Hiding iris data for authentication of digital images using wavelet theory

This paper introduces an efficient approach to protect the ownership by hiding an iris data into digital image for an authentication purpose. It is based on the theory of wavelets. The idea is to secretly embed biometric data (iris print) in the content of the image identifying the owner. The system is based on an empirical analysis of biometric and watermarking technologies, and it is split into several processes. The first process is based on iris image analysis, which aids the generation of the iris code (watermark); the second and the third processes deal with embedding and detecting a watermark; and the last process deals with the authentication. A new metric that measures the objective quality of the image based on the detected watermark bit is introduced, which does not require the original unmarked image for watermark detection. Simulation results show the effectiveness and efficiency of the proposed approach.

[1]  Jafar M. H. Ali,et al.  An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory , 2003 .

[2]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[3]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video : Identification and protection of multimedia information , 1999 .

[4]  David Zhang Biometric solutions : for authentication in an E-world , 2002 .

[5]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999 .

[6]  Zixiang Xiong,et al.  Multiresolution watermarking for images and video: a unified approach , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[7]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[8]  Ioannis Pitas,et al.  Copyright protection of images using robust digital signatures , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[9]  Ping Wah Wong,et al.  A Watermark for Image Integrity and Ownership Verification , 1998, PICS.

[10]  Kwanyong Lee,et al.  Improved Techniques for an Iris Recognition System with High Performance , 2001, Australian Joint Conference on Artificial Intelligence.

[11]  Min Wu,et al.  Data hiding in digital binary image , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[12]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[13]  M. Victor Wickerhauser,et al.  Wavelets: Algorithms and Applications (Yves Meyer) , 1994, SIAM Rev..

[14]  Ingemar J. Cox,et al.  Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[15]  Ingemar J. Cox,et al.  8 – Robust Watermarking , 2002 .

[16]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[17]  Deepa Kundur,et al.  Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[18]  Zixiang Xiong,et al.  Multiresolution watermarking for images and video , 1999, IEEE Trans. Circuits Syst. Video Technol..