Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication

Jaehyuck Lim, Hyobin Lee, Sang Youn Lee, Jaihie Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

In this paper, we present a new method for authentication of biometric images. Our method uses an invertible watermark that can also detect malicious manipulations simultaneously. While virtually all watermarking schemes introduce a small amount of non-invertible distortion in original biometric images, our new method is invertible in the sense that, if the data is deemed authentic, distortion due to authentication can be removed if it becomes necessary to obtain the original biometric image. This technique provides cryptographic strength when verifying image integrity because the probability of making an undetectable modification to the image can be directly related to a secure cryptographic element, such as a hash function. Also, if the biometric image is manipulated, the positions of intentional manipulation can be clearly identified.

Original languageEnglish
Title of host publicationAdvances in Biometrics - International Conference, ICB 2006, Proceedings
Pages763-769
Number of pages7
Volume3832 LNCS
Publication statusPublished - 2006 Jun 15
EventInternational Conference on Biometrics, ICB 2006 - Hong Kong, China
Duration: 2006 Jan 52006 Jan 7

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3832 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherInternational Conference on Biometrics, ICB 2006
CountryChina
CityHong Kong
Period06/1/506/1/7

Fingerprint

Image Authentication
Watermarking
Biometrics
Invertible
Authentication
Manipulation
Hash functions
Watermark
Hash Function
Integrity
Necessary

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Lim, J., Lee, H., Lee, S. Y., & Kim, J. (2006). Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication. In Advances in Biometrics - International Conference, ICB 2006, Proceedings (Vol. 3832 LNCS, pp. 763-769). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3832 LNCS).
Lim, Jaehyuck ; Lee, Hyobin ; Lee, Sang Youn ; Kim, Jaihie. / Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication. Advances in Biometrics - International Conference, ICB 2006, Proceedings. Vol. 3832 LNCS 2006. pp. 763-769 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{f5300b20733e4c13a428c7b02b965aa7,
title = "Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication",
abstract = "In this paper, we present a new method for authentication of biometric images. Our method uses an invertible watermark that can also detect malicious manipulations simultaneously. While virtually all watermarking schemes introduce a small amount of non-invertible distortion in original biometric images, our new method is invertible in the sense that, if the data is deemed authentic, distortion due to authentication can be removed if it becomes necessary to obtain the original biometric image. This technique provides cryptographic strength when verifying image integrity because the probability of making an undetectable modification to the image can be directly related to a secure cryptographic element, such as a hash function. Also, if the biometric image is manipulated, the positions of intentional manipulation can be clearly identified.",
author = "Jaehyuck Lim and Hyobin Lee and Lee, {Sang Youn} and Jaihie Kim",
year = "2006",
month = "6",
day = "15",
language = "English",
isbn = "3540311114",
volume = "3832 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "763--769",
booktitle = "Advances in Biometrics - International Conference, ICB 2006, Proceedings",

}

Lim, J, Lee, H, Lee, SY & Kim, J 2006, Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication. in Advances in Biometrics - International Conference, ICB 2006, Proceedings. vol. 3832 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3832 LNCS, pp. 763-769, International Conference on Biometrics, ICB 2006, Hong Kong, China, 06/1/5.

Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication. / Lim, Jaehyuck; Lee, Hyobin; Lee, Sang Youn; Kim, Jaihie.

Advances in Biometrics - International Conference, ICB 2006, Proceedings. Vol. 3832 LNCS 2006. p. 763-769 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3832 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication

AU - Lim, Jaehyuck

AU - Lee, Hyobin

AU - Lee, Sang Youn

AU - Kim, Jaihie

PY - 2006/6/15

Y1 - 2006/6/15

N2 - In this paper, we present a new method for authentication of biometric images. Our method uses an invertible watermark that can also detect malicious manipulations simultaneously. While virtually all watermarking schemes introduce a small amount of non-invertible distortion in original biometric images, our new method is invertible in the sense that, if the data is deemed authentic, distortion due to authentication can be removed if it becomes necessary to obtain the original biometric image. This technique provides cryptographic strength when verifying image integrity because the probability of making an undetectable modification to the image can be directly related to a secure cryptographic element, such as a hash function. Also, if the biometric image is manipulated, the positions of intentional manipulation can be clearly identified.

AB - In this paper, we present a new method for authentication of biometric images. Our method uses an invertible watermark that can also detect malicious manipulations simultaneously. While virtually all watermarking schemes introduce a small amount of non-invertible distortion in original biometric images, our new method is invertible in the sense that, if the data is deemed authentic, distortion due to authentication can be removed if it becomes necessary to obtain the original biometric image. This technique provides cryptographic strength when verifying image integrity because the probability of making an undetectable modification to the image can be directly related to a secure cryptographic element, such as a hash function. Also, if the biometric image is manipulated, the positions of intentional manipulation can be clearly identified.

UR - http://www.scopus.com/inward/record.url?scp=33744956790&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33744956790&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33744956790

SN - 3540311114

SN - 9783540311119

VL - 3832 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 763

EP - 769

BT - Advances in Biometrics - International Conference, ICB 2006, Proceedings

ER -

Lim J, Lee H, Lee SY, Kim J. Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication. In Advances in Biometrics - International Conference, ICB 2006, Proceedings. Vol. 3832 LNCS. 2006. p. 763-769. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).