Securing Biometrics Using Watermarking

Securing Biometrics Using Watermarking

Punam Bedi, Roli Bansal, Priti Sehgal
ISBN13: 9781466687899|ISBN10: 1466687894|EISBN13: 9781466687905
DOI: 10.4018/978-1-4666-8789-9.ch048
Cite Chapter Cite Chapter

MLA

Bedi, Punam, et al. "Securing Biometrics Using Watermarking." Human-Computer Interaction: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2016, pp. 1016-1040. https://doi.org/10.4018/978-1-4666-8789-9.ch048

APA

Bedi, P., Bansal, R., & Sehgal, P. (2016). Securing Biometrics Using Watermarking. In I. Management Association (Ed.), Human-Computer Interaction: Concepts, Methodologies, Tools, and Applications (pp. 1016-1040). IGI Global. https://doi.org/10.4018/978-1-4666-8789-9.ch048

Chicago

Bedi, Punam, Roli Bansal, and Priti Sehgal. "Securing Biometrics Using Watermarking." In Human-Computer Interaction: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1016-1040. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-8789-9.ch048

Export Reference

Mendeley
Favorite

Abstract

This chapter focuses on the role of watermarking techniques in biometric systems. Biometric systems are automated systems of verifying or recognizing the identity of a living person based on a physiological or behavioral characteristic. While biometric-based techniques have inherent advantages over other authentication techniques, ensuring the security and integrity of data is a major concern. Data hiding techniques are thus used in biometric systems for securing biometric data itself. Amongst all the biometric techniques, fingerprint-based identification is the oldest and the most well established method used in numerous applications because fingerprints are unique and they remain unchanged during the human life span. However, fingerprint images should be watermarked without affecting their quality and their minutia matching ability. Moreover, if the watermark embedded in the fingerprint image is the face image of the same individual, the watermarking scheme will have two levels of security such that it will not only protect the cover fingerprint but also provides a more secure system of personal recognition and authentication at the receiver's end. This work finds application in a number of security implementations based on multimodal biometric authentication. Computationally intelligent techniques can be employed to develop efficient watermarking algorithms in terms of watermarked image quality and distortion tolerance ability.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.