Skip to main content
Top

2016 | OriginalPaper | Chapter

A Commutative Encryption and Reversible Watermarking for Fingerprint Image

Authors : Vaibhav B. Joshi, Dhruv Gupta, Mehul S. Raval

Published in: Digital-Forensics and Watermarking

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this work, authors propose a novel scheme with commutative encryption and reversible watermarking for a fingerprint image. Due to commutative property one can embed and extract watermark in either plain or encrypted fingerprint image, irrespective of order in which encryption or watermarking is applied. The encryption and the watermarking keys are shared using secret key sharing mechanism. The biometric database consists of encrypted and watermarked fingerprint images. After successful authentication, watermarking is inverted to get back the plain fingerprint. The proposed scheme protects many of the vulnerable points of a biometric authentication system. Also native biometric authentication accuracy remains unaffected due to reversible watermarking. As per best of our knowledge, this is the first scheme to include homomorphism between encryption and reversible watermarking. Advantages of the proposed method compared to existing techniques are; (1) higher embedding capacity; (2) better peak signal to noise ratio for the decrypted marked image; (3) use of an optimal key length to preserve security while lowering computational cost; (4) simpler cryptographic key management; (5) smaller side information.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
5.
go back to reference Bartlow, N., Kalka, N., Cukic, B., Ross, A.: Protecting IRIS images through asymmetric digital watermarking. In: 2007 IEEE Workshop on Automatic Identification Advanced Technologies, pp. 192–197. IEEE (2007) Bartlow, N., Kalka, N., Cukic, B., Ross, A.: Protecting IRIS images through asymmetric digital watermarking. In: 2007 IEEE Workshop on Automatic Identification Advanced Technologies, pp. 192–197. IEEE (2007)
6.
go back to reference Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)CrossRef Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)CrossRef
7.
go back to reference Huber, R., Stögner, H., Uhl, A.: Semi-fragile watermarking in biometric systems: template self-embedding. In: Real, P., Diaz-Pernil, D., Molina-Abril, H., Berciano, A., Kropatsch, W. (eds.) CAIP 2011, Part II. LNCS, vol. 6855, pp. 34–41. Springer, Heidelberg (2011)CrossRef Huber, R., Stögner, H., Uhl, A.: Semi-fragile watermarking in biometric systems: template self-embedding. In: Real, P., Diaz-Pernil, D., Molina-Abril, H., Berciano, A., Kropatsch, W. (eds.) CAIP 2011, Part II. LNCS, vol. 6855, pp. 34–41. Springer, Heidelberg (2011)CrossRef
8.
go back to reference Jain, A.K., Kumar, A.: Biometrics of next generation: An overview. Second Generation Biometrics (2010) Jain, A.K., Kumar, A.: Biometrics of next generation: An overview. Second Generation Biometrics (2010)
9.
go back to reference Joshi, V.B., Raval, M.S., Gupta, D., Rege, P.P., Parulkar, S.: A multiple reversible watermarking technique for fingerprint authentication. Multimedia Syst., 1–12 (2015) Joshi, V.B., Raval, M.S., Gupta, D., Rege, P.P., Parulkar, S.: A multiple reversible watermarking technique for fingerprint authentication. Multimedia Syst., 1–12 (2015)
10.
go back to reference Khan, M.K., Zhang, J.-S., Tian, L.: Protecting biometric data for personal identification. In: Li, S.Z., Lai, J.-H., Tan, T., Feng, G.-C., Wang, Y. (eds.) SINOBIOMETRICS 2004. LNCS, vol. 3338, pp. 629–638. Springer, Heidelberg (2004)CrossRef Khan, M.K., Zhang, J.-S., Tian, L.: Protecting biometric data for personal identification. In: Li, S.Z., Lai, J.-H., Tan, T., Feng, G.-C., Wang, Y. (eds.) SINOBIOMETRICS 2004. LNCS, vol. 3338, pp. 629–638. Springer, Heidelberg (2004)CrossRef
11.
go back to reference Li, C., Wang, Y., Ma, B., Zhang, Z.: Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimedia Tools Appl. 64(3), 757–776 (2013)CrossRef Li, C., Wang, Y., Ma, B., Zhang, Z.: Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimedia Tools Appl. 64(3), 757–776 (2013)CrossRef
12.
go back to reference Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)CrossRef Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)CrossRef
14.
go back to reference Raval, M.S.: A secure steganographic technique for blind steganalysis resistance. In: Seventh International Conference on Advances in Pattern Recognition, 2009. ICAPR 2009, pp. 25–28. IEEE (2009) Raval, M.S.: A secure steganographic technique for blind steganalysis resistance. In: Seventh International Conference on Advances in Pattern Recognition, 2009. ICAPR 2009, pp. 25–28. IEEE (2009)
15.
go back to reference Schmidt, G.: Relational mathematics, no. 132 in encyclopedia of mathematics and its applications (2010) Schmidt, G.: Relational mathematics, no. 132 in encyclopedia of mathematics and its applications (2010)
16.
go back to reference Wang, D.S., Li, J.P., Wen, X.Y.: Biometric image integrity authentication based on SVD and fragile watermarking. In: Congress on Image and Signal Processing, 2008. CISP 2008. vol. 5, pp. 679–682. IEEE (2008) Wang, D.S., Li, J.P., Wen, X.Y.: Biometric image integrity authentication based on SVD and fragile watermarking. In: Congress on Image and Signal Processing, 2008. CISP 2008. vol. 5, pp. 679–682. IEEE (2008)
17.
go back to reference Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Sign. Process. 94, 118–127 (2014)CrossRef Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Sign. Process. 94, 118–127 (2014)CrossRef
18.
go back to reference Zhang, X.: Reversible data hiding in encrypted image. Sign. Process. Lett. IEEE 18(4), 255–258 (2011)CrossRef Zhang, X.: Reversible data hiding in encrypted image. Sign. Process. Lett. IEEE 18(4), 255–258 (2011)CrossRef
19.
go back to reference Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)CrossRef Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)CrossRef
20.
go back to reference Zhang, X.: Commutative reversible data hiding and encryption. Secur. Commun. Netw. 6(11), 1396–1403 (2013)CrossRef Zhang, X.: Commutative reversible data hiding and encryption. Secur. Commun. Netw. 6(11), 1396–1403 (2013)CrossRef
Metadata
Title
A Commutative Encryption and Reversible Watermarking for Fingerprint Image
Authors
Vaibhav B. Joshi
Dhruv Gupta
Mehul S. Raval
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-31960-5_27

Premium Partner