Effects of Reversible Watermarking on Iris Recognition Performance
Fragile watermarking has been proposed as a means of adding additional security or functionality to biometric systems, particularly for authentication and tamper detection. In this paper we describe an experimental study on the effect of watermarking iris images with a particular class of fragile algorithm, reversible algorithms, and the ability to correctly perform iris recognition. We investigate two scenarios, matching watermarked images to unmodiﬁed images, and matching watermarked images to watermarked images. We show that different watermarking schemes give very different results for a given capacity, highlighting the importance ofinvestigation. At high embedding rates most algorithms cause signiﬁcant reduction in recognition performance. However, in many cases, for low embedding rates, recognition accuracy is improved by the watermarking process.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1092114Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2021
References:Biometric Working Group, "Biometric security concerns,” Biometric Working Group, UK Government, Tech. Rep., 2003.
 C. Roberts, "Biometric attack vectors and defences,” Computers & Security, vol. 26, no. 1, pp. 14 – 25, 2007.
 J. Hammerle-Uhl, ¨ K. Raab, and A. Uhl, "Watermarking as a means to enhance biometric systems: a critical survey,” in Proceedings of the 13th international conference on Information hiding,ser. IH’11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 238–254.
 ——, "Experimentalstudy on the impact of robust watermarking on iris recognition accuracy,” in Proceedings of the 2010 ACM Symposium on Applied Computing. ACM, 2010, pp. 1479–1484.
 J. Dong and T. Tan, "Effects of watermarking on iris recognition performance,” in Proc. 10th Int. Conf. Control, Automation, Robotics and Vision ICARCV 2008, 2008, pp. 1156–1161.
 J.-B. Feng, I.-C. Lin, C.-S. Tsai, and Y.-P. Chu, "Reversible watermarking: Current status and key issues,” I. J. Network Security, vol. 2, no. 3, pp. 161–170, 2006.
 A. K. Jain, U. Uludag, and R.-L. Hsu, "Hiding a face in a ﬁngerprint image,” in Proc. 16th Int Pattern Recognition Conf, vol. 3, 2002, pp. 756–759.
 A. Hassanien, "Hiding iris data for authentication of digital images using wavelet theory,” Pattern Recognition and Image Analysis, vol. 16, pp. 637–643, 2006, 10.1134/S1054661806040092.
 P. Blythe and J. Fridrich, "Secure digital camera,” in in Proceedings of Digital Forensic Research Workshop (DFRWS, 2004, pp. 17–19.
 M. M. Yeung and S. Pankanti, "Veriﬁcation watermarks on ﬁngerprint recognition and retrieval,” in Proc. SPIE EI, 1999, pp. 66–78.
 N. Bartlow, N. Kalka, B. Cukic, and A. Ross, "Protecting iris images through asymmetric digital watermarking,” in Proc. IEEE Workshop Automatic Identiﬁcation Advanced Technologies, 2007, pp. 192–197.
 T. Hoang, D. Tran, and D. Sharma, "Remote multimodal biometric authentication using bit priority-based fragile watermarking,” in Proc. 19th Int. Conf. Pattern Recognition ICPR 2008, 2008, pp. 1–4.
 A. Jain and U. Uludag, "Hiding ﬁngerprint minutiae in images,” in Proceedings of Third Workshop on Automatic Identiﬁcation Advanced Technologies (AutoID), 2002, 2002, pp. 97–102.
 A. Noore, R. Singh, M. Vatsa, and M. M. Houck, "Enhancing security of ﬁngerprintsthrough contextual biometric watermarking,” Forensic Sci Int, vol. 169, no. 2, pp. 188–194, Jul. 2007.
 M. Vatsa, R. Singh, and A. Noore, "Feature based rdwt watermarking for multimodal biometric system,” Image Vision Comput., vol. 27, pp. 293–304, February 2009.
 R. Huber, H. Stogner ¨ , and A. Uhl, "Two-factor biometric recognition with integrated tamper-protection watermarking,” in Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security,ser. CMS’11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 72–84.
 A. K. Jain and U. Uludag, "Hiding biometric data,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 11, pp. 1494–1498, 2003.
 T. Satonaka, "Biometric watermark authentication with multiple veriﬁcation rule,” in Proc. 12th IEEE Workshop Neural Networks for Signal Processing, 2002, pp. 597–606.
 J. Daugman, "High conﬁdence visual recognition of persons by a test of statistical independence,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp. 1148–1161, 1993.
 E. Krichen, A. Mellakh, S. Salicetti, and B. Dorizzi, "Osiris (open source for iris) reference system,” BioSecure Project, Tech. Rep., 2008.
[Online]. Available: http:/www.biosecure.info
 C. Xu and J. Prince, "Snakes, shapes, and gradient vector ﬂow,” IEEE Transactions on Image Processing, vol. 7, no. 3, pp. 359–369, 1998.
 P. Phillips, K. Bowyer, P. Flynn, X. Liu, and W. Scruggs, "The iris challenge evaluation 2005,” in Biometrics: Theory, Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference on. IEEE, 2008, pp. 1–8.
 M. Celik, G. Sharma, A. Tekalp, and E. Saber, "Lossless generalized-lsb data embedding,” IEEE Transactions on Image Processing, vol. 14, no. 2, pp. 253–266, 2005.
 J. Tian, "Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems For Video Technology, vol. 13, no. 8, pp. 890–896, 2003.
 V. Sachnev, H. Kim, J. Nam, S. Suresh, and Y. Shi, "Reversible watermarking algorithm using sorting and prediction,” IEEE Transactions on Circuits and Systems For Video Technology, vol. 19, no. 7, pp. 989–999, 2009.
 S. Weng, Y. Zhao,J. Pan, and R. Ni, "Reversible watermarking based on invariability and adjustment on pixel pairs,” Signal Processing Letters, IEEE, vol. 15, pp. 721–724, 2008.
 Y. Li, C. Yeh, and C. Chang, "Data hiding based on the similarity between neighboring pixels with reversibility,” Digital Signal Processing, vol. 20, no. 4, pp. 1116–1128, 2010.
 B. Yang, M. Schmucker, W. Funk, C. Busch, and S. Sun, "Integer dct-based reversible watermarking for images using companding technique,” in Proceedings of SPIE, vol. 5306. Citeseer, 2004, pp. 5306–41.
 S. Lee, C. Yoo, and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform,” Information Forensics and Security, IEEE Transactions on, vol. 2, no. 3, pp. 321–330, 2007.
 Z. Wang, A. Bovik, H. Sheikh, and E. Simoncelli, "Image quality assessment: From error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, 2004.
 E. DeLong, D. DeLong, and D. Clarke-Pearson, "Comparing the areas under two or more correlated receiver operating characteristic curves: a nonparametric approach.” Biometrics, vol. 44, no. 3, pp. 837–845, 1988.