Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform

In this paper, a novel biometrics inspired watermarking technique is proposed. For this purpose, a newly proposed mathematical transform, namely the fractional dual tree complex wavelet transform (FrDT-CWT), and singular value decomposition (SVD) are used. The core idea is to use biometrically generated keys in the embedding process of a gray-scale watermark. Therefore, this paper first proposes a method for generating keys from biometrics efficiently. The host image is first randomized by Hessenberg decomposition and a chaotic map, followed by embedding in the FrDT-CWT domain by modifying the singular values of the randomized image. Further, in order to prevent the ambiguity problem of SVD-based techniques, a verification step is introduced to verify the watermarked image. Finally, a reliable extraction process is proposed to extract the watermark from the possibly attacked watermarked image after verification. The security, attack, and comparative analysis confirms the high security, efficiency, and robustness of the proposed watermarking technique. Highlights? A novel biometrics inspired watermarking technique is proposed. ? The watermark is embedded in a fractional dual tree complex wavelet transform domain using SVD. ? A method is also proposed to generate keys from biometrics efficiently. ? To prevent the ambiguity problem of SVD-based techniques, a verification step is casted. ? The security, attack, and comparative analysis confirms the high security, efficiency, and robustness of the proposed technique.

[1]  Gaurav Bhatnagar,et al.  Fractional dual tree complex wavelet transform and its application to biometric security during communication and transmission , 2012, Future Gener. Comput. Syst..

[2]  Yang Shouyi,et al.  Multiple-chirp typed blind watermarking algorithm based on fractional Fourier transform , 2005, 2005 International Symposium on Intelligent Signal Processing and Communication Systems.

[3]  Sharath Pankanti,et al.  Biometrics: Personal Identification in Networked Society , 2013 .

[4]  Ahmet M. Eskicioglu,et al.  Robust DCT-SVD domain image watermarking for copyright protection: Embedding data in all frequencies , 2005, 2005 13th European Signal Processing Conference.

[5]  Mauro Barni,et al.  Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..

[6]  Nalini K. Ratha,et al.  Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.

[7]  Iwan Setyawan,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000 .

[8]  D. Chandra Digital image watermarking using singular value decomposition , 2002, The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002..

[9]  Ahmet M. Eskicioglu,et al.  Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition , 2005, J. Electronic Imaging.

[10]  John Daugman,et al.  The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..

[11]  Natalia A. Schmid,et al.  On Generation and Analysis of Synthetic Iris Images , 2007, IEEE Transactions on Information Forensics and Security.

[12]  Andrew Teoh Beng Jin,et al.  High security Iris verification system based on random secret integration , 2006 .

[13]  Delong Cui Dual Digital Watermarking Algorithm for Image Based on Fractional Fourier Transform , 2009, 2009 Second Pacific-Asia Conference on Web Mining and Web-based Application.

[14]  Yiwei Wang,et al.  A wavelet-based watermarking algorithm for ownership verification of digital images , 2002, IEEE Trans. Image Process..

[15]  Luc Van Gool,et al.  SURF: Speeded Up Robust Features , 2006, ECCV.

[16]  Andrew Beng Jin Teoh,et al.  Iris Authentication Using Privatized Advanced Correlation Filter , 2006, ICB.

[17]  Deepa Kundur,et al.  Toward robust logo watermarking using multiresolution image fusion principles , 2004, IEEE Transactions on Multimedia.

[18]  Gene H. Golub,et al.  Matrix computations , 1983 .

[19]  Yongdong Wu,et al.  On the security of an SVD-based ownership watermarking , 2005, IEEE Transactions on Multimedia.

[20]  F.Q. Yu,et al.  A Digital Watermarking Algorithm for Image Based on Fractional Fourier Transform , 2006, 2006 1ST IEEE Conference on Industrial Electronics and Applications.

[21]  Li Wenbo,et al.  A chaos-based robust wavelet-domain watermarking algorithm , 2004 .

[22]  Gaurav Bhatnagar,et al.  Robust watermarking using fractional wavelet packet transform , 2012 .

[23]  G. C. Langelaar,et al.  Watermarking digital image and video data , 2000 .

[24]  Sharath Pankanti,et al.  Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .

[25]  Ali Al-Haj,et al.  An improved SVD-based watermarking scheme for protecting rightful ownership , 2008, Signal Process..

[26]  Gaurav Bhatnagar,et al.  Distributed Multiresolution Discrete Fourier Transform and its Application to Watermarking , 2010, Int. J. Wavelets Multiresolution Inf. Process..

[27]  Gye-Young Kim,et al.  A New Incremental Watermarking Based on Dual-Tree Complex Wavelet Transform , 2005, The Journal of Supercomputing.

[28]  Xiao-Ping Zhang,et al.  Comments on "An SVD-based watermarking scheme for protecting rightful Ownership" , 2005, IEEE Trans. Multim..

[29]  Ziya Telatar,et al.  Improved SVD-DWT based digital image watermarking against watermark ambiguity , 2007, SAC '07.

[30]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[31]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[32]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[33]  Gaurav Bhatnagar,et al.  Robust Reference-Watermarking Scheme Using Wavelet Packet Transform and Bidiagonal-Singular Value Decomposition , 2009, Int. J. Image Graph..

[34]  Tao Sang,et al.  Generating binary Bernoulli sequences based on a class of even-symmetric chaotic maps , 2001, IEEE Trans. Commun..

[35]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[36]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[37]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[38]  Tieniu Tan,et al.  An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..

[39]  Kaushik Roy,et al.  Iris Recognition: A Machine Learning Approach , 2008 .

[40]  Andreas Uhl,et al.  Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.

[41]  Gaurav Bhatnagar,et al.  A New SVD Based Watermarking Framework in Fractional Fourier Domain , 2010, IC3.

[42]  B. Raman,et al.  Robust Watermarking Scheme Based on Multiresolution Fractional Fourier Transform , 2008, ICVGIP.

[43]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[44]  Ioannis Pitas,et al.  Digital watermarking in the fractional Fourier transformation domain , 2001, J. Netw. Comput. Appl..

[45]  Mauro Barni,et al.  A DCT-domain system for robust image watermarking , 1998, Signal Process..

[46]  Gaurav Bhatnagar,et al.  A new robust reference watermarking scheme based on DWT-SVD , 2009, Comput. Stand. Interfaces.