A Watermarking Technique for User Authentication Based on a Combination of Face Image and Device Identity in a Mobile Ecosystem

被引:0
|
作者
Al-Jarba, Fatimah [1 ]
Al-Khathami, Mohammed [1 ]
机构
[1] Imam Mohammad Ibn Saud Islamic Univ, Informat Syst Dept, Riyadh, Saudi Arabia
关键词
Watermark; User authentication; Biometrics; Digital content; IMEI; BLIND WATERMARKING; ROBUST; SCHEME; DOMAIN; DCT; SVD;
D O I
10.22937/IJCSNS.2021.21.9.40
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital content protection has recently become an important requirement in biometrics-based authentication systems due to the challenges involved in designing a feasible and effective user authentication method. Biometric approaches are more effective than traditional methods, and simultaneously, they cannot be considered entirely reliable. This study develops a reliable and trustworthy method for verifying that the owner of the biometric traits is the actual user and not an impostor. Watermarking-based approaches are developed using a combination of a color face image of the user and a mobile equipment identifier (MEID). Employing watermark techniques that cannot be easily removed or destroyed, a blind image watermarking scheme based on fast discrete curvelet transform (FDCuT) and discrete cosine transform (DCT) is proposed. FDCuT is applied to the color face image to obtain various frequency coefficients of the image curvelet decomposition, and for high frequency curvelet coefficients DCT is applied to obtain various frequency coefficients. Furthermore, mid-band frequency coefficients are modified using two uncorrelated noise sequences with the MEID watermark bits to obtain a watermarked image. An analysis is carried out to verify the performance of the proposed schema using conventional performance metrics. Compared with an existing approach, the proposed approach is better able to protect multimedia data from unauthorized access and will effectively prevent anyone other than the actual user from using the identity or images.
引用
收藏
页码:303 / 316
页数:14
相关论文
共 50 条
  • [21] Reversible image authentication based on watermarking
    Lee, Sang-Kwang
    Suh, Young-Ho
    Ho, Yo-Sung
    2006 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO - ICME 2006, VOLS 1-5, PROCEEDINGS, 2006, : 1321 - 1324
  • [22] Voice Based User-Device Physical Unclonable Functions for Mobile Device Authentication
    Guo, Yunxi
    Tyagi, Akhilesh
    2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 512 - 517
  • [23] Value combination technique for image authentication
    Zhang, Jie
    Liu, Fenlin
    Wang, Ping
    Wang, Guodong
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2007, 2007, 4810 : 276 - +
  • [24] Secure fragile digital watermarking technique for image authentication
    Alturki, F
    Mersereau, R
    2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2001, : 1031 - 1034
  • [25] TIAMAT: A new fragile watermarking technique for image authentication
    Cook, David W., II
    Rajan, P. K.
    PROCEEDINGS OF THE THIRTY-EIGHTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2004, : 221 - 225
  • [26] A Robust Watermarking and Image Authentication Technique on Block Property
    Kung, C. M.
    Juan, K. Y.
    Tu, Y. C.
    Kung, C. H.
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 173 - +
  • [27] User-Silicon Entangled Mobile Identity Authentication
    Timothy Dee
    Ryan Scheel
    Nicholas Montelibano
    Akhilesh Tyagi
    Journal of Hardware and Systems Security, 2020, 4 (3) : 208 - 229
  • [28] Watermarking-based image authentication with recovery capability using halftoning technique
    Rosales-Roldan, Luis
    Cedillo-Hernandez, Manuel
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    Kurkoski, Brian
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (01) : 69 - 83
  • [29] User Profiling with Virtual Pet for Mobile Device Authentication
    Lim, Shu Yun
    Kho, Jason N. M.
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 229 - 237
  • [30] Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication
    Yunxi Guo
    Akhilesh Tyagi
    Journal of Hardware and Systems Security, 2017, 1 (1) : 18 - 37