Open Access Open Access  Restricted Access Subscription or Fee Access

A Resilient Watermarking Scheme for Compressed Images Using Iris Recognition

S. Sangeetha, R. Sripreethy, G.  Suthandrarajasri

Abstract


Watermarking is a technique to hide data and embedded inside an image to show authenticity or proof of ownership. Digital image watermarking technique has been presented and widely researched to some important issues in the Digital world such as copyright protection and content authentication. The proposed work presents a new digital color image watermarking method using Iris recognition.

In this method the color image is compressed using Discrete Cosine Transform (DCT) and protect the ownership by hiding the iris code from iris recognition system into a digital color images. The watermark is embedded into the luminance component of the color image. By applying the inverse DCT process the original image and iris code are extracted from the watermarked image. This method results robustness against various image processing operation.


Keywords


Image Watermarking, DCT, Compression, Iris Recognition System.

Full Text:

PDF

References


C.Y. Low, A.B. Teoh and C. Tee, ―Fusion of LSB and DWT Biometric Watermarking Using Offline Handwritten Signature for Copyright Protection‖, Proceedings of the Third International Conference on Advances in Biometrics, Lecture Notes In Computer Science, vol. 5558, pp. 786 – 795, 2009.

H.G. Schaathun, ―On watermarking/ fingerprinting for copyright protection‖, Proceedings of the First International Conference on Innovative Computing, Information and Control, IEEE Computer Society, vol. 3, pp. 50-53, 2006.

S. Jain, ―Digital watermarking techniques: a case study in fingerprints & faces‖, Proceedings ICVGIP 2000, pp. 139-144, 2000.

E. Maiorana, P. Campisi, A. Neri, ―Biometric Signature Authentication Using Radon Transform-Based Watermarking Techniques‖, IEEE Biometrics Symposium, pp. 1-6, 2007.

P. Tzouveli, K. Ntalianis, S.Kollias, ―Human face watermarking based on Zernike moments‖, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, pp. 399-404, 2005.

A. K. Jain, K. Nandakumar and A. Nagar, ―Biometric Template Security‖, EURASIP Journal on Advances in Signal Processing, Article ID 579416, 2008.

Y. Lee, H.J. Kang and Y.H. Ki, ―Copyright Authentication Enhancement of Digital Watermarking Based on Intelligent Human Visual System Scheme‖, Knowledge-Based Intelligent Information and Engineering Systems, Intelligent Watermarking Algorithms and Applications, vol. 3682, pp. 567-572, 2005.

G. Coatrieux, M. Lamard, W. Daccache, W. Puentes, C. Roux, ―A Low Distortion and Reversible Watermark: Application to Angiographic Images of the Retina‖, 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEE-EMBS, pp. 2224-2227, 2005.

J. Daugman and C. Downing , ―Epigenetic randomness, complexity, and singularity of human iris patterns‖, Proceedings of the Royal Society, Biological Sciences, pp. 1737 – 1740, 2001.

Ajay Kumar, Arun Passi, ―Comparison and combination of iris matchers for reliable personal authentication‖, Pattern Recognition, vol. 43, pp. 1016–1026, 2010.

S. Sanderson, J. Erbetta, ―Authentication for secure environments based on iris scanning technology‖, IEE Colloquium on Visual Biometrics, 2000.

Nick Bartlow, Nathan Kalka, Bojan Cukic, and Arun Ross, ―Protecting Iris Images through Asymmetric Digital Watermarking‖, Proceedings of the Fifth IEEE workshop on Automatic Identification advanced Technologies, Italy, pp. 191-197, June 2007.

I. Daubechies and W. Sweldens, ―Factoring wavelet transforms intolifting steps‖,Journal of Fourier Anal. Appl., vol. 4, no. 3, pp. 245–267, 1998.

B. Yang, M. Schmucker, W. Funk, C. Busch, and S. Sun, ―IntegerDCT-based reversible watermarking for images using companding technique‖, Proc. SPIE, Security, Steganography, and Watermarkingof Multimedia Contents, San Jose, CA, pp. 405–415, Jan. 2004.

G. Xuan, Y. Q. Shi, Q. Yao, Z. Ni, C. Yang, J. Gao, and P. Chai,―Lossless data hiding using histogram shifting method based on integerwavelets‖, LNCS, Int. Workshop Digital Watermarking,Korea, Nov. 2006.

D. Coltuc and A. Tremeau, ―Simple reversiblewatermarking schemes‖, Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, pp. 561–568, Jan. 2005.

J. Tian, ―Reversible data embedding using a difference expansion‖, IEEE Transactions on Circuits and Systems for Video Technology, pp. 890-896, August 2003.

K. Seetharaman, Iris Recognition based Image Authentication, International Journal of Computer Applications (0975 – 8887) Volume 44– No.7, April 2012.

J. Daugman, ―How iris recognition works‖, IEEE transactions on circuits and systems for video technology, vol. 14, pp. 21-30, January 2004.

Mohammed A. M. Abdullah, F. H. A. Al-Dulaimi, Waleed Al-Nuaimy, Ali Al-Ataby, ―Smart card with iris recognition for high security access environment‖, IEEE, pp. 382-385, 2010.

D. Field, ―Relations between the statistics of natural images and the response properties of cortical cells‖, Journal of the Optical Society of America, 1987.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.