DocumentCode :
3228646
Title :
Watermarking of digital media with encrypted biometric features for digital ownership
Author :
Dutta, Malay Kishore ; Singh, Ashutosh ; Soni, K.M. ; Burget, Radim ; Riha, Kamil
Author_Institution :
Dept. of Electron. & Commun. Eng., Amity Univ., Noida, India
fYear :
2013
fDate :
8-10 Aug. 2013
Firstpage :
108
Lastpage :
112
Abstract :
This paper proposes a proficient digital watermark generation technique from encrypted biometric data which will be unique and can be logically owned to prove ownership of digital media. During the use of biometric data as the watermark exposure of biometric data may not be secure and hence this paper proposes a method to encrypt the biometric data using chaotic maps sensitive to secret key for enhancing the security. This joint encryption and watermarking scheme has the potential of addressing the ownership of digital signals and keep the biometric data secure. Arnold transformation is used to encrypt the biometric data and discrete cosine transformation is used for embedding the watermark in the image. Experimental results indicate that the watermark can survive the signal processing and maintain the perceptual properties of the host signal and hence satisfies the design requirements of digital watermarking. The extracted biometric based watermark after decryption was uniquely identified under signal processing attacks by matching of the feature points.
Keywords :
cryptography; discrete cosine transforms; signal processing; watermarking; Arnold transformation; biometric data secure; chaotic maps; digital media watermarking; digital ownership; digital signals; digital watermark generation technique; digital watermarking; discrete cosine transformation; encrypted biometric data; encrypted biometric features; joint encryption; secret key; signal processing; watermark exposure; watermarking scheme; Bioinformatics; Discrete cosine transforms; Encryption; Feature extraction; Signal processing; Watermarking; Arnold transformation; Digital Watermarking; Digital right management; Image encryption; Perceptual transparency; Robustness;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Contemporary Computing (IC3), 2013 Sixth International Conference on
Conference_Location :
Noida
Print_ISBN :
978-1-4799-0190-6
Type :
conf
DOI :
10.1109/IC3.2013.6612172
Filename :
6612172
Link To Document :
بازگشت