Reference Hub3
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking

Securing Fingerprint Images Through PSO Based Robust Facial Watermarking

Roli Bansal, Priti Sehgal, Punam Bedi
Copyright: © 2012 |Volume: 6 |Issue: 2 |Pages: 19
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466612662|DOI: 10.4018/jisp.2012040103
Cite Article Cite Article

MLA

Bansal, Roli, et al. "Securing Fingerprint Images Through PSO Based Robust Facial Watermarking." IJISP vol.6, no.2 2012: pp.34-52. http://doi.org/10.4018/jisp.2012040103

APA

Bansal, R., Sehgal, P., & Bedi, P. (2012). Securing Fingerprint Images Through PSO Based Robust Facial Watermarking. International Journal of Information Security and Privacy (IJISP), 6(2), 34-52. http://doi.org/10.4018/jisp.2012040103

Chicago

Bansal, Roli, Priti Sehgal, and Punam Bedi. "Securing Fingerprint Images Through PSO Based Robust Facial Watermarking," International Journal of Information Security and Privacy (IJISP) 6, no.2: 34-52. http://doi.org/10.4018/jisp.2012040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Presented is an efficient watermarking scheme using Particle Swarm Optimization (PSO) to watermark host fingerprint images with their corresponding facial images in the Discrete Cosine Transform (DCT) domain. PSO is used to find the best DCT coefficients’ locations in the host image where the facial image data can be embedded, so that the distortion produced in the host image is minimum. The objective function for PSO is formulated in terms of the Structural Similarity Index (SSIM) and the Orientation Certainty Level Index (OCL) so as to base it on the simple visual effect of the human visual perception capability and correct minutia prediction ability. The results exhibit better watermarked image quality while retaining the feature set of the original fingerprint. Moreover, the proposed technique is robust so that the extraction of watermark is possible even after the watermarked image is exposed to attacks. As a result, at the receiver’s end, the watermarked fingerprint image and the extracted facial image can be verified for a secure and accurate biometric based personal authentication.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.