Identification and authentication using visual cryptography based fingerprint watermarking over natural image

被引:0
|
作者
Jaishri Chourasia
机构
[1] Cummins College of Engineering for Women,
关键词
Fingerprint; Natural image; Digital watermarking; Visual cryptography; Identification; Authentication;
D O I
10.1007/s40012-013-0033-1
中图分类号
学科分类号
摘要
Protection of biometric data is gaining interest and hence digital watermarking techniques are one of the best ways to protect biometric data from accidental or intentional attacks. We have proposed fingerprint watermarking scheme over natural image based on visual cryptography for identification and authentication. The scheme does not embed the fingerprint directly onto the natural image instead using the concept of visual cryptography fingerprint is divided into parts called as shares. The verification share is generated at the time of fingerprint embedding process and while performing identification and authentication master share is generated. Fingerprint is extracted using these two shares. Correlation value between original fingerprint and extracted fingerprint is the deciding factor for identification and authentication. The experimental results show that the scheme is robust against various watermarking attacks.
引用
收藏
页码:343 / 348
页数:5
相关论文
共 50 条
  • [1] A LOSSLESS WATERMARKING USING VISUAL CRYPTOGRAPHY AUTHENTICATION
    Wang, Yuh-Rau
    Lin, Wei-Hung
    Yang, Ling
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1109 - 1113
  • [2] A REVIEW ON METHODS FOR IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY IN DIGITAL IMAGE WATERMARKING
    Vyas, Chinmay
    Lunagaria, Munindra
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1191 - 1196
  • [3] Enabling secure authentication using fingerprint and visual cryptography
    Annappanavar, Sneha Manohar
    Chavan, Pallavi Vijay
    [J]. INTERNATIONAL JOURNAL OF BIOMETRICS, 2024, 16 (06)
  • [4] Watermarking-based transparency authentication in visual cryptography
    Luo, Hao
    Pan, Jeng-Shyang
    Lu, Zhe-Ming
    Liao, Bin-Yih
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, 2007, : 609 - +
  • [5] An Image Based Authentication Technique Using Visual Cryptography Scheme
    Dais, Annie, V
    Joe, Vijesh C.
    Sugi, Sidney Swarna S.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 124 - 129
  • [6] Fingerprint based authentication application using visual cryptography methods (Improved ID card)
    Rao, Y. V. Subba
    Sukonkina, Yulia
    Bhagwati, Chakravarthy
    Singh, Umesh Kumar
    [J]. 2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 2133 - 2137
  • [7] Video Identification Based on Watermarking Schemes and Visual Cryptography
    Wafy, Maged
    Zanaty, Samr Gamal
    Elkhouly, Mahmoud
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (02): : 441 - 453
  • [8] Video identification based on watermarking schemes and visual cryptography
    Wafy, Maged
    Zanaty, Samr Gamal
    Elkhouly, Mahmoud
    [J]. Computer Systems Science and Engineering, 2021, 40 (02): : 441 - 453
  • [9] CELLULAR AUTOMATA BASED IMAGE AUTHENTICATION SCHEME USING EXTENDED VISUAL CRYPTOGRAPHY
    Kukreja, Sonal
    Kasana, Geeta
    Kasana, Singara Singh
    [J]. COMPUTING AND INFORMATICS, 2019, 38 (06) : 1272 - 1300
  • [10] Medical Image Watermarking for Copyright Protection Based on Visual Cryptography
    Benyoussef, Meryem
    Mabtoul, Samira
    El Marraki, Mohamed
    Aboutajdine, Driss
    [J]. 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 93 - 98