TY - JOUR
T1 - An efficient watermarking technique for the protection of fingerprint images
AU - Zebbiche, Khalil
AU - Khelifi, Fouad
AU - Bouridane, Ahmed
N1 - Article ID 918601
PY - 2008/11/18
Y1 - 2008/11/18
N2 - This paper describes an efficient watermarking technique for use to protect fingerprint images. The rationale is to embed the watermarks into the ridges area of the fingerprint images so that the technique is inherently robust, yields imperceptible watermarks, and resists well against cropping and/or segmentation attacks. The proposed technique improves the performance of optimum multibit watermark decoding, based on the maximum likelihood scheme and the statistical properties of the host data. The technique has been applied successfully on the well-known transform domains: discrete cosine transform (DCT) and discrete wavelet transform (DWT). The statistical properties of the coefficients from the two transforms are modeled by a generalized Gaussian model, widely adopted in the literature. The results obtained are very attractive and clearly show significant improvements when compared to the conventional technique, which operates on the whole image. Also, the results suggest that the segmentation (cropping) attack does not affect the performance of the proposed technique, which also provides more robustness against other common attacks.
AB - This paper describes an efficient watermarking technique for use to protect fingerprint images. The rationale is to embed the watermarks into the ridges area of the fingerprint images so that the technique is inherently robust, yields imperceptible watermarks, and resists well against cropping and/or segmentation attacks. The proposed technique improves the performance of optimum multibit watermark decoding, based on the maximum likelihood scheme and the statistical properties of the host data. The technique has been applied successfully on the well-known transform domains: discrete cosine transform (DCT) and discrete wavelet transform (DWT). The statistical properties of the coefficients from the two transforms are modeled by a generalized Gaussian model, widely adopted in the literature. The results obtained are very attractive and clearly show significant improvements when compared to the conventional technique, which operates on the whole image. Also, the results suggest that the segmentation (cropping) attack does not affect the performance of the proposed technique, which also provides more robustness against other common attacks.
UR - https://www.scopus.com/pages/publications/59849097586
U2 - 10.1155/2008/918601
DO - 10.1155/2008/918601
M3 - Article
SN - 1687-4161
SP - 20
JO - Eurasip Journal on Information Security
JF - Eurasip Journal on Information Security
ER -