Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking

Two-factor authentication with biometrics and smart-cards enabled by semi-fragile watermarking is proposed. Several advantages of the scheme as compared to earlier approaches are discussed and experiments for an iris-based recognition system demonstrate that semi-fragile integrity verification can be provided by the system. This is achieved without impact on recognition performance, since the slight degradation in terms of ROC behavior which is observed on the watermarked sample data is more than compensated by the additionally available template that is transferred from the smart-card to the matching site via watermarking technology.

[1]  Richa Singh,et al.  Enhancing security of fingerprints through contextual biometric watermarking. , 2007, Forensic science international.

[2]  Muhammad Khurram Khan,et al.  Robust Hiding of Fingerprint-Biometric Data into Audio Signals , 2007, ICB.

[3]  Arun Ross,et al.  Protecting Iris Images through Asymmetric Digital Watermarking , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.

[4]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..

[5]  Ralf Steinmetz,et al.  Approaches to biometric watermarks for owner authentification , 2001, IS&T/SPIE Electronic Imaging.

[6]  Anil K. Jain,et al.  Hiding Fingerprint Minutiae in Images , 2002 .

[7]  Daesung Moon,et al.  Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems , 2005, CIS.

[8]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[9]  Andreas Uhl,et al.  Watermarking as a Means to Enhance Biometric Systems: A Critical Survey , 2011, Information Hiding.

[10]  Jing Dong,et al.  Effects of watermarking on iris recognition performance , 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision.

[11]  Stan Z. Li,et al.  Advances in Biometrics, International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007, Proceedings , 2007, ICB.

[12]  Md. Rajibul Islam,et al.  Biometric template protection using watermarking with hidden password encryption , 2008, 2008 International Symposium on Information Technology.

[13]  Elisardo González-Agulla,et al.  Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth , 2008, Electronic Imaging.

[14]  Jana Dittmann,et al.  Biometrics and ID Management , 2011, Lecture Notes in Computer Science.

[15]  Jana Dittmann,et al.  Digital watermarking of biometric speech references: impact to the EER system performance , 2007, Electronic Imaging.

[16]  Jian-ping Li,et al.  A Novel Biometric Image Integrity Authentication Using Fragile Watermarking and Arnold Transform , 2008 .

[17]  T. Satonaka Biometric watermark authentication with multiple verification rule , 2002, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing.

[18]  Jan Wessnitzer,et al.  A Model of Non-elemental Associative Learning in the Mushroom Body Neuropil of the Insect Brain , 2007, ICANNGA.

[19]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[20]  Sharath Pankanti,et al.  Verification watermarks on fingerprint recognition and retrieval , 1999, Electronic Imaging.

[21]  Anil K. Jain,et al.  Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.

[22]  Andreas Uhl,et al.  Experimental study on the impact of robust watermarking on iris recognition accuracy , 2010, SAC '10.

[23]  Kang Ryoung Park,et al.  A Study on Iris Feature Watermarking on Face Data , 2007, ICANNGA.

[24]  Andreas Uhl,et al.  Attack against Robust Watermarking-Based Multimodal Biometric Recognition Systems , 2011, BIOID.