Verification of iris image authenticity using fragile watermarking

*e-mail: aczajka@nask.pl Abstract. This paper proposes and evaluates a watermarking-based approach to certify the authenticity of iris images when they are captured by a genuine equipment. In the proposed method, the iris images are secretly signed before being used in biometric processes, and the resulting signature is embedded into the JPEG carrier image in the DCT domain in a data-dependent way. Any alteration of the original (certified) image makes the signature no longer corresponding to this image and this change can be quickly identified at the receiver site. Hence, it is called fragile watermarking to differentiate this method from regular watermarking that should present some robustness against image alterations. There is no need to attach any auxiliary signature data, hence the existing, already standardized transmission channels and storage protocols may be used. The embedding procedure requires to remove some part of the original information. But, by using the BATH dataset comprising 32 000 iris images collected for 1 600 distinct eyes, we verify that the proposed alterations have no impact on iris recognition reliability, although statistically significant, small differences in genuine score distributions are observed when the watermark is embedded to both the enrollment and verification iris images. This is a unique evaluation of how the watermark embedding of digital signatures into the ISO CROPPED iris images (during the enrollment, verification or both) influences the reliability of a well-established, commercial iris recognition methodology. Without loss in generality, this approach is targeted to biometric-enabled ID documents that deploy iris data to authenticate the holder of the document.

[1]  Marios Savvides,et al.  Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching , 2009, 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[2]  Alastair Allen,et al.  Effects of Reversible Watermarking on Iris Recognition Performance , 2014 .

[3]  Arun Ross,et al.  Iris Digital Watermarking , 2009, Encyclopedia of Biometrics.

[4]  P. Lipiński Watermarking software in practical applications , 2011 .

[5]  Dexin Zhang,et al.  DCT-Based Iris Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Swanirbhar Majumder,et al.  Singular value decomposition and wavelet-based iris biometric watermarking , 2013, IET Biom..

[7]  John Daugman,et al.  New Methods in Iris Recognition , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[8]  Richard Guest,et al.  Information technology -- 29107-7 Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 -- Part 7: Signature/sign time series data , 2011 .

[9]  George W. Quinn,et al.  Standard Iris Storage Formats , 2013, Handbook of Iris Recognition.

[10]  Wlodzimierz Kasprzak,et al.  Steganographic Authentication Method for Electronic IDs , 2013, ICIAR.

[11]  Andreas Uhl,et al.  Comparison of compression algorithms' impact on iris recognition accuracy II: revisiting JPEG , 2008, Electronic Imaging.

[12]  Zhenan Sun,et al.  Generation of iris sensor PRNU fingerprints from uncorrelated data , 2014, 2nd International Workshop on Biometrics and Forensics.

[13]  Abdulmotaleb El-Saddik,et al.  Combining DWT and LSB watermarking to secure revocable iris templates , 2010, 10th International Conference on Information Science, Signal Processing and their Applications (ISSPA 2010).

[14]  Jing Dong,et al.  Effects of watermarking on iris recognition performance , 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision.

[15]  Dexin Zhang,et al.  Correction to "DCT-Based Iris Recognition" , 2007, IEEE Trans. Pattern Anal. Mach. Intell..

[16]  W. Nowakowski,et al.  The average time complexity of probabilistic algorithms for finding generators in finite cyclic groups , 2015 .

[17]  Andreas Uhl,et al.  Experimental study on the impact of robust watermarking on iris recognition accuracy , 2010, SAC '10.

[18]  John Daugman,et al.  Effect of Severe Image Compression on Iris Recognition Performance , 2008, IEEE Transactions on Information Forensics and Security.

[19]  Jonathan Blackledge,et al.  Cryptography Using Steganography: New Algorithms and Applications , 2011 .

[20]  Edward J. Delp,et al.  A Review of Fragile Image Watermarks , 2007 .

[21]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[22]  Andreas Uhl,et al.  Evaluating the Impact of Iris Image Compression on Segmentation and Recognition Accuracy , 2012 .

[23]  Kefeng Fan,et al.  A Novel Digital Content Protection Scheme Combining Iris Identity Based Digital Signature and Semi-fragile Watermark , 2006, 2006 International Conference on Communication Technology.

[24]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[25]  Li Xia,et al.  Enhancing iris-feature security with steganography , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.

[26]  George W. Quinn,et al.  IREX I: Performance of Iris Recognition Algorithms on Standard Images | NIST , 2009 .

[27]  Petra Mutzel,et al.  A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.