An Efficient Watermarking Technique for Biometric Images

被引:6
作者
Kumar, G. Dinesh [1 ]
Teja, Dontoju Pranay [1 ]
Reddy, Sykam Sreekar [1 ]
Sasikaladevi, N. [1 ]
机构
[1] SASTRA Univ, Sch Comp, Dept Comp Sci & Engn, Thanjavur, TN, India
来源
7TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2017) | 2017年 / 115卷
关键词
Biometric Image; Watermarking; Homomorphic encryption; Homomorphic decryption; Compression;
D O I
10.1016/j.procs.2017.09.101
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper provides a good way of digital watermarking framework using biometric image as watermark by the application of homomorphic encryption system. Thus, it provides data confidentiality and also authenticity. Here, the biometric image is watermarked inside the standard benchmark images. The robustness of the watermarks in the image are verified through measurement of Peak Signal-to-noise ratio (PSNR), Correlation coefficient (CC%), and noise test. The biometric images are obtained by subtracting watermarked images with benchmark images. (C) 2017 The Authors. Published by Elsevier B.V. Peer-review under responsibility of the scientific committee of the 7th International Conference on Advances in Computing & Communications.
引用
收藏
页码:423 / 430
页数:8
相关论文
共 10 条
[1]  
[Anonymous], 2012, INT J NETW
[2]   Medical image encryption using edge maps [J].
Cao, Weijia ;
Zhou, Yicong ;
Chen, C. L. Philip ;
Xia, Liming .
SIGNAL PROCESSING, 2017, 132 :96-109
[3]   Hiding digital watermarks using multiresolution wavelet transform [J].
Hsieh, MS ;
Tseng, DC ;
Huang, YH .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2001, 48 (05) :875-882
[4]   Image compression using the 2-D wavelet transform [J].
Lewis, A. S. ;
Knowles, G. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1992, 1 (02) :244-250
[5]   Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images [J].
Li, Li ;
Abd El-Latif, Ahmed A. ;
Niu, Xiamu .
SIGNAL PROCESSING, 2012, 92 (04) :1069-1078
[6]   Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases [J].
Li, Lichun ;
Lu, Rongxing ;
Choo, Kim-Kwang Raymond ;
Datta, Anwitaman ;
Shao, Jun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) :1847-1861
[7]  
Mehra D.R., 2016, Int. J. Eng. Comput. Sci., V5, P17291
[8]   A contextual based double watermarking of PET images by patient ID and ECG signal [J].
Nambakhsh, Mohammad-Saleh ;
Ahmadian, Alireza ;
Zaidi, Habib .
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2011, 104 (03) :418-425
[9]   Image cryptographic algorithm based on the Haar wavelet transform [J].
Tedmori, Sara ;
Al-Najdawi, Nijad .
INFORMATION SCIENCES, 2014, 269 :21-34
[10]  
Zain Jasni M, 2006, IEEE EMBS ANN INT C, P3