Fusion of LSB and DWT Biometric Watermarking Using Offline Handwritten Signature for Copyright Protection

  • Cheng-Yaw Low
  • Andrew Beng-Jin Teoh
  • Connie Tee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5558)

Abstract

Biometric watermarking was introduced as the synergistic integration of biometrics and digital watermarking technology. This paper proposes a novel biometric watermarking technique, which embeds offline handwritten signature in host image for copyright protection. We propose to combine the conventional LSB-based and DWT-based watermarking techniques into a unison framework, which is known as LSB-DWT in this paper. The proposed LSB-DWT technique is evaluated against various simulated security attacks, i.e. JPEG compression, Gaussian low-pass filtering, median filtering, Gaussian noise, scaling, rotation and cropping. The experimental results demonstrate that the proposed LSB-DWT technique exhibits remarkable watermark imperceptibility and watermark robustness.

Keywords

Biometric watermarking offline handwritten signature copyright protection 

References

  1. 1.
    Chen, T.S., Chang, C.C., Hwang, M.S.: A Virtual Image Cryptosystem based upon Vector Quantization. IEEE Transactions on Image Processing 7, 1485–1488 (1998) Google Scholar
  2. 2.
    Hartung, F., Kutter, M.: Multimedia Watermarking Technique. IEEE Transactions - Invited Paper 87(7), 1079–1107 (1999) Google Scholar
  3. 3.
    Chen, T., Wang, J.C.: Image Watermarking Method using Integer-to-Integer Wavelet Transform. Tsinghua Science and Technology 7(5), 508–512 (2002) Google Scholar
  4. 4.
    Jain, A.K., Uludag, U., Hsu, R.L.: Hiding a Face into a Fingerprint Image. In: IEEE International Conference on Pattern Recognition (2002) Google Scholar
  5. 5.
    Jain, A.K., Uludag, U.: Hiding Biometric Data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(11), 1494–1498 (2003) Google Scholar
  6. 6.
    Namboodiri, A.M., Jain, A.K.: Multimedia Document Authentication using On-line Signatures as Watermarks. In: Proceedings of SPIE on Security, Steganography and Watermarking of Multimedia Content VI, vol. 5306, pp. 653–662 (2004) Google Scholar
  7. 7.
    Hassanien, A.E.: Hiding Iris Data for Authentication of Digital Images using Wavelet Theory. Pattern Recognition and Image Analysis 16(4), 637–643 (2005) Google Scholar
  8. 8.
    Kevenaar, T.A.M., Schrijen, G.J., Van der Veen, M., Akkermans, A.H.M.: Face Recognition with Renewable and Privacy Preserving Binary Templates. In: IEEE Workshop on Automatic Identification Advanced Technologies, pp. 21–26 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Cheng-Yaw Low
    • 1
  • Andrew Beng-Jin Teoh
    • 2
  • Connie Tee
    • 1
  1. 1.Faculty of Information Science and TechnologyMultimedia UniversityMelakaMalaysia
  2. 2.Electrical and Electronic Engineering DepartmentYonsei UniversitySeoulSouth Korea

Personalised recommendations