JOURNAL ARTICLE

Biometric Image Authentication using Watermarking

Hyobin LeeJaehyuck LimSunjin YuSang‐Ha KimSangyoun Lee

Year: 2006 Journal:   2006 SICE-ICASE International Joint Conference Vol: 148 Pages: 3950-3953

Abstract

In this paper, we propose an invertible authentication watermarking algorithm which can detect block-wise malicious manipulations in biometric images. Our method uses an invertible watermark that can also detect manipulated area simultaneously. Virtually all watermarking schemes introduce a small amount of irrecoverable distortion in original biometric images. But our new method is invertible in the sense that, if the data is deemed authentic, distortion due to authentication can be removed if it becomes necessary to obtain the original biometric image. In our method two watermarks are embedded into biometric image. The first one is based on the conventional method which can completely remove the distortion due to authentication if the data is deemed authentic. The second one can detect the block-wise malicious manipulation using the cyclic redundancy check (CRC) concept in the image block. Our proposed method can classify a test image into two types; authentic, and manipulated. Also, this technique provides cryptographic strength when verifying image integrity because the probability of making an undetectable modification to the image can be directly related to a secure cryptographic element, such as a hash function

Keywords:
Digital watermarking Computer science Watermark Biometrics Authentication (law) Computer vision Hash function Block (permutation group theory) Image (mathematics) Cryptography Redundancy (engineering) Artificial intelligence Message authentication code Invertible matrix Distortion (music) Pattern recognition (psychology) Algorithm Computer security Mathematics

Metrics

32
Cited By
5.26
FWCI (Field Weighted Citation Impact)
7
Refs
0.97
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Digital Media Forensic Detection
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

JOURNAL ARTICLE

IMPLEMENTATION OF IMAGE AUTHENTICATION USING DIGITAL WATERMARKING WITH BIOMETRIC

D HARIKASYED NOORULLAH

Journal:   International Journal of Engineering Technology and Management Sciences Year: 2023 Vol: 7 (1)Pages: 154-167
JOURNAL ARTICLE

A robust technique for biometric image authentication using invisible watermarking

Payal GargAjit Jain

Journal:   Multimedia Tools and Applications Year: 2022 Vol: 82 (2)Pages: 2237-2253
BOOK-CHAPTER

Multimodal Biometric Authentication Using Watermarking Technique

C. VensilaA. Boyed Wesley

Lecture notes in electrical engineering Year: 2022 Pages: 79-91
BOOK-CHAPTER

Protecting Biometric Templates Using Authentication Watermarking

Chunlei LiBin MaYunhong WangZhaoxiang Zhang

Lecture notes in computer science Year: 2010 Pages: 709-718
© 2026 ScienceGate Book Chapters — All rights reserved.