Analysis of biometric data using watermarking techniques

Analysis of biometric data using watermarking techniques

This paper evaluates and analyses the discrete wavelet transform (DWT) frequency bands for embedding and extracting of the biometric data using DWT single level and multilevel watermarking approach with and without the use of alpha blending approach. In addition, singular value decomposition (SVD) combined with DWT is used to embed and extract the watermark image. The performance of compression and decompression approaches has been analyzed to examine the robustness and to check whether the compression function does destroy the integrity of the watermarked image. We investigate the proposed approach to understand how robust the watermarked on different sub-band is against the image processing and geometric attacks. The experimental results show that the DWT multilevel and SVD watermarking approach is more robust than the other watermarking methods implemented in this paper. The DWT bands dominate the approximate coefficient band (LL) in high-intensity alpha value. When the intensity is reduced, the coefficient standout to be very robust against the remaining bands.

___

  • [1] Jain AK, Nandakumar. Biometric authentication: system security and user privacy. IEEE Computer 2012; 45 (11): 87-92. doi: 10.1109/MC.2012.364
  • [2] Khan MK, Zhang J, Tian L. Protecting biometric data for personal identification. In: Li SZ, Lai J, Tan T, Feng G, Wang Y (editors). Advances in Biometric Person Authentication. Lecture Notes in Computer Science Berlin. Heidelberg, Germany: Springer, 2004, pp. 629-638. doi: 10.1007/978-3-540-30548-472
  • [3] Jain AK, Nandakumar K, Nagar A. Biometric template security. Eurasip Journal on Advances in Signal Processing 2008; 113: 1-17. doi: 10.1155/2008/579416
  • [4] Prabhakar S, Pankanti S, Jain AK. Biometric recognition: Security and privacy concerns. IEEE Security & Privacy 2003; 1 (2): 33-42. doi: 10.1109/MSECP.2003.1193209
  • [5] Anil KJ, Umut U. Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence 2003; 25 (11): 1494-1498.
  • [6] Douglas M, Bailey K, Leeney M, Curran K. An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Applications 2018; 77 (13): 17333–17373. doi: 10.1007/s11042-017-5308-3
  • [7] Siddiqui A, Kaur A. A secure and robust image watermarking system using wavelet domain. In: IEEE 7th International Conference on Cloud Computing, Data Science and Engineering Confluence; Noida, India; 2017. pp. 599-604.
  • [8] Hasan KK, Ngah UK, Salleh MFM. Multilevel decomposition discrete wavelet transform for hardware image compression architectures applications. In: IEEE International Conference on Control System, Computing and Engineering; Mindeb, Malaysia; 2013. pp. 315-320.
  • [9] Zargar AJ. Digital watermarking using discrete wavelet techniques with the help of multilevel decomposition technique. International Journal of Computer Applications 2014; 101 (2): 25-29.
  • [10] Sharma P, Swami S. Digital image watermarking using 3 level discrete wavelet transform. In: Xun L (editor). Advances in Intelligent Systems Research. Tianjin, China: Atlantis Press, 2013, pp. 129-133.
  • [11] Yang W, Hu J, Wang S, Yang J, Shu L. Biometrics for securing mobile payments: benefits, challenges and solutions. In: Proceedings of the 6th International Congress on Image and Signal Processing; Hangzhou, China; 2013. pp. 1699-1704.
  • [12] Rzouga HL, Dorizzi B, Essoukri BAN. A combined watermarking approach for securing biometric data. Signal Processing: Image Communication 2017; 55: 23-31. doi: 10.1016/j.image.2017.03.008
  • [13] Ali M, Ahn CW. An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain. Signal Processing 2014; 94: 545-556. doi: 10.1016/j.sigpro.2013.07.024
  • [14] Whitelam C, Osia N, Bourlai T. Securing multimodal biometric data through watermarking and steganography. In: IEEE International Conference on Technologies for Homeland Security (HST); Waltham, MA, USA; 2013. pp. 61-66.
  • [15] Ouslim M, Sabri A, Mouhadjer H. Securing biometric data by combining watermarking and cryptography. In: 2nd International Conference on Advances in Biomedical Engineering; Tripoli, Lebanon; 2013. pp. 179-182.
  • [16] Alkhathami M, Han F, Van SR. Fingerprint image protection using two watermarks without corrupting minutiae. In: IEEE 8th Conference on Industrial Electronics and Applications; Melbourne, VIC, Australia; 2013. pp. 1151-1155.
  • [17] Islam MR, Sayeed MS, Samraj A. Biometric template protection using watermarking with hidden password encryption. In: Proceedings International Symposium on Information Technology; Kuala Lumpur, Malaysia; 2008. pp. 1-5.
  • [18] Tareef A, Al-Ani A. A highly secure oblivious sparse coding-based watermarking system for ownership verification. Expert Systems with Applications 2014; 42 (4): 2224-2233. doi: 10.1016/j.eswa.2014.09.055
  • [19] Kaur R, Jindal S. Robust digital image watermarking in high frequency band using median filter function based on DWT-SVD. In: International Conference on Advanced Computing and Communication Technologies; Rohtak, India; 2014. pp. 47-52.
  • [20] Araghi TK, Manaf AA, Araghi SK. A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition. Expert Systems with Applications 2018; 112: 208-228. doi: 10.1016/j.eswa.2018.06.024
  • [21] Chakraborty S, Rao KR. Fingerprint enhancement by directional filtering. International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology; Phetchaburi, Thailand; 2012. pp. 1-4.
  • [22] Tao H, Chongmin L, Zain JM, Abdalla AN. Robust image watermarking theories and techniques: a review. Journal of Applied Research and Technology 2014; 12 (1): 122-138. doi: 10.1016/S1665-6423(14)71612-8
  • [23] Lai C, Tsai C. Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Transactions on Instrumentation and Measurement 2010; 59 (11): 3060-3063.
  • [24] Abraham J, Kwan P, Gao J. Fingerprint matching using a hybrid shape and orientation descriptor. In: Jucheng Y, Norman P (editors). State of the Art in Biometrics. Rijeka, Crotia: Intech Press, 2011, pp. 25-56.
  • [25] Dorizzi B, Cappelli R, Ferrara M, Maio D, Maltoni D et al. Fingerprint and on-line signature verification competitions. In: Proceedings of the International Conference on Biometrics (ICB); Alghero, Italy; 2009. pp. 725-732.
  • [26] Thomaz CE, Giraldi GA. A new ranking method for principal components analysis and its application to face image analysis. Image and Vision Computing 2010; 28 (6): 902-913.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: 6
  • Yayıncı: TÜBİTAK
Sayıdaki Diğer Makaleler

A new grid partitioning technology for location privacy protection

Yue SUN, Lei ZHANG, Jing LI, Zhen ZHANG

Adaptiv Adaptive fast sliding neur e fast sliding neural contr al control for r ol for robot manipulat obot manipulator

Barış ÖZYER

A new configuration for four-switch three-phase inverters based on a switched-capacitor step-up cell for electric vehicles application

Alireza LAHOOTI ESHKEVARI, Ali MOSALLANEJAD, Mohammadsadegh SEPASIAN

Binary multicriteria collaborative filtering

Alper BİLGE, Emre YALÇIN

An energy-efficient lightweight security protocol for optimal resource provenance in wir enance in wireless sensor networks eless sensor networks

Sujesh LAL, Joe PRATHAP

Quantum key distribution over free space optic (FSO) channel using higher order Gaussian beam spatial modes

Muhammad KAMRAN, Muhammad Mubashir KHAN, Tahir MALIK, Asad ARFEEN

A new smart networking architecture for container network functions

Pınar BÖLÜK, Gülsüm ATICI

Influence of varying magnet pole-arcs and step-skew on permanent magnet AC synchronous motor performance

Yücel DEMİR, Metin AYDIN, Oğuzhan OCAK

An intelligent diagnostic method based on optimizing B-cell pool clonal selection classification algorithm

Chao LAN, Hongli ZHANG, Xin SUN, Zhongyuan REN

Estimating synthetic load profile based on student behavior using fuzzy inference system for demand side management application

Nadhirah OMAR, Mohd Aifaa MOHD ARIFF, Ainnur Farah Izzati MOHD SHAH, Muhammad Syafiq Anwar MUSTAZA