A Watermarking Technique for User Authentication Based on a Combination of Face Image and Device Identity in a Mobile Ecosystem

被引:0
|
作者
Al-Jarba, Fatimah [1 ]
Al-Khathami, Mohammed [1 ]
机构
[1] Imam Mohammad Ibn Saud Islamic Univ, Informat Syst Dept, Riyadh, Saudi Arabia
关键词
Watermark; User authentication; Biometrics; Digital content; IMEI; BLIND WATERMARKING; ROBUST; SCHEME; DOMAIN; DCT; SVD;
D O I
10.22937/IJCSNS.2021.21.9.40
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital content protection has recently become an important requirement in biometrics-based authentication systems due to the challenges involved in designing a feasible and effective user authentication method. Biometric approaches are more effective than traditional methods, and simultaneously, they cannot be considered entirely reliable. This study develops a reliable and trustworthy method for verifying that the owner of the biometric traits is the actual user and not an impostor. Watermarking-based approaches are developed using a combination of a color face image of the user and a mobile equipment identifier (MEID). Employing watermark techniques that cannot be easily removed or destroyed, a blind image watermarking scheme based on fast discrete curvelet transform (FDCuT) and discrete cosine transform (DCT) is proposed. FDCuT is applied to the color face image to obtain various frequency coefficients of the image curvelet decomposition, and for high frequency curvelet coefficients DCT is applied to obtain various frequency coefficients. Furthermore, mid-band frequency coefficients are modified using two uncorrelated noise sequences with the MEID watermark bits to obtain a watermarked image. An analysis is carried out to verify the performance of the proposed schema using conventional performance metrics. Compared with an existing approach, the proposed approach is better able to protect multimedia data from unauthorized access and will effectively prevent anyone other than the actual user from using the identity or images.
引用
收藏
页码:303 / 316
页数:14
相关论文
共 50 条
  • [1] User Authentication for Mobile Device through Image Selection
    Nazir, Iffat
    Zubair, Izza
    Islam, M. Hasan
    NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES, 2009, : 518 - +
  • [2] A DCT-Based watermarking technique for image authentication
    Al Baloshi, Mohamed
    Al-Mualla, Mohammed E.
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 754 - +
  • [3] Image authentication and recovery scheme based on watermarking technique
    Sumitomo, Kenji
    Nakano, Mariko
    Perez, Hector
    PROCEEDINGS OF THE 2ND WSEAS INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: MODERN TOPICS OF COMPUTER SCIENCE, 2008, : 94 - +
  • [4] A robust watermarking and image authentication technique
    Kung, CM
    Truong, K
    Jeng, JH
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 400 - 404
  • [5] User Identity Authentication Based on the Combination of Mouse and Keyboard Behavior
    Tang, Haitao
    Wang Mantao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 29 - 35
  • [6] Identity authentication on mobile devices using face verification and ID image recognition
    Wu, Xing
    Xu, Jianxing
    Wang, Jianjia
    Li, Yufeng
    Li, Weimin
    Guo, Yike
    7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT (ITQM 2019): INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT BASED ON ARTIFICIAL INTELLIGENCE, 2019, 162 : 932 - 939
  • [7] Identity authentication based on keystroke dynamics for mobile device users
    Gao, Zhigang
    Diao, Wenjie
    Huang, Yucai
    Xu, Ruichao
    Lu, Huijuan
    Zhang, Jianhui
    PATTERN RECOGNITION LETTERS, 2021, 148 : 61 - 67
  • [8] A robust watermarking technique for biometric image authentication
    Radouane, Mohamed
    Zouggari, Nadia Idrissi
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2023, 15 (05) : 587 - 605
  • [9] A novel watermarking technique for medical image authentication
    Pushpala, K
    Nigudkar, R
    Computers in Cardiology 2005, Vol 32, 2005, 32 : 683 - 686
  • [10] A secure and localizing watermarking technique for image authentication
    Ouda, AH
    El-Sakka, MR
    IMAGE ANALYSIS AND RECOGNITION, PT 2, PROCEEDINGS, 2004, 3212 : 759 - 769