Title :
An efficient and secure digital image watermarking using features from iris image
Author :
Dutta, Malay Kishore ; Singh, Ashutosh ; Zia, Tanveer A.
Author_Institution :
Dept. of Electron. & Commun. Eng., Amity Univ., Noida, India
Abstract :
The existing digital watermarking schemes use a digital pattern like pseudorandom number sequence, a logo image or a digital signature as the watermark. Use of such watermarks is not convincing as the ownership of such a watermark is not clear for ownership claims. This paper proposes an efficient digital watermark generation technique from biometric iris data which will be unique and can be owned to prove ownership. The issue of ownership of digital watermark is addressed in this paper. The biometric pattern of iris image is used to generate the digital watermark that has a stamp of ownership. The digital pattern generated the from the iris image is found to be unique and can be clearly used for identification. Discrete cosine transformation is used for watermarking the digital image. Experimental results indicate that the watermark can survive the signal processing attacks and maintain the perceptual properties of the host signal satisfying the design requirements of digital watermarking. The extracted biometric based watermark was uniquely identified under signal processing attacks using correlation based methods.
Keywords :
correlation methods; discrete cosine transforms; image watermarking; iris recognition; message authentication; signal processing; biometric based watermark; biometric iris data; biometric pattern; correlation based method; digital pattern; digital signature; digital watermark generation technique; discrete cosine transformation; iris image; logo image; pseudorandom number sequence; secure digital image watermarking; signal processing attack; Correlation; Discrete cosine transforms; Iris; Iris recognition; Robustness; Signal processing; Watermarking; Digital Right Management control; Digital Watermarking; Iris Recognition; Perceptual Transparency; Robustness; Signal Processing Attacks;
Conference_Titel :
Control Communication and Computing (ICCC), 2013 International Conference on
Conference_Location :
Thiruvananthapuram
Print_ISBN :
978-1-4799-0573-7
DOI :
10.1109/ICCC.2013.6731697