Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication

Jaehyuck Lim, Hyobin Lee, Sang Youn Lee, Jaihie Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

In this paper, we present a new method for authentication of biometric images. Our method uses an invertible watermark that can also detect malicious manipulations simultaneously. While virtually all watermarking schemes introduce a small amount of non-invertible distortion in original biometric images, our new method is invertible in the sense that, if the data is deemed authentic, distortion due to authentication can be removed if it becomes necessary to obtain the original biometric image. This technique provides cryptographic strength when verifying image integrity because the probability of making an undetectable modification to the image can be directly related to a secure cryptographic element, such as a hash function. Also, if the biometric image is manipulated, the positions of intentional manipulation can be clearly identified.

Original languageEnglish
Title of host publicationAdvances in Biometrics - International Conference, ICB 2006, Proceedings
Pages763-769
Number of pages7
Volume3832 LNCS
Publication statusPublished - 2006 Jun 15
EventInternational Conference on Biometrics, ICB 2006 - Hong Kong, China
Duration: 2006 Jan 52006 Jan 7

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3832 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherInternational Conference on Biometrics, ICB 2006
CountryChina
CityHong Kong
Period06/1/506/1/7

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Lim, J., Lee, H., Lee, S. Y., & Kim, J. (2006). Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication. In Advances in Biometrics - International Conference, ICB 2006, Proceedings (Vol. 3832 LNCS, pp. 763-769). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3832 LNCS).