Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication

Jaehyuck Lim, Hyobin Lee, Sangyoun Lee, Jaihie Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

In this paper, we present a new method for authentication of biometric images. Our method uses an invertible watermark that can also detect malicious manipulations simultaneously. While virtually all watermarking schemes introduce a small amount of non-invertible distortion in original biometric images, our new method is invertible in the sense that, if the data is deemed authentic, distortion due to authentication can be removed if it becomes necessary to obtain the original biometric image. This technique provides cryptographic strength when verifying image integrity because the probability of making an undetectable modification to the image can be directly related to a secure cryptographic element, such as a hash function. Also, if the biometric image is manipulated, the positions of intentional manipulation can be clearly identified.

Original languageEnglish
Title of host publicationAdvances in Biometrics - International Conference, ICB 2006, Proceedings
Pages763-769
Number of pages7
Publication statusPublished - 2006
EventInternational Conference on Biometrics, ICB 2006 - Hong Kong, China
Duration: 2006 Jan 52006 Jan 7

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3832 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherInternational Conference on Biometrics, ICB 2006
CountryChina
CityHong Kong
Period06/1/506/1/7

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication'. Together they form a unique fingerprint.

  • Cite this

    Lim, J., Lee, H., Lee, S., & Kim, J. (2006). Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication. In Advances in Biometrics - International Conference, ICB 2006, Proceedings (pp. 763-769). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3832 LNCS).