Skip to main content

Attack against Robust Watermarking-Based Multimodal Biometric Recognition Systems

  • Conference paper
Biometrics and ID Management (BioID 2011)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 6583))

Included in the following conference series:

Abstract

Several multimodal biometric schemes have been suggested in literature which employ robust watermarking in order to embed biometric template data into biometric sample data. In case robust embedding is used as the sole means of security, tampering attacks can be mounted. The results of a corresponding attack against a multimodal iris recognition scheme show, that in this environment either semi-fragile watermarking or additional classical cryptographic means need to be applied to secure the system against the demonstrated attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bartlow, N., Kalka, N., Cukic, B., Ross, A.: Protecting iris images through asymmetric digital watermarking. In: IEEE Workshop on Automatic Identification Advanced Technologies, vol. 4432, pp. 192–197. West Virginia University, Morgantown (2007)

    Chapter  Google Scholar 

  2. Chung, Y., Moon, D., Moon, K., Pan, S.: Hiding biometric data for secure transmission. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1049–1057. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Dong, J., Tan, T.: Effects of watermarking on iris recognition performance. In: Proceedings of the 10th International Conference on Control, Automation, Robotics and Vision (ICARCV 2008), pp. 1156–1161 (2008)

    Google Scholar 

  4. Hämmerle-Uhl, J., Raab, K., Uhl, A.: Experimental study on the impact of robust watermarking on iris recognition accuracy (best paper award, applications track). In: Proceedings of the 25th ACM Symposium on Applied Computing, pp. 1479–1484 (2010)

    Google Scholar 

  5. Hoang, T., Tran, D., Sharma, D.: Remote multimodal biometric authentication using bit priority-based fragile watermarking. In: Proceedings of the 19th International Conference on Pattern Recognition, Tampa, Florida, USA, pp. 1–4 (December 2008)

    Google Scholar 

  6. Jain, A.K., Uludag, U.: Hiding fingerprint minutiae in images. In: Proceedings of AutoID 2002, 3rd Workshop on Automatic Identification Advanced Technologies, Tarrytown, New York, USA, pp. 97–102 (March 2002)

    Google Scholar 

  7. Jain, A.K., Uludag, U., Hsu, R.L.: Hiding a face in a fingerprint image. In: Proceedings of the International Conference on Pattern Recognition (ICPR 2002), Quebec City, Canada, pp. 756–759 (August 2002)

    Google Scholar 

  8. Khan, M.K., Xie, L., Zhang, J.S.: Robust hiding of fingerprint-biometric data into audio signals. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 702–712. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Kim, W.-G., Lee, H.K.: Multimodal biometric image watermarking using two-stage integrity verification. Signal Processing 89(12), 2385–2399 (2009)

    Article  MATH  Google Scholar 

  10. Kim, W.-G., Lee, S.H., Seo, Y.-S.: Image Fingerprinting Scheme for Print-and-Capture Model. In: Zhuang, Y.-t., Yang, S.-Q., Rui, Y., He, Q. (eds.) PCM 2006. LNCS, vol. 4261, pp. 106–113. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Moon, D., Kim, T., Jung, S.-H., Chung, Y., Moon, K., Ahn, D., Kim, S.K.: Performance evaluation of watermarking techniques for secure multimodal biometric systems. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 635–642. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Noore, A., Singh, R., Vatsa, M., Houck, M.M.: Enhancing security of fingerprints through contextual biometric watermarking. Forensic Science International 169, 188–194 (2007)

    Article  Google Scholar 

  13. Park, K.R., Jeong, D.S., Kang, B.J., Lee, E.C.: A Study on Iris Feature Watermarking on Face Data. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds.) ICANNGA 2007. LNCS, vol. 4432, pp. 415–423. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Ratha, N.K., Figueroa-Villanueva, M.A., Connell, J.H., Bolle, R.M.: A secure protocol for data hiding in compressed fingerprint images. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 205–216. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  15. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3), 614–634 (2001)

    Article  Google Scholar 

  16. Roberts, C.: Biometric attack vectors and defenses. Computers & Security 26, 14–25 (2007)

    Article  Google Scholar 

  17. Satonaka, T.: Biometric watermark authentication with multiple verification rule. In: Proceedings of the 12th IEEE Workshop on Neural Networks in Signal Processing, pp. 597–606 (2002)

    Google Scholar 

  18. Vatsa, M., Singh, R., Noore, A.: Feature based RDWT watermarking for multimodal biometric system. Image and Vision Computing 27(3), 293–304 (2009)

    Article  Google Scholar 

  19. Vatsa, M., Singh, R., Noore, A., Houck, M.M., Morris, K.: Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 3(2), 23–28 (2006)

    Article  Google Scholar 

  20. Vielhauer, C., Steinmetz, R.: Approaches to biometric watermarks for owner authentification. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, vol. 4314 (January 2001)

    Google Scholar 

  21. Wang, D.-S., Li, J.-P., Hu, D.-K., Yan, Y.-H.: A novel biometric image integrity authentication using fragile watermarking and Arnold transform. In: Li, J.P., Bloshanskii, I., Ni, L.M., Pandey, S.S., Yang, S.X. (eds.) Proceedings of the International Conference on Information Computing and Automatation, pp. 799–802 (2007)

    Google Scholar 

  22. Yeung, M.M., Pankanti, S.: Verification watermarks on fingerprint recognition and retrieval. Journal of Electronal Imaging, Special Issue on Image Security and Digital Watermarking 9(4), 468–476 (2000)

    Google Scholar 

  23. Zebbiche, K., Khelifi, F.: Region-based watermarking of biometric images: Case study in fingerprint images. International Journal of Digital Multimedia Broadcasting (March 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hämmerle-Uhl, J., Raab, K., Uhl, A. (2011). Attack against Robust Watermarking-Based Multimodal Biometric Recognition Systems. In: Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C., Fairhurst, M.C. (eds) Biometrics and ID Management. BioID 2011. Lecture Notes in Computer Science, vol 6583. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19530-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19530-3_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19529-7

  • Online ISBN: 978-3-642-19530-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics