435 research outputs found

    Image Watermaking With Biometric Data For Copyright Protection

    Full text link
    In this paper, we deal with the proof of ownership or legitimate usage of a digital content, such as an image, in order to tackle the illegitimate copy. The proposed scheme based on the combination of the watermark-ing and cancelable biometrics does not require a trusted third party, all the exchanges are between the provider and the customer. The use of cancelable biometrics permits to provide a privacy compliant proof of identity. We illustrate the robustness of this method against intentional and unintentional attacks of the watermarked content

    A Survey on Biometrics based Digital Image Watermarking Techniques and Applications

    Get PDF
    The improvements in Internet technologies and growing demands on online multimedia businesses have made digital copyrighting as a major challenge for businesses that are associated with online content distribution via diverse business models including pay-per-view subscription trading etc Copyright protection and the evidence for rightful ownership are major issues associated with the distribution of any digital images Digital watermarking is a probable solution for digital content owners that offer security to the digital content In recent years digital watermarking plays a vital role in providing the apposite solution and numerous researches have been carried out In this paper an extensive review of the prevailing literature related to the Bio- watermarking is presented together with classification by utilizing an assortment of techniques In addition a terse introduction about the Digital Watermarking is presented to get acquainted with the vital information on the subject of Digital Watermarkin

    Security of Biometric Data Using Compressed Watermarking Technique

    Get PDF
    This paper has focus on biometric data security over open communication channel of biometric system. Here biometric data is encoded using cs theory and wavelet based embedding technique. The biometric data is convert into encoded sparse measurements which is generating using SVD, random seed and uniform quantization process. Then these encoded sparse measurements are embedding into the host color biometric data using wavelet based watermarking technique. This proposed technique has explored dimension reduction and computational security provided by compressive sensing. This proposed technique has also helps to compressed and to send secret data over noisy communication channel of biometric system against various attacks. The proposed technique provides more security compare to existed technique in literature due to CS theory. The novelty of proposed technique is that, watermark iris image information is compressed and encoded using CS theory and uniform quantization.DOI:http://dx.doi.org/10.11591/ijece.v4i5.664

    Establishing the digital chain of evidence in biometric systems

    Get PDF
    Traditionally, a chain of evidence or chain of custody refers to the chronological documentation, or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic. Whether in the criminal justice system, military applications, or natural disasters, ensuring the accuracy and integrity of such chains is of paramount importance. Intentional or unintentional alteration, tampering, or fabrication of digital evidence can lead to undesirable effects. We find despite the consequences at stake, historically, no unique protocol or standardized procedure exists for establishing such chains. Current practices rely on traditional paper trails and handwritten signatures as the foundation of chains of evidence.;Copying, fabricating or deleting electronic data is easier than ever and establishing equivalent digital chains of evidence has become both necessary and desirable. We propose to consider a chain of digital evidence as a multi-component validation problem. It ensures the security of access control, confidentiality, integrity, and non-repudiation of origin. Our framework, includes techniques from cryptography, keystroke analysis, digital watermarking, and hardware source identification. The work offers contributions to many of the fields used in the formation of the framework. Related to biometric watermarking, we provide a means for watermarking iris images without significantly impacting biometric performance. Specific to hardware fingerprinting, we establish the ability to verify the source of an image captured by biometric sensing devices such as fingerprint sensors and iris cameras. Related to keystroke dynamics, we establish that user stimulus familiarity is a driver of classification performance. Finally, example applications of the framework are demonstrated with data collected in crime scene investigations, people screening activities at port of entries, naval maritime interdiction operations, and mass fatality incident disaster responses

    Comparison of DCT, SVD and BFOA based multimodal biometric watermarking systems

    Get PDF
    AbstractDigital image watermarking is a major domain for hiding the biometric information, in which the watermark data are made to be concealed inside a host image imposing imperceptible change in the picture. Due to the advance in digital image watermarking, the majority of research aims to make a reliable improvement in robustness to prevent the attack. The reversible invisible watermarking scheme is used for fingerprint and iris multimodal biometric system. A novel approach is used for fusing different biometric modalities. Individual unique modalities of fingerprint and iris biometric are extracted and fused using different fusion techniques. The performance of different fusion techniques is evaluated and the Discrete Wavelet Transform fusion method is identified as the best. Then the best fused biometric template is watermarked into a cover image. The various watermarking techniques such as the Discrete Cosine Transform (DCT), Singular Value Decomposition (SVD) and Bacterial Foraging Optimization Algorithm (BFOA) are implemented to the fused biometric feature image. Performance of watermarking systems is compared using different metrics. It is found that the watermarked images are found robust over different attacks and they are able to reverse the biometric template for Bacterial Foraging Optimization Algorithm (BFOA) watermarking technique

    DCT Watermarking Approach for Security Enhancement of Multimodal System

    Get PDF

    Multiparty multilevel watermarking protocol for digital secondary market based on iris recognition technology

    Get PDF
    Background: In order to design secure digital right management architecture between different producers and different consumers, this paper proposes a multiparty and multilevel watermarking protocol for primary and secondary market. Comparing with the traditional buyer-seller watermarking protocols, this paper makes several outstanding achievements. Method: First of all, this paper extends traditional buyer-seller two-party architecture to multiparty architecture which contains producer, multiply distributors, consumers, etc. Secondly, this paper pays more attention on the security issues, for example, this paper applies iris recognition technology as an advanced security method. Conclusion: Finally, this paper also presents a second-hand market scheme to overcome the copyright issues that may happen in the real world. © 2017 Bentham Science Publishers
    corecore