Biometric watermarks based on face recognition methods for authentication of digital images

被引:10
作者
Wojtowicz, Wioletta [1 ]
Ogiela, Marek R. [1 ]
机构
[1] AGH Univ Sci & Technol, Cryptog & Cognit Informat Res Grp, PL-30059 Krakow, Poland
关键词
watermarking technique; biometrics; face recognition; principal component analysis; neural networks (NN); SECURITY;
D O I
10.1002/sec.1114
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because making digital images secure runs into the substantial challenge of owner authentication, many security schemes based on cryptography, steganography and watermarking technology include biometric recognition methods. To follow on these studies, this paper describes a combination of facial images with watermarking technology to automatically authenticate digital images owners/users. In the proposed methodology, biometric face recognition methods such as principal component analysis and eigenfeature regularization and extraction produce vectorial representations of facial images. These vectors are used as copyright watermarks, in a few common watermarking schemes, and are tested for identification purposes after they are extracted. Initially, watermarking algorithms are studied with some arbitrary cover image, and also the most robust algorithm is tested for different cover images of particular subjects. The strength of this paper is finding relationships between the original and extracted biometric data using neural networks instead of the most common, simple measures such as correlation coefficients or distance metrics. The NN subject identification is performed directly, as there is no need to reconstruct facial images after the watermarks are extracted, compute templates for particular subjects, or seek a suitable distance metric. What is more, the presented study includes a performance comparison of two machine learning methods, frequently used for face recognition, and of a few popular watermarking algorithms. Very promising identification results were obtained in many considered experiments, even those involving attacks on watermarked images. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1672 / 1687
页数:16
相关论文
共 37 条
[1]  
Ahmad S, 2007, CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, P676
[2]  
[Anonymous], 2011, INT J COMPUT APPL, DOI DOI 10.5120/1842-2493
[3]  
[Anonymous], OMICS PUBLISHING GRO
[4]  
Arnold MK, 2003, Techniques and applications of digital watermarking and content protection
[5]   Protecting iris images through asymmetric digital watermarking [J].
Bartlow, Nick ;
Kalka, Nathan ;
Cukic, Bojan ;
Ross, Arun .
2007 IEEE WORKSHOP ON AUTOMATIC IDENTIFICATION ADVANCED TECHNOLOGIES, PROCEEDINGS, 2007, :192-+
[6]   Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (01) :182-195
[7]   Biometric Template Security based on Watermarking [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan ;
Raman, Balasubramanian .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE AND EXHIBITION ON BIOMETRICS TECHNOLOGY, 2010, 2 :227-235
[8]   Fractional dual tree complex wavelet transform and its application to biometric security during communication and transmission [J].
Bhatnagar, Gaurav ;
Wu, Jonathan ;
Raman, Balasubramanian .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (01) :254-267
[9]  
Bishop Christopher, 2006, Pattern Recognition and Machine Learning, DOI 10.1117/1.2819119
[10]   Identification with encrypted biometric data [J].
Bringer, Julien ;
Chabanne, Herve ;
Kindarji, Bruno .
SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (05) :548-562