Open Access Open Access  Restricted Access Subscription or Fee Access

Biometric Data Security Using Watermarking Based on Vector Quantization

Ahmed Sabri(1*), Mohamed Ouslim(2)

(1) LMSE Lab. Electronics dept., University USTO-MB, Algeria
(2) LMSE Lab. Electronics dept., University USTO-MB, Algeria
(*) Corresponding author


DOI: https://doi.org/10.15866/irecos.v12i4.12737

Abstract


In this paper, we present a new watermarking method applied to biometric data for the purpose of securing their transmission over a computer network. To perform this task, we combined the fingerprint modality with that of the iris. We proceeded by merging the two biometric signatures using the watermarking based on vector quantization. The proposed technique extracts the main characteristics from the fingerprint image to mask the binary iris code image. This iris code is obtained from the eye image after several transformations. This choice is found to be the obvious combination solution for the type of the manipulated standard images. The vector quantization method was implemented based on Voronoi diagram using a codebook generated from a new chaotic system. The robustness of this technique was extensively tested using several simulation scenarios handling adequate database images. The results show that the proposed method is robust enough against JPEG compression. Other tests covered also different simulated computer attacks of the watermarked image using several types of median, mean and Gaussian blur filters. In this case, the filter sizes are taken large enough i.e., (10 × 10). The overall obtained results are satisfactory and very encouraging.
Copyright © 2017 Praise Worthy Prize - All rights reserved.

Keywords


Biometric Data; Chaotic Map; Fingerprint; Iris; Vector Quantization; Watermarking

Full Text:

PDF


References


C. Sousedik and C. Busch, “Presentation attack detection methods for fingerprint recognition systems: a survey”, Iet. Biometrics, Vol. 3, no. 4, pp. 219–233, 2014.
http://dx.doi.org/10.1049/iet-bmt.2013.0020

N. Poh, J. V. Kittler and T. Bourlai, “Quality-based score normalization with device qualitative information for multimodal biometric fusion”, IEEE Trans.Sys., Vol. 40, no. 3, pp. 539–554, 2010.
http://dx.doi.org/10.1109/tsmca.2010.2041660

V. Conti, C. Militello, F. Sorbello and S. Vitabile, “A Frequency-based Approach for Features Fusion in Fingerprint and Iris Multimodal Biometric Identification Systems”, IEEE trans. Sys. Vol. 40, no. 4, July 2010.
http://dx.doi.org/10.1109/tsmcc.2010.2045374

L. Y. Hsu and H. T. Hu, “Robust blind image watermarking using crisscross inter-block prediction in the DCT domain”, J. Vis. Commun. Image R., Vol. 46, no. 4, pp. 33-47, July 2017.
http://dx.doi.org/10.1016/j.jvcir.2017.03.009

J. Guo, P. Zheng, J. Huang, “Secure watermarking scheme against watermark attacks in the encrypted domain”, J. Vis. Commun. Image R., Vol. 30, no. 4, pp. 125-135, July 2015.
http://dx.doi.org/10.1016/j.jvcir.2015.03.009

A. Tareef, A. Al-Ani, “A highly secure oblivious sparse coding-based watermarking system for ownership verification”, Expert Systems with Applications, Vol. 42, no. 4, pp. 2224–2233, March 2015.
http://dx.doi.org/10.1016/j.eswa.2014.09.055

T. Dutta, H. P. Gupta, “A robust watermarking framework for High Efficiency Video Coding (HEVC) – Encoded video with blind extraction process” J. Vis. Commun. Image R., Vol. 38, no. 4, pp. 29-44, July 2016.
http://dx.doi.org/10.1016/j.jvcir.2015.12.007

P. Anitha, K. N. Rao, V. Rajasekhar, C. H. Krishna,” Security for Biometrics Protection between Watermarking and Visual Cryptography”, SSRG Int. J. Elec. and Commun Eng., ICEEMST’17, March 2017.
http://dx.doi.org/10.1117/12.703940

C. Whitelam, N. Osia, T.Bourlai, “Securing multimodal biometric data through watermarking and steganography”, Technologies for Homeland Security (HST), IEEE Int. Conf., pp. 61-66, 2013.
http://dx.doi.org/10.1109/ths.2013.6698977

S. Batra, H. K. Khattra, “An Improved Data Transfer Technique Using Steganography with Watermarking and Visual Cryptography”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol.3, no. 7, pp. 2278-3075, 2013.
http://dx.doi.org/10.17577/ijertv4is050361

R. Warkar, P. More, D. Waghole, “Digital audio watermarking and image watermarking for information security”, Pervasive Computing (ICPC), International Conference on, pp.1-5, 2015.
http://dx.doi.org/10.1109/pervasive.2015.7086980

R. AshokaRajan, R. Angelinjosphia, P. Gayathri, T. Rajendran, P. Anandhakumar, “A novel approach for secure ATM transactions using fingerprint watermarking”, Advanced Computing (ICoAC), Fifth International Conference on, pp.547-552, 2013.
http://dx.doi.org/10.1109/icoac.2013.6922010

S. M. Elshoura, D. B. Megherbi, “A secure high capacity full-gray scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments”, Signal Processing: Image Communication, Vol. 28, no. 5, pp. 531–552, 2013.
http://dx.doi.org/10.1016/j.image.2012.12.005

H. A. Abdallah, et al., “Robust image watermarking method using Homomorphic Block-Based SVD”, Optik - Int. J. Light Electron Opt., Vol. 127, no. 4, pp. 2374–2381, February 2016.
http://dx.doi.org/10.1016/j.ijleo.2015.10.050

Z. M. Lu, W. Xing, D. G. Xu and S. H. Sun, “Digital image watermarking method based on vector quantization with labeled codewords”, IEICE Trans. Information and Systems. Vol. 12, pp. 2786-2789, 2003.
http://dx.doi.org/10.1109/tip.2005.847324

P. Blythe and J. Fridrich, “Secure digital camera”, Proceedings of Digital Forensic Research Workshop (DFRWS), pp. 17–19, 2004.
http://dx.doi.org/10.1016/j.diin.2006.06.017

R. Thankia, K. Borisagar, “Sparse Watermarking Technique for Improving Security of Biometric System”, Procedia Computer Science, Vol. 70, pp. 251 – 258, 2015.
http://dx.doi.org/10.1016/j.procs.2015.10.083

M. Bin, W. Yunhong, L. Chunlei, Z. Zhaoxiang, H. Di, “Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking”, Multimed Tools Appl, Vol.72, pp. 637–666, 2014.
http://dx.doi.org/10.1007/s11042-013-1372-5

B. Ma, Y. Wang, C. Li, Z. Zhang, and D. Huang, “Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking”, Multimedia toolsand applications, Vol. 72, No. 1, pp. 637- 666, 2014.
http://dx.doi.org/10.1007/s11042-013-1372-5

V. Yano, A. Zimmer, and L. L. Ling, “Multimodal biometric authentication based on iris pattern and pupil light reflex”, Proceedings of 21st International Conference on In Pattern Recognition (ICPR), pp. 2857-2860, 2012.
http://dx.doi.org/10.1007/978-3-642-39094-4_11

H. Saevanee, N. Clarke, S. Furnell, and V. Biscione, “Continuous user authentication using multi-modal biometrics,” Computers &Security, Vol. 53, pp. 234-246, 2015.
http://dx.doi.org/10.1016/j.cose.2015.06.001

R. Thanki and K. Borisagar, “Biometric Watermarking Technique Based on CS Theory and Fast Discrete Curvelet Transform for Face and Fingerprint Protection”, Sig. Proc. Int. Recognit. Sys. Advances in Intelligent Systems and Computing, Springer, Vol. 425, pp. 133-144, 2016.
http://dx.doi.org/10.1007/978-3-319-28658-7_12

Nematollahi, M.A., Gamboa-Rosales, H., Martinez-Ruiz, F.J. et al.“Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition”, Multimed. Tools Appl., springer, Vol. 76, no. 5, pp. 7251 – 7281, March 2017.
http://dx.doi.org/10.1007/s11042-016-3350-1

A. Sabri, “Combinaison de la cryptographie et du watermarking pour renforcer la sécurité de la transmission des données biométriques dans un réseau informatique”, thèse de magister, Dept. Elect. Eng. Univ USTOMB, Oran, Alegria, 2013.
http://dx.doi.org/10.4000/communicationorganisation.4093

J. Liu and Z. Lu, “A Multipurpose Audio Watermarking Algorithm Based on Vector Quantization in DCT Domain“, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, Vol. 3, no. 7, pp. 1462–1467, 2009.
http://dx.doi.org/10.1109/isda.2008.31

X. Ding, Z. M. Lu and F. X. Yu, “A Robust Blind Image Watermarking Scheme Based on Classified Vector Quantization”, Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, no. 1, pp. 74-80 ,January 2015.
http://dx.doi.org/10.1007/978-3-319-50209-0_6

K. Maeno, Q. Sun, S.-F. Chang, M. Suto,” New semi-fragile image authentication watermarking techniques using random bias and non-uniform quantization”, IEEE Trans. Multimedia, Vol. 8, no. 1, pp. 32 - 45, 2006.
http://dx.doi.org/10.1109/tmm.2005.861293

J.-C. Chuang, Y.-C. Hu, “An adaptive image authentication scheme for vector quantization compressed image”, J Visual Commun Image Represent, Vol. 22, no. 5, pp. 440 – 449, July 2011.
http://dx.doi.org/10.1016/j.jvcir.2011.03.011

Y.-H. Chen, H.-C. Huang, “A Quantization-Based Image Watermarking Scheme Using Vector Dot Product”, Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies, Springer, Cham, Vol. 63, pp. 43-50, 2017.
http://dx.doi.org/10.1007/978-3-319-50209-0_6

Sabri, A., Ouslim, M., Application of Chaotic Encryption to Secure the Fingerprint Data, (2016) International Review on Computers and Software (IRECOS), 11 (9), pp. 816-826.
http://dx.doi.org/10.15866/irecos.v11i9.10190

H. Zhou, “A design methodology of chaotic stream ciphers and the realization problems in finite precision”, Ph.D. dissertation, Dept. Elect. Eng., Fudan Univ., Shanghai, China, 1996.
http://dx.doi.org/10.1007/978-3-642-82865-2_2

http://en.pudn.com/downloads72/sourcecode/others/detail26410_en.html

http://iris.di.ubi.pt/index_arquivos/Page374.html

Y. Linde, A. Buzo, and R. M. Gray, ”An algorithm for vector quantizer design”, IEEE Trans. Comm., Vol. 28, no.1, pp. 84-95, 1980.
http://dx.doi.org/10.1109/tcom.1980.1094577

Z. M. Lu, W. Xing, D. G. Xu, and S. H. Sun, “Digital image watermarking method based on vector quantization with labeled codewords”, IEICE Transactions on Information and Systems, Vol. 86, no. 12, pp. 2786-2789, 2003.
http://dx.doi.org/10.1109/tip.2005.847324


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2018 Praise Worthy Prize