Semi-fragile Watermarking in Biometric Systems: Template Self-Embedding

  • Reinhard Huber
  • Herbert Stögner
  • Andreas Uhl
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6855)


Embedding biometric templates as image-dependent watermark information in semi-fragile watermark embedding is proposed. Experiments in an iris recognition environment show that the embedded templates can be used to verify sample data integrity and may serve additionally to increase robustness in the biometric recognition process.


Watermark Scheme JPEG Compression Biometric System Iris Recognition Fragile Watermark 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ahmed, F., Moskowitz, I.S.: Composite signature based watermarking for fingerprint authentication. In: Proceedings of the ACM Workshop on Multimedia and Security (MMSEC 2005), pp. 799–802 (2005)Google Scholar
  2. 2.
    Ekici, Ö., Sankur, B., Akcay, M.: A comparative evaluation of semi-fragile watermarking algorithms. Journal of Electronic Imaging 13(1), 209–216 (2003)CrossRefGoogle Scholar
  3. 3.
    Hämmerle-Uhl, J., Raab, K., Uhl, A.: Attack against robust watermarkingbased multimodal biometric recognition systems. In: Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C., Fairhurst, M.C. (eds.) BioID 2011. LNCS, vol. 6583, pp. 25–36. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  4. 4.
    Hämmerle-Uhl, J., Raab, K., Uhl, A.: Watermarking as a means to enhance biometric systems: A critical survey. In: Ker, A., Craver, S., Filler, T. (eds.) Proceedings of the 2011 Information Hiding Conference (IH 2011), Prague, Czech Republic. LNCS. Springer, Heidelberg (to appear, 2011)Google Scholar
  5. 5.
    Komninos, N., Dimitriou, T.: Protecting biometric templates with image watermarking techniques. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 114–123. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  6. 6.
    Lee, H., Lim, J., Yu, S., Kim, S., Lee, S.: Biometric image authentication using watermarking. In: Proceedings of the International Joint Conference SICE-ICASE, 2006, pp. 3950–3953 (2006)Google Scholar
  7. 7.
    Li, C., Ma, B., Wang, Y., Zhang, Z.: Protecting biometric templates using authentication watermarking. In: Qiu, G., Lam, K.M., Kiya, H., Xue, X.-Y., Kuo, C.-C.J., Lew, M.S. (eds.) PCM 2010. LNCS, vol. 6297, pp. 709–718. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  8. 8.
    Ratha, N.K., Figueroa-Villanueva, M.A., Connell, J.H., Bolle, R.M.: A secure protocol for data hiding in compressed fingerprint images. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 205–216. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Yeung, M.M., Pankanti, S.: Verification watermarks on fingerprint recognition and retrieval. Journal of Electronal Imaging, Special Issue on Image Security and Digital Watermarking 9(4), 468–476 (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Reinhard Huber
    • 1
  • Herbert Stögner
    • 1
  • Andreas Uhl
    • 1
    • 2
  1. 1.School of CEITCarinthia University of Applied SciencesAustria
  2. 2.Department of Computer SciencesUniversity of SalzburgAustria

Personalised recommendations