Skip to main content
Log in

Dual watermarking technique with multiple biometric watermarks

  • Published:
Sadhana Aims and scope Submit manuscript

Abstract

In order to improve the robustness of the watermarking algorithm, a dual watermarking method is proposed to prove copyright ownership. Visible watermarking is important for protecting online resources from unauthorized reproduction. However robust, visible watermarks are vulnerable to illegal removal and other common signal processing and geometric attacks. Multiple invisible watermarks can enhance the protection of the visibly watermarked image. When the ownership of tampered image is in question, the invisible watermark can be extracted to provide appropriate ownership information. We have proposed dual watermarking scheme with multiple biometric watermarks in which it embeds speech and face biometric traits of owner invisibly and lastly offline signature is overlaid translucently on image. Before embedding, speech is compressed using Linear Predictive Coding (LPC) and Gabor face is created from face biometric trait. All three watermarks Gabor face, LPC coefficients and offline signature are the biometric characteristics of the owner and hence they are highly related with copyright holder. The proposed scheme is robust enough, Gabor face and LPC coefficients can be extracted from the signature marked image or even from the tampered image from which signature is removed illegally or legally. As multiple watermarks are embedded at least one watermark survives under different attacks. It can find application for joint ownership or to address single ownership multiple times.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12

Similar content being viewed by others

References

  • Allah M M A 2007 Embedding biometric data for secure authentication watermarking. Proc. Fourth IASTED internat. conf. Signal Processing, Pattern Recognition and Appl., 191–196

  • Bhatnagar G and Raman B 2012 Wavelet packet transform-based robust video watermarking technique. Sadhana 37(3): 371–388

    Article  Google Scholar 

  • Feng G and Lin Q 2007 Iris feature based watermarking algorithm for personal identification. Proc. MIPPR Remote sensing and GIS data Proc. Appl., vol. 6790, 5

  • Hammerle-Uhe J, Liedlgruber M, Uhl A and Wernisch H 2008 Multiple re-watermarking Using Varying Wavelet Packets, pp. 213–216, ICME

  • Hassanien A E 2007 Hiding iris data for authentication of digital images using wavelet theory. ICGST International journal of Graphics, Vision and Image processing (GVIP special issue on iris recognition), vol. 17, 27–32

  • Hong L and Jain A 1998 Integrating faces and fingerprints for personal identification. IEEE Trans. Pattern Anal. Mach. Intell. 20(12): 1295–1307

    Article  Google Scholar 

  • Hu Y, Kwong S and Huang J 2004 Using invisible watermarks to protect visibly watermarked images. Proc. Internat. Symp. Circuits and Systems (ISCAS ’04), vol. 5, 584–587

    Google Scholar 

  • Hu Y, Kwong S and Huang J 2006 An algorithm for removable visible watermarking. IEEE Trans. Circuits Syst. Video Technol. 16(1): 129–133

    Article  Google Scholar 

  • Hu Y and Jeon B 2006 Reversible visible watermarking and lossless recovery of original images. IEEE Trans. Circuits Syst. Video Technol. 16(11): 1423–1429

    Article  Google Scholar 

  • Huang B B and Tang S X 2006 A contrast sensitive visible watermarking scheme. IEEE J. Multi. 13(2): 60–66

    Article  Google Scholar 

  • Inamdar V S, Rege P and Bang A 2009 Speech Based Watermarking for Digital Images. IEEE Internat. Conf. TENCON, Singapore

  • Jain A K, Uludag U and Hsu R-L 2002a Hiding a face in a fingerprint image. Proc. 16 th Internat. Conf. Pattern Recognition, 3: 756–759

    Article  Google Scholar 

  • Jain A K and Uludag U 2002b Hiding fingerprint minutiae in images. Proc. third Workshop Automatic Identification Advanced Technologies, 97–102

  • Jain A K and Uludag U 2003a Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25(11): 1494–1498

    Article  Google Scholar 

  • Jain A K and Uludag U 2003b Multimedia content protection via biometric based encryption. IEEE proc. Internat. Conf. Multimedia and Expo, ICME, Baltimore, USA, vol. 3

  • Jakimoski G and Kocarev L 2001 Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. Fundamental Theory Appl. 48(2): 163–169

    Article  MATH  MathSciNet  Google Scholar 

  • Jung S, Lee D, Lee S and Paik J 2007a Biometric data based robust watermarking scheme of video streams. Proc. IEEE 6th internat. conf. Inform., Commun. Signal Process., Singapore

  • Jung S, Lee D, Lee S and Paik J 2007b Fingerprint watermarking for H.264 streaming media. Frontiers in the Convergence of Biosci. Inform. IEEE Conf., 671–675

  • Kamarainen J-K, Kyrki V and Kalviainen H 2006 Invariance properties of Gabor filtering based features overview and applications. IEEE Trans. Image Process. 15(5): 1088–1099

    Article  Google Scholar 

  • Kumhom P and Chamnongthai K 2004 Image watermarking based on wavelet packet transform with best tree. Trans. Elect. Eng. Electron. Commun. 2(1): 23–35

    Google Scholar 

  • Liu S H, Yao H-X, Gao W and Liu Y-L 2007 An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl. Math. Comput. 185(2): 869–882

    Article  MATH  Google Scholar 

  • Low C Y and Teoh A B J 2007 A preliminary study on biometric watermarking for offline handwritten signature. Proc. 2007 IEEE Internat. Conf. Commun., 691–695

  • Low C Y, Teoh A B-J and Tea C 2008a Fusion of LSB and DWT biometric watermarking for offline handwritten signature, 2008 Congress on Image and Signal processing, IEEE Comp. Soci., 702–708

  • Low C Y, Teoh A B-J and Tea C 2008b Support Vector Machines (SVM) based biometric watermarking for offline handwritten signature. Proc. 3 rd IEEE conf. Indust. Electro. appl., ICIEA, Singapore, 2095–2100

  • Mark D, Uhl A and Werniisch H 2007 Experimental study on watermark interference in multiple re-watermarking. Security, Steganography and Watermarking of Multimedia Contents Ix, San Jose, CA, USA, vol. 6505

  • Mascher-Kampfer A, Stonger H and Uhl A 2006 Multiple Re-Watermarking Scenarios. Proc. 13 th Internat. Conf. Systems, Signals and Image processing IWSSIP, Budapest, Hungary, 53–56

  • Mohanty S P, Ramakrishnan K and Kankanhalli M 1999 A dual watermarking technique for images. ACM Multimedia Orlando, Florida, 49–51

  • Nagamalleswara Rao N, Trimurthy P and Raveendra Babu B 2009 A Novel scheme for digital rights management of images using biometrics. IJCSNS Int. J. Comput. Sci. Netw. Sec. 9(3): 157–167

    Google Scholar 

  • Namboodiri A and Jain A 2004 Multimedia document authentication using online signatures as watermarks. Security, Steganography and Watermarking of Multimedia Contents VI 5306: 653–662

    Article  Google Scholar 

  • Noore A, Singh R, Vasta M and Houck M 2007 Enhancing security of fingerprints through contextual biometric watermarking. Proc. Forensic Sci. Int. 169: 188–194

    Article  Google Scholar 

  • Rajbul I, Shohel S and Samraj A 2007 Multimodality to improve security and privacy in fingerprint authentication system. Proc. Internat. Conf. intelligent and Advanced Systems 753–752

  • Salleh S I and Isnin I F 2002 Ciphering key of chaos image encryption. Proc. Internat. Conf. AI and Engineering Technol., (Sabah, Malaysia), UNIMAS

  • Shen L and Bai L 2006 Information theory for Gabor feature selection for face recognition, Hindawi publishing Corporation. EURASIP J. Appl. Signal Process. 2006: 1–12

    Article  Google Scholar 

  • Sheppard N P, Safavi-Naini R and Ogunbona P 2001 On multiple watermarking. Proceedings of the ACM Multimedia and Security Workshop 2001 (MMSW-01), ACM Press, Ottawa, Canada, 3–6

  • Struc V and Pavesic N 2010 The Complete Gabor Fisher classifier for robust face recognition, Hindawi publishing Corporation. EURASIP J. Advances Signal Process. 2010: 1–27

    Article  Google Scholar 

  • Vatsa M, Singh R and Noore A 2005 Improving biometric recognition accuracy and robustness using DWT and SVM Watermarking. IEICE Electronics Express 2(12): 362–367

    Article  Google Scholar 

  • Vatsa M, Singh R and Noore A 2006 Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 3(2): 23–28

    Article  Google Scholar 

  • Vatsa M, Singh R and Noore A 2009 Feature based RDWT watermarking for multimodal biometric system. Science Direct, Image and Vision Computing 27: 293–304

    Article  Google Scholar 

  • Wan D-S, Li J P and Yan Y-H 2007 A novel authentication scheme of the DRM system based on multimodal biometric verification and watermarking technique. Proc. Internat. conf. Apperceiving Computing and Intelligence Analysis, 212–215

  • Wang H, Cui X and Cao Z 2008 A Speech based Algorithm for Watermarking Relational Databases. Internat. Symp. Inform. Process., Moscow, Russia

  • Wong P W and Memon N 2001 Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10: 1593–1601

    Article  MATH  Google Scholar 

  • Yang H, Sun X and Li C-T 2008 Removable visible image watermarking algorithm in the discrete cosine transform domain. J. Electronic Imaging 17(3): 033008

    Article  Google Scholar 

  • Yang Y, Sun X, Yang H, Li C T and Xiao R 2009 A contrast sensitive reversible visible image watermarking technique. IEEE Trans. Circuits Syst. Video Technol. 19(5): 656–667

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to VANDANA S INAMDAR.

Rights and permissions

Reprints and permissions

About this article

Cite this article

INAMDAR, V.S., REGE, P.P. Dual watermarking technique with multiple biometric watermarks. Sadhana 39, 3–26 (2014). https://doi.org/10.1007/s12046-013-0208-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12046-013-0208-3

Keywords

Navigation