41
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Augmenting security of biometric with watermarking

&
Pages 189-196 | Received 08 Jun 2012, Accepted 07 Aug 2012, Published online: 06 Dec 2013

References

  • Jain A., Pankanti S. and Bolle R.. BIOMETRICS: Personal Identification in Networked Society, 1999 (Kluwer, New York).
  • Ribaric S., Ribaric D. and Pavesic N.. Multimodal biometric user-identification system for network-based applications. IEE Proc. Vis. Image Signal Process., 2003, 150, 409–416.
  • Schneier B.. The uses and abuses of biometrics. Commun. ACM, 1999, 42, 136.
  • Maltoni D., Maio D., Jain A. K. and Prabhakar S.. Handbook of Fingerprint Recognition, 2003 (Springer-Verlag, New York).
  • Uludag U. and Jain A. K.. Attacks on biometric systems: a case study in fingerprints. Proc. SPIE, 2004, 5306, 622–633.
  • Ratha N. K., Connell J. H. and Bolle R. M.. An analysis of minutiae matching strength. Lect. Notes Computer Sci., 2001, 2091, 223–228.
  • Claus V. and Ralf S.. Approaches to biometric watermarks for owner authentication. Proc. SPIE, 2001, 43, 209–219.
  • Jain A. K. and Uludag U.. Hiding fingerprint minutiae in images, Proc. 3rd Workshop on Automatic identification advanced technologies: Auto ID ’02, Tarrytown, NY, USA, March 2002, IEEE, pp. 97–102.
  • Jain A. K. and Uludag U.. Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell., 2003, 25, 1494–1498.
  • Vatsa M., Singh R. and Noore A.. Improving biometric recognition accuracy and robustness using DWT and SVM watermarking. IEICE Electron. Express, 2005, 2, 362–367.
  • Vatsa M., Singh R., Noore A., Houck M. M. and Morris K.. Robust biometric image watermarking for fingerprint and face template protection. IEICE Electron. Express, 2006, 3, 23–28.
  • Ratha N. K., Connell J. H. and Bolle R. M.. Secure data hiding in wavelet compressed fingerprint images, Proc. 2000 ACM Workshop on Multimedia, Los Angeles, CA, USA, October 2000, ACM, pp. 127–130.
  • Jain A. K., Uludag U. and Hsu R. L.. Hiding a face in a fingerprint image, Proc. Int. Conf. on Pattern recognition: ICPR ’02, Quebec City, Canada, August 2002, IEEE Computer Society, Vol. 3, pp. 756–759.
  • Noore A., Singh R., Vatsa M. and Houck M. M.. Enhancing security of fingerprints through contextual biometric watermarking. J. Forensic Sci. Int., 2007, 169, 188–194.
  • Komninos N. and Dimitriou T.. Protecting biometric templates with image watermarking technique, Lect. Notes Computer Sci., 2007, 4642, 114–123.
  • Al-Assam H., Sellahewa H. and Jassim S. A.. Lightweight approach for biometric template protection. Proc. SPIE, 2009, 7351, 73510.
  • Abhishek N., Karthik N. and Jain A. K.. Biometric template transformation: a security analysis. Proc. SPIE, 2010, 7541, 75410.
  • Paunwala M. and Patnaik S.. Robust biometric watermarking using image intrinsic local property for e-database applications, Proc. IASTED Int. Conf. on Computer vision, Vancouver, BC, Canada, June 2011, IASTED, pp. 240–247.
  • Patel H. M., Modi C. K., Paunwala M. and Patnaik S.. Human identification by partial iris segmentation using pupil circle growing based on binary integrated edge intensity curve, Proc. IEEE Int. Conf. on Communication systems and network technologies: CSNT ’11, Katra Jammu, India, June 2011, IEEE, pp. 333–338.
  • Daugman J. G.. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell., Nov. 1993, 15, 1148–1161.
  • Ng T. W., Tay T. L. and Khor S. W.. Iris recognition using rapid haar wavelet decomposition, Proc. 2nd Int. Conf. on Signal processing systems: ICSPS ’10, Dalian, China, July 2010, IEEE, Vol. 1, pp. 820–823.
  • Fridric J.. Applications of data hiding in digital images, Proc. 5th Int. Symp.on Signal processing and its applications: ISSPA ’99, Brisbane, Australia, August 1999, IEEE, tutorial.
  • Ross A. and Jain A. K.. Information fusion in biometrics. Pattern Recogn. Lett., 2003, 24, 2115–2125.
  • Available at: <http://bias.csr.unibo.it/fvc2004/download.asp>
  • Available at: <http://biometrics.idealtest.org/findTotalDbByMode.do?mode = Iris>
  • Wang Y. and Pearmain A.. Blind image data hiding based on self reference. Pattern Recogn. Lett., 2004, 25, 1681–1689.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.