Invertible Watermarking Algorithm with Detecting Locations of Malicious Manipulation for Biometric Image Authentication
In this paper, we present a new method for authentication of biometric images. Our method uses an invertible watermark that can also detect malicious manipulations simultaneously. While virtually all watermarking schemes introduce a small amount of non-invertible distortion in original biometric images, our new method is invertible in the sense that, if the data is deemed authentic, distortion due to authentication can be removed if it becomes necessary to obtain the original biometric image. This technique provides cryptographic strength when verifying image integrity because the probability of making an undetectable modification to the image can be directly related to a secure cryptographic element, such as a hash function. Also, if the biometric image is manipulated, the positions of intentional manipulation can be clearly identified.
KeywordsLocal Information Hash Function Face Image Iris Image Digital Watermark
- 1.Khalifa, O., Islam, M., Khan, S., Shebani, M.: Communications cryptography, RF and Microwave Conference. In: Proceedings of RFM 2004, October 5-6, pp. 220–223 (2004)Google Scholar
- 3.Fridrich, J., Goljan, M., Du, R.: Invertible authentication watermark for JPEG images. In: International Conference on Information Technology: Coding and Computing (ITCC), Las Vegas, Nevada, USA, April 2001, pp. 223–227 (2001)Google Scholar