1 / 12

Enhancing security of fingerprints through contexture biometric watermarking

Enhancing security of fingerprints through contexture biometric watermarking. Afzel Noore, Richa Singh, Mayank Vatsa and Max M. Houck Forensic Science International, In Press, 2006 Present by 黃建禎. Outlines. Introduction Proposed watermarking scheme Experimental results Conclusions.

lwakefield
Download Presentation

Enhancing security of fingerprints through contexture biometric watermarking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Enhancing security of fingerprints through contexture biometric watermarking Afzel Noore, Richa Singh, Mayank Vatsa and Max M. Houck Forensic Science International, In Press, 2006 Present by 黃建禎

  2. Outlines • Introduction • Proposed watermarking scheme • Experimental results • Conclusions

  3. Introduction (1/2) Fingerprint • Chain of custody • Problems: • Data mismatches and mishandling • High cost of storage • Longer time for retrieval • Unauthorized tampering of the files in the database Facial image Demographic text

  4. Introduction (2/2) • Provide a multiple watermarking scheme for verifying the chain of custody • Advantages: • Eliminates data mismatch • Reduces the high cost of storage • Speeds the retrieval of related data • Detects tampering

  5. Proposed Watermarking Scheme Original fingerprint Watermarked fingerprint DWT IDWT (Grayscale) (Grayscale) Facial image Demographic text Watermarks = + (Grayscale) (Binary)

  6. Proposed Watermarking Scheme – Embedding Face Watermark pixels = {125, 70, …} Replace Most-significant: 1, 0, … Intermediate: 2, 7, … Least-significant: 5, 0, … I = {2, 7, …} L = {5, 0, …} Replace Replace M = {1, 0, …}

  7. Proposed Watermarking Scheme – Embedding Text Watermark bits = {11000011…} wa = αwm α = 20 Replace

  8. Proposed Watermarking Scheme – Extracting Texture Features LH1 Texture Map LH1 Texture Mask

  9. Experimental results (1/3) • Automatic Fingerprint Identification System (AFIS)

  10. Experimental results (2/3) • Image processing attacks

  11. Quality of extracted watermarks Robustness of extracted watermarks Experimental results (3/3)

  12. Conclusions • The matching ability of watermarked fingerprint can resist common attacks. • The original image is not required for extracting watermarks. • The extracted face and text images are of high quality. • The watermarks protect the integrity of fingerprint images.

More Related