local complexity and human vision sensitivity
Journal of Systems and Software
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Blind authentication: a secure crypto-biometric verification protocol
IEEE Transactions on Information Forensics and Security
An effective video steganography method for biometric identification
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Protecting biometric templates using authentication watermarking
PCM'10 Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I
Embedded access points for trusted data and resources access in HPC systems
The Journal of Supercomputing
An efficient prediction-and-shifting embedding technique for high quality reversible data hiding
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Watermarking as a means to enhance biometric systems: a critical survey
IH'11 Proceedings of the 13th international conference on Information hiding
Two-factor biometric recognition with integrated tamper-protection watermarking
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Sparse reconstruction based watermarking for secure biometric authentication
CCBR'11 Proceedings of the 6th Chinese conference on Biometric recognition
Enhancing the transmission security of content-based hidden biometric data
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
An efficient and practical fingerprint-based remote user authentication scheme with smart cards
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A study of brute-force break-ins of a palmprint verification system
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Biometric recognition: how do i know who you are?
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
Securing biometric templates for reliable identity authentication
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Protecting biometric data for personal identification
SINOBIOMETRICS'04 Proceedings of the 5th Chinese conference on Advances in Biometric Person Authentication
Computer Standards & Interfaces
Iris recognition against counterfeit attack using gradient based fusion of multi-spectral images
IWBRS'05 Proceedings of the 2005 international conference on Advances in Biometric Person Authentication
A secure multimodal biometric verification scheme
IWBRS'05 Proceedings of the 2005 international conference on Advances in Biometric Person Authentication
Securing fingerprint images using a hybrid technique
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Biometric fuzzy extractors made practical: a proposal based on fingercodes
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Robust hiding of fingerprint-biometric data into audio signals
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
An enhanced biometrics-based remote user authentication scheme using mobile devices
International Journal of Computational Intelligence Studies
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking
International Journal of Information Security and Privacy
Biometric template protection with DCT-based watermarking
Machine Vision and Applications
Hi-index | 0.15 |
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are possible in a biometric system, make the issue of security/integrity of biometric data extremely critical. We introduce two applications of an amplitude modulation-based watermarking method, in which we hide a user's biometric data in a variety of images. This method has the ability to increase the security of both the hidden biometric data (e.g., eigen-face coefficients) and host images (e.g., fingerprints). Image adaptive data embedding methods used in our scheme lead to low visibility of the embedded signal. Feature analysis of host images guarantees high verification accuracy on watermarked (e.g., fingerprint) images.