Title :
Fingerprint image protection using two watermarks without corrupting minutiae
Author :
Alkhathami, Mohammed ; Fengling Han ; van Schyndel, Ron
Author_Institution :
Sch. of Inf. Technol. & Comput. Sci., RMIT Univ., Melbourne, VIC, Australia
Abstract :
This paper proposes an approach for embedding two watermarks into fingerprint images using the Discrete Cosine Transform (DCT) algorithm. The main aim of the proposed algorithm is to add more authentication factors based on the watermark messages and to protect the ownership of the fingerprint image. Since the information used for identification or verification of a fingerprint image mainly lies in its minutiae, the introduced watermarking algorithm does not affect fingerprint features. First watermark is constructed based on a unique identification number that can identify the user. The hash function (SHA2) is applied to generate the hash value of the user identification number to encode the watermark pattern. Then, it is embedded into the fingerprint image while avoiding the minutiae locations. The second watermark is a gray image that is inserted into first watermarked image. The extraction stage does not require the original fingerprint image. We measure the affect of the watermarks on the fingerprint features based on the comparison between the total number of extracted minutiae points before and after the embedding process. The presented schema shows a high PSNR value. The robustness of the introduced technique has been tested against Gaussian and Salt & Pepper attacks.
Keywords :
cryptography; discrete cosine transforms; feature extraction; fingerprint identification; image coding; image watermarking; message authentication; DCT algorithm; Gaussian attacks; PSNR value; SHA2; Salt & Pepper attacks; authentication factors; discrete cosine transform algorithm; fingerprint features; fingerprint image protection; fingerprint image verification; gray image; hash function; image watermarking algorithm; minutiae locations; user identification number; watermark messages; watermark pattern encoding; Discrete cosine transforms; Feature extraction; Fingerprint recognition; Image matching; PSNR; Robustness; Watermarking; DCT; Fingerprint; Minutiae; Watermark;
Conference_Titel :
Industrial Electronics and Applications (ICIEA), 2013 8th IEEE Conference on
Conference_Location :
Melbourne, VIC
Print_ISBN :
978-1-4673-6320-4
DOI :
10.1109/ICIEA.2013.6566540