Protecting iris images through asymmetric digital watermarking

被引:13
作者
Bartlow, Nick [1 ]
Kalka, Nathan [1 ]
Cukic, Bojan [1 ]
Ross, Arun [1 ]
机构
[1] W Virginia Univ, Morgantown, WV 26506 USA
来源
2007 IEEE WORKSHOP ON AUTOMATIC IDENTIFICATION ADVANCED TECHNOLOGIES, PROCEEDINGS | 2007年
关键词
D O I
10.1109/AUTOID.2007.380618
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When biometric systems require raw images to be stored in centralized databases, it is imperative that appropriate measures are taken to secure these images. A combination of asymmetric digital watermarking and cryptography can serve as a powerful mechanism for facilitating such security, needs. The combination of these techniques enables the system, to handle many issues associated with storing and using raw biometric data. In this paper we propose a framework that encodes voice feature descriptors in raw iris images thereby offering an example of a secure biometric system. The contributions of this work are as follows: application of biometric watermarking to iris images in order to provide an added level of authentication; a mechanism to validate the originating source of iris images; understanding levels in which watermarks can be compromised in a biometric system; and implementation of art asymmetric watermarking firamework.
引用
收藏
页码:192 / +
页数:2
相关论文
共 8 条
[1]  
Adler A, 2003, CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS, P1163
[2]  
[Anonymous], 2002, P WORKSH AUT ID ADV
[3]  
CHANG C, 2006, P 1 IEEE C INN COMP, V2, P681
[4]   Framework for media data and owner authentication based on cryptography, watermarking and biometric authentication [J].
Dittmann, J ;
Steinebach, M ;
Ferri, LC ;
Vielhauer, C ;
Steinmetz, R ;
Wohlmacher, P .
MULTIMEDIA SYSTEMS AND APPLICATIONS IV, 2001, 4518 :198-209
[5]   PKI and digital certification infrastructure [J].
Hunt, R .
NINTH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, PROCEEDINGS, 2001, :234-239
[6]  
KALKA ND, 2006, P SPIE C BIOM TECHN, V3
[7]   Digital signature of color images using amplitude modulation [J].
Kutter, M ;
Jordan, F ;
Bossen, F .
STORAGE AND RETRIEVAL FOR IMAGE AND VIDEO DATABASES V, 1997, 3022 :518-526
[8]   Cryptographic key generation from voice [J].
Monrose, F ;
Reiter, MK ;
Li, Q ;
Wetzel, S .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :202-213