메뉴 건너뛰기




Volumn 89, Issue 12, 2009, Pages 2385-2399

Multimodal biometric image watermarking using two-stage integrity verification

Author keywords

Biometric data authentication; Biometric image watermarking; Integrity checking

Indexed keywords

BIOMETRIC DATA; BIOMETRIC DATA AUTHENTICATION; BIOMETRIC IMAGE WATERMARKING; FACE IMAGES; FEATURE VECTORS; FINGERPRINT IMAGES; HIGH DETECTION RATE; INTEGRITY CHECKING; MULTI-MODAL BIOMETRICS; ROBUST WATERMARKING; SECURITY ASSURANCE; SPREAD SPECTRA; TWO STAGE; VERIFICATION METHOD; WATERMARK EMBEDDING; WATERMARK EXTRACTION;

EID: 67651093940     PISSN: 01651684     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sigpro.2009.04.014     Document Type: Article
Times cited : (35)

References (40)
  • 1
    • 0003357703 scopus 로고    scopus 로고
    • Fingerprint classification and matching
    • A. Bovic Ed, Academic Press, New York, April
    • A.K. Jain, S. Pankanti, Fingerprint classification and matching, in: A. Bovic (Ed.), Image and Video Processing Handbook, Academic Press, New York, April 2000.
    • (2000) Image and Video Processing Handbook
    • Jain, A.K.1    Pankanti, S.2
  • 2
    • 43949116287 scopus 로고    scopus 로고
    • A.K. Jain, K. Nandakumar, A. Nagar, Biometric template security, EURASIP Journal on Advances in Signal Processing, January 2008 (special issue on Advanced Signal Processing and Pattern Recognition Methods for Biometrics).
    • A.K. Jain, K. Nandakumar, A. Nagar, Biometric template security, EURASIP Journal on Advances in Signal Processing, January 2008 (special issue on Advanced Signal Processing and Pattern Recognition Methods for Biometrics).
  • 4
    • 36849070972 scopus 로고    scopus 로고
    • Three measures for secure palmprint identification
    • Kong A., Zhang D., and Kamel M. Three measures for secure palmprint identification. Pattern Recognition 41 (2008) 1329-1337
    • (2008) Pattern Recognition , vol.41 , pp. 1329-1337
    • Kong, A.1    Zhang, D.2    Kamel, M.3
  • 5
    • 85024264226 scopus 로고    scopus 로고
    • The uses and abuses of biometrics
    • Schneier B. The uses and abuses of biometrics. Communications of the ACM 42 8 (August 1999) 136
    • (1999) Communications of the ACM , vol.42 , Issue.8 , pp. 136
    • Schneier, B.1
  • 6
    • 0036887598 scopus 로고    scopus 로고
    • Robust watermarking of fingerprint images
    • Gunsel B., Uludag U., and Tekalp A.M. Robust watermarking of fingerprint images. Pattern Recognition 35 12 (December 2002) 2739-2747
    • (2002) Pattern Recognition , vol.35 , Issue.12 , pp. 2739-2747
    • Gunsel, B.1    Uludag, U.2    Tekalp, A.M.3
  • 8
    • 33646838963 scopus 로고    scopus 로고
    • Performance evaluation of watermarking techniques for secure multimodal biometric systems
    • Proceedings of CIS
    • D. Moon, T. Kim, S. Juug, Y. Chung, K. Moon, D. Ahn, S. Kim, Performance evaluation of watermarking techniques for secure multimodal biometric systems, in: Proceedings of CIS 2005, Lecture Notes in Artificial Intelligence, vol. 3802, 2005, pp. 635-642.
    • (2005) Lecture Notes in Artificial Intelligence , vol.3802 , pp. 635-642
    • Moon, D.1    Kim, T.2    Juug, S.3    Chung, Y.4    Moon, K.5    Ahn, D.6    Kim, S.7
  • 9
    • 33646721153 scopus 로고    scopus 로고
    • A secure biometric verification scheme
    • Proceedings of International Workshop on Biometric Recognition Systems IWBRC
    • D. Sun, Q. Li, T. Liu, B. He, Z. Qie, A secure biometric verification scheme, in: Proceedings of International Workshop on Biometric Recognition Systems IWBRC' 2005, Lecture Notes in Computer Science, vol. 3781, 2005, pp. 233-240.
    • (2005) Lecture Notes in Computer Science , vol.3781 , pp. 233-240
    • Sun, D.1    Li, Q.2    Liu, T.3    He, B.4    Qie, Z.5
  • 10
    • 50249183581 scopus 로고    scopus 로고
    • Biometric signature authentication using radon transform based watermarking techniques
    • E. Maiorana, P. Campisi, A. Neri, Biometric signature authentication using radon transform based watermarking techniques, in: IEEE Conference, 2007.
    • (2007) IEEE Conference
    • Maiorana, E.1    Campisi, P.2    Neri, A.3
  • 11
    • 34548561714 scopus 로고    scopus 로고
    • Human visual system based adaptive digital image watermarking
    • Qi H., Zheng D., and Zhao J. Human visual system based adaptive digital image watermarking. Signal Processing 88 (2008) 174-188
    • (2008) Signal Processing , vol.88 , pp. 174-188
    • Qi, H.1    Zheng, D.2    Zhao, J.3
  • 14
    • 33744956790 scopus 로고    scopus 로고
    • Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication
    • International Conference on Biometrics ICB
    • J. Lim, H. Lee, S. Lee, J. Kim, Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication, in: International Conference on Biometrics ICB'2006, Lecture Notes in Computer Science, vol. 3832, 2005, pp.763-769.
    • (2005) Lecture Notes in Computer Science , vol.3832 , pp. 763-769
    • Lim, J.1    Lee, H.2    Lee, S.3    Kim, J.4
  • 17
    • 0036030626 scopus 로고    scopus 로고
    • J. Fridrich, Security of fragile authentication watermarks with localization, in: Proceedings SPIE Photonic West, 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, January 2002, pp. 691-700
    • J. Fridrich, Security of fragile authentication watermarks with localization, in: Proceedings SPIE Photonic West, vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, January 2002, pp. 691-700
  • 18
    • 38049093452 scopus 로고    scopus 로고
    • A study on iris feature watermarking on face data
    • Proceedings of the ICANNGA
    • K.R. Park, D.S. Jeong, B. J. Kang, E. C. Lee, A study on iris feature watermarking on face data, in: Proceedings of the ICANNGA 2007, Lecture Notes in Computer Science, vol. 4432, 2007, pp. 415-423.
    • (2007) Lecture Notes in Computer Science , vol.4432 , pp. 415-423
    • Park, K.R.1    Jeong, D.S.2    Kang, B.J.3    Lee, E.C.4
  • 20
    • 48149100935 scopus 로고    scopus 로고
    • Dual watermark for image tamper detection and recovery
    • Lee T.-Y., and Lin S.D. Dual watermark for image tamper detection and recovery. Pattern Recognition 41 (2008) 3497-3506
    • (2008) Pattern Recognition , vol.41 , pp. 3497-3506
    • Lee, T.-Y.1    Lin, S.D.2
  • 25
    • 33947355400 scopus 로고    scopus 로고
    • Robust biometric image watermarking for fingerprint and face template protection
    • Vatsa M., Singh R., Noore A., Houck M.M., and Morris K. Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 3 2 (2006) 23-28
    • (2006) IEICE Electronics Express , vol.3 , Issue.2 , pp. 23-28
    • Vatsa, M.1    Singh, R.2    Noore, A.3    Houck, M.M.4    Morris, K.5
  • 27
    • 33745290530 scopus 로고    scopus 로고
    • A robust-fragile dual watermarking system in the DCT domain
    • Proceedings of the Knowledge based Intelligent Information and Engineering Systems KES
    • M. Habib, S. Sarhan, L. Rajab, A robust-fragile dual watermarking system in the DCT domain, in: Proceedings of the Knowledge based Intelligent Information and Engineering Systems KES 2005, Lecture Notes in Artificial Intelligence, vol. 3682, 2005, pp. 548-553.
    • (2005) Lecture Notes in Artificial Intelligence , vol.3682 , pp. 548-553
    • Habib, M.1    Sarhan, S.2    Rajab, L.3
  • 28
    • 27144539209 scopus 로고    scopus 로고
    • Protecting biometric data for personal identification
    • M. K. Khan, J. Zhang, L. Tian, Protecting biometric data for personal identification, in: Lecture Notes in Computer Science, vol. 3338, 2004, pp. 629-638.
    • (2004) Lecture Notes in Computer Science , vol.3338 , pp. 629-638
    • Khan, M.K.1    Zhang, J.2    Tian, L.3
  • 29
    • 34250863233 scopus 로고    scopus 로고
    • Speaker identification security improvement by means of speech watermarking
    • Zanuy M.F., hagmuller M., and Kubin G. Speaker identification security improvement by means of speech watermarking. Pattern Recognition 40 (2007) 3027-3034
    • (2007) Pattern Recognition , vol.40 , pp. 3027-3034
    • Zanuy, M.F.1    hagmuller, M.2    Kubin, G.3
  • 31
    • 0032117545 scopus 로고    scopus 로고
    • Invisible watermarking for image verification
    • Yeung M., and Mintzer F. Invisible watermarking for image verification. Journal of Electronic Imaging 7 3 (July 1998) 578-591
    • (1998) Journal of Electronic Imaging , vol.7 , Issue.3 , pp. 578-591
    • Yeung, M.1    Mintzer, F.2
  • 32
    • 82055208335 scopus 로고    scopus 로고
    • N.K. Ratha, J.H. Connell, R.M. Bolle, An analysis of minutiae matching strength, in: Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication, June 2001, pp. 223-228.
    • N.K. Ratha, J.H. Connell, R.M. Bolle, An analysis of minutiae matching strength, in: Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication, June 2001, pp. 223-228.
  • 33
    • 37849021059 scopus 로고    scopus 로고
    • Protecting biometric templates with image watermarking techniques
    • Proceedings of International Conference on Biometrics ICB
    • N. Komninos, T. Dimitriou, Protecting biometric templates with image watermarking techniques, in: Proceedings of International Conference on Biometrics ICB'2007, Lecture Notes in Computer Science, vol. 4642, 2007, pp. 114-123.
    • (2007) Lecture Notes in Computer Science , vol.4642 , pp. 114-123
    • Komninos, N.1    Dimitriou, T.2
  • 34
    • 34748850264 scopus 로고    scopus 로고
    • Protecting iris images through asymmertric digital watermarking
    • N. Bartlow, N. Kalka, B. Cukic, A. Ross, Protecting iris images through asymmertric digital watermarking, in: IEEE Proceedings 2007.
    • (2007) IEEE Proceedings
    • Bartlow, N.1    Kalka, N.2    Cukic, B.3    Ross, A.4
  • 36
    • 52249112865 scopus 로고    scopus 로고
    • A joint biometrics and watermarking based framework for fingerprinting, copyright protection, proof of ownership, and security Applications
    • S. Ahmad, Z. M. Lu, A joint biometrics and watermarking based framework for fingerprinting, copyright protection, proof of ownership, and security Applications, in: IEEE International Conference of Computational Intelligence and Security Workshops, 2007.
    • (2007) IEEE International Conference of Computational Intelligence and Security Workshops
    • Ahmad, S.1    Lu, Z.M.2
  • 37
    • 0033601655 scopus 로고    scopus 로고
    • Verification watermarks on fingerprint recognition and retrieval
    • S. Pankanti, M.M. Yeung, Verification watermarks on fingerprint recognition and retrieval, in: Proceedings of SPIE, vol. 3657, 1999, pp. 66-78.
    • (1999) Proceedings of SPIE , vol.3657 , pp. 66-78
    • Pankanti, S.1    Yeung, M.M.2
  • 38
    • 84947911018 scopus 로고    scopus 로고
    • A stochastic approach to content adaptive digital image watermarking
    • Proceedings of International Workshop on Information Hiding
    • S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, T. Pun, A stochastic approach to content adaptive digital image watermarking, in: Proceedings of International Workshop on Information Hiding, Lecture Notes in Computer Science, vol. 1768, 1999, pp. 212-236.
    • (1999) Lecture Notes in Computer Science , vol.1768 , pp. 212-236
    • Voloshynovskiy, S.1    Herrigel, A.2    Baumgaertner, N.3    Pun, T.4
  • 39
    • 67651101450 scopus 로고    scopus 로고
    • Biometric watermarking authentication with multiple verification rule
    • T. Satonaka, Biometric watermarking authentication with multiple verification rule, in: IEEE Proceedings, 2002.
    • (2002) IEEE Proceedings
    • Satonaka, T.1
  • 40
    • 0003437939 scopus 로고    scopus 로고
    • Verification watermarks on fingerprint recognition and retrieval
    • Yeung M., and Pankanti S. Verification watermarks on fingerprint recognition and retrieval. Journal of Electronic Imaging 9 4 (2000) 468-476
    • (2000) Journal of Electronic Imaging , vol.9 , Issue.4 , pp. 468-476
    • Yeung, M.1    Pankanti, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.