8 research outputs found
Recommended from our members
Protecting biometric templates with image watermarking techniques
Biometric templates are subject to modifications for identity fraud especially when they are stored in databases. In this paper, a new approach to protecting biometric templates with image watermarking techniques is proposed. The novelty of this approach is that we have combined lattice and block-wise image watermarking techniques to maintain image quality along with cryptographic techniques to embed fingerprint templates into facial images and vice-versa. Thus, protecting them from being modified
Contextual biometric watermarking of fingerprint images
This research presents contextual digital watermarking techniques using face and demographic text data as multiple watermarks for protecting the evidentiary integrity of fingerprint image. The proposed techniques embed the watermarks into selected regions of fingerprint image in MDCT and DWT domains. A general image watermarking algorithm is developed to investigate the application of MDCT in the elimination of blocking artifacts. The application of MDCT has improved the performance of the watermarking technique compared to DCT. Experimental results show that modifications to fingerprint image are visually imperceptible and maintain the minutiae detail. The integrity of the fingerprint image is verified through high matching score obtained from the AFIS system. There is also a high degree of correlation between the embedded and extracted watermarks. The degree of similarity is computed using pixel-based metrics and human visual system metrics. It is useful for personal identification and establishing digital chain of custody. The results also show that the proposed watermarking technique is resilient to common image modifications that occur during electronic fingerprint transmission
Establishing the digital chain of evidence in biometric systems
Traditionally, a chain of evidence or chain of custody refers to the chronological documentation, or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic. Whether in the criminal justice system, military applications, or natural disasters, ensuring the accuracy and integrity of such chains is of paramount importance. Intentional or unintentional alteration, tampering, or fabrication of digital evidence can lead to undesirable effects. We find despite the consequences at stake, historically, no unique protocol or standardized procedure exists for establishing such chains. Current practices rely on traditional paper trails and handwritten signatures as the foundation of chains of evidence.;Copying, fabricating or deleting electronic data is easier than ever and establishing equivalent digital chains of evidence has become both necessary and desirable. We propose to consider a chain of digital evidence as a multi-component validation problem. It ensures the security of access control, confidentiality, integrity, and non-repudiation of origin. Our framework, includes techniques from cryptography, keystroke analysis, digital watermarking, and hardware source identification. The work offers contributions to many of the fields used in the formation of the framework. Related to biometric watermarking, we provide a means for watermarking iris images without significantly impacting biometric performance. Specific to hardware fingerprinting, we establish the ability to verify the source of an image captured by biometric sensing devices such as fingerprint sensors and iris cameras. Related to keystroke dynamics, we establish that user stimulus familiarity is a driver of classification performance. Finally, example applications of the framework are demonstrated with data collected in crime scene investigations, people screening activities at port of entries, naval maritime interdiction operations, and mass fatality incident disaster responses
Advancing iris biometric technology
PhD ThesisThe iris biometric is a well-established technology which is already in use in
several nation-scale applications and it is still an active research area with several
unsolved problems. This work focuses on three key problems in iris biometrics
namely: segmentation, protection and cross-matching. Three novel
methods in each of these areas are proposed and analyzed thoroughly.
In terms of iris segmentation, a novel iris segmentation method is designed
based on a fusion of an expanding and a shrinking active contour by integrating
a new pressure force within the Gradient Vector Flow (GVF) active
contour model. In addition, a new method for closed eye detection is proposed.
The experimental results on the CASIA V4, MMU2, UBIRIS V1 and
UBIRIS V2 databases show that the proposed method achieves state-of-theart
results in terms of segmentation accuracy and recognition performance
while being computationally more efficient. In this context, improvements
by 60.5%, 42% and 48.7% are achieved in segmentation accuracy for the
CASIA V4, MMU2 and UBIRIS V1 databases, respectively. For the UBIRIS
V2 database, a superior time reduction is reported (85.7%) while maintaining
a similar accuracy. Similarly, considerable time improvements by 63.8%,
56.6% and 29.3% are achieved for the CASIA V4, MMU2 and UBIRIS V1
databases, respectively.
With respect to iris biometric protection, a novel security architecture is designed
to protect the integrity of iris images and templates using watermarking
and Visual Cryptography (VC). Firstly, for protecting the iris image, text
which carries personal information is embedded in the middle band frequency
region of the iris image using a novel watermarking algorithm that randomly
interchanges multiple middle band pairs of the Discrete Cosine Transform
(DCT). Secondly, for iris template protection, VC is utilized to protect the
iii
iris template. In addition, the integrity of the stored template in the biometric
smart card is guaranteed by using the hash signatures. The proposed method
has a minimal effect on the iris recognition performance of only 3.6% and
4.9% for the CASIA V4 and UBIRIS V1 databases, respectively. In addition,
the VC scheme is designed to be readily applied to protect any biometric binary
template without any degradation to the recognition performance with a
complexity of only O(N).
As for cross-spectral matching, a framework is designed which is capable of
matching iris images in different lighting conditions. The first method is designed
to work with registered iris images where the key idea is to synthesize
the corresponding Near Infra-Red (NIR) images from the Visible Light (VL)
images using an Artificial Neural Network (ANN) while the second method
is capable of working with unregistered iris images based on integrating the
Gabor filter with different photometric normalization models and descriptors
along with decision level fusion to achieve the cross-spectral matching. A
significant improvement by 79.3% in cross-spectral matching performance is
attained for the UTIRIS database. As for the PolyU database, the proposed
verification method achieved an improvement by 83.9% in terms of NIR vs
Red channel matching which confirms the efficiency of the proposed method.
In summary, the most important open issues in exploiting the iris biometric
are presented and novel methods to address these problems are proposed.
Hence, this work will help to establish a more robust iris recognition system
due to the development of an accurate segmentation method working for iris
images taken under both the VL and NIR. In addition, the proposed protection
scheme paves the way for a secure iris images and templates storage.
Moreover, the proposed framework for cross-spectral matching will help to
employ the iris biometric in several security applications such as surveillance
at-a-distance and automated watch-list identification.Ministry of Higher Education and
Scientific Research in Ira