Fingerprint Minutiae Protection Using Two Watermarks

نویسندگان

  • Mohammed Alkhathami
  • Fengling Han
  • Ron Van Schyndel
چکیده

This paper proposes an approach for embedding two watermarks into fingerprint images using the Discrete Cosine Transform (DCT) algorithm. The main aim of the proposed algorithm is to add more authentication factors based on the watermark messages and to protect the ownership of the fingerprint image. Since the information used for identification or verification of a fingerprint image mainly lies in its minutiae, the introduced watermarking algorithm does not affect fingerprint features. First, the watermark is embedded into the fingerprint image to avoid the minutiae location. It is constructed based on a unique identification number that can identify the user. The hash function (SHA2) is applied to generate the hash value of the watermark information to encode the watermark pattern. The second watermark is a gray image that is inserted over the first watermark. The extraction stage does not require the original fingerprint image. We measure the influence of the watermarks on the fingerprint features based on the comparison between the total number of extracted minutiae points before and after embedding the watermark. The presented schema shows a high PSNR value. The robustness of the introduced technique has been tested against Gaussian and Salt & Pepper attacks. Keywords—Fingerprint, Minutiae, Watermark, DCT.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Minutiae Watermarking in Wavelet Domain for Fingerprint Security

In this manuscript, a wavelet-based blind watermarking scheme has been proposed as a means to provide security to authenticity of a fingerprint. The information used for identification or verification of a fingerprint mainly lies in its minutiae. By robust watermarking of the minutiae in the fingerprint image itself, the useful information can be extracted accurately even if the fingerprint is ...

متن کامل

Survey of Fingerprint Matching Techniques for Privacy Protection

Now-a-days identification of fingerprint is an active area of research. In most areas we are using recognition of fingerprint for improving the privacy and security. The recognition is done by using methods of fingerprint matching. Matching methods can be of two types-verification of fingerprint and identification of fingerprint. Combination of fingerprint for protecting privacy is a system for...

متن کامل

Template Protection for Fingerprint Recognition System using Fuzzy Vault

In this paper, fuzzy vault scheme is discussed for protection of templates in fingerprint recognition system. As fingerprint recognition system is most commonly used biometric, where minutiae points are stored as templates. If attacker gets this database, fake finger or artificial image can be created. Once biometric is compromised, it cannot be reused. This shows importance of template securit...

متن کامل

Fingerprint Combinations for Privacy Protection: A Performance Analysis

Protecting the privacy of the fingerprint in authentication systems is become a major issue now-a-days because of the widespread use of fingerprint recognition systems. Traditional encryption and transformation techniques are shown to be more vulnerable to attacks. Therefore, fingerprint combination at the image and feature level has been proposed. This paper introduces two approaches for prote...

متن کامل

Fingerprint template protection with minutiae-based bit-string for security and privacy preserving

Recently, biometric security has become the major study to address biometric template security and user privacy. In this research, we focus on minutiae based fingerprint template protection. At the local level, two most prominent ridge characteristics of fingerprint, namely ridge termination and ridge bifurcation are detected to form minutia point (minutiae). In this context, a ridge ending is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012