Article Preview
Top1. Introduction
In the 21st century, the use of computer networks and internet became part of human life. In the modern world, a human can access his/her bank account, e-material using the internet. Due to growth in these types of applications, a secure human authentication system is required and necessary. In earlier days, ID and password based traditional methods are used for human identification. But these systems are not secure and not reliable because easy to stolen and forged. Therefore, the biometric based identification system is more secure, reliable and used as an alternative to the traditional identification system. The biometric based identification system is identified human by his/her physiological characteristics such as fingerprint, facial feature, iris pattern and speech (Jain et al., 2012; Biometrics & Standards, 2009; Biometrics Testing & Statistics, 2006). There are two major concerns are associated with biometric based identification system such as first, security and privacy issue of the biometric image against spoof attack at system storage and second as stolen or modification attack when biometric image transfer from one module to another module in the system (Ratha et al., 2001).
The watermarking scheme is used for providing security against these two attacks in biometric based identification system (Rege, 2012; Jain et al., 2012; Kejariwal, 2003). The extraction of the actual watermark data is not possible in fragile watermarking scheme when any modification is applied on watermarked biometric image. This makes these techniques more suitable for security and authenticity of biometric images at system database against spoof attack. The few fragile watermarking schemes for biometric images are proposed by various researchers. These techniques are mentioned and reviewed in next subsection.