Region-Based Watermarking of Biometric Images: Case Study in Fingerprint Images

In this paper, a novel scheme to watermark biometric images is proposed. It exploits the fact that biometric images, normally, have one region of interest, which represents the relevant part of information processable by most of the biometric-based identification/authentication systems. This proposed scheme consists of embedding the watermark into the region of interest only; thus, preserving the hidden data from the segmentation process that removes the useless background and keeps the region of interest unaltered; a process which can be used by an attacker as a cropping attack. Also, it provides more robustness and better imperceptibility of the embedded watermark. The proposed scheme is introduced into the optimum watermark detection in order to improve its performance. It is applied to fingerprint images, one of the most widely used and studied biometric data. The watermarking is assessed in two well-known transform domains: the discrete wavelet transform (DWT) and the discrete Fourier transform (DFT). The results obtained are very attractive and clearly show significant improvements when compared to the standard technique, which operates on the whole image. The results also reveal that the segmentation (cropping) attack does not affect the performance of the proposed technique, which also shows more robustness against other common attacks.

[1]  Venu Govindaraju,et al.  Robust Point-Based Feature Fingerprint Segmentation Algorithm , 2007, ICB.

[2]  Thomas S. Huang,et al.  An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..

[4]  Nalini K. Ratha,et al.  Secure data hiding in wavelet compressed fingerprint images , 2000, MULTIMEDIA '00.

[5]  Fernando Pérez-González,et al.  Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications , 2001, Signal Process..

[6]  A. Bouridane,et al.  Maximum-Likelihood Based Watermark Detection on Fingerprint Images , 2007 .

[7]  Mauro Barni,et al.  Optimum decoding and detection of multiplicative watermarks , 2003, IEEE Trans. Signal Process..

[8]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[9]  Thomas S. Huang,et al.  Optimum detection and decoding of multiplicative watermarks in DFT domain , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[10]  Lahouari Ghouti,et al.  Protecting Fingerprint Data Using Watermarking , 2006, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06).

[11]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[12]  Minh N. Do,et al.  Wavelet-based texture retrieval using generalized Gaussian density and Kullback-Leibler distance , 2002, IEEE Trans. Image Process..

[13]  N. Otsu A threshold selection method from gray level histograms , 1979 .

[14]  Iwan Setyawan,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000 .

[15]  Hari Krishna Garg,et al.  Wavelet domain watermarking using maximum-likelihood detection , 2004, IS&T/SPIE Electronic Imaging.

[16]  Mauro Barni,et al.  A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..

[17]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[18]  Christopher G. Harris,et al.  A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.

[19]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[20]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.