Skip to main content

Digital Gray-Scale Watermarking Based on Biometrics

  • Conference paper
  • First Online:
Intelligent Interactive Multimedia Systems and Services

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 40))

Abstract

In this paper, a technical solution of digital gray-scale watermarking for law enforcement and copyright protection for digital media is developed. The biometrically generated keys provide higher level of security, when a key is created using biometrical information, in our caseā€”the fingerprint images. First, feature points and, second, fast binary descriptors are applied for secret keys creation. Also a map of feature points is used to randomize the embedded watermark. A blind scheme of gray-scale watermark transform is implemented, when the secret keys ought to be transferred through a secret channel without necessity to transfer whole host image. Two types of transforms such as Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) are investigated for embedding of watermark in a host image. Numerical estimations of attacked image restoration show a superiority of the DWT for geometric attacks including shifts and rotations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cox, I., Kilian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Proc. 6(12), 1673ā€“1687 (1997)

    ArticleĀ  Google ScholarĀ 

  2. Barni, M., Bartiloni, F., Cappellini, V., Piva, A.: A DCT domain system for robust image watermarking. Sig. Process. 66(3), 357ā€“372 (1998)

    ArticleĀ  MATHĀ  Google ScholarĀ 

  3. Dawei, Z., Guanrong, C., Wenbo, L.: A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons Fractals 22(1), 47ā€“54 (2004)

    ArticleĀ  MATHĀ  Google ScholarĀ 

  4. Delong, C.: Dual digital watermarking algorithm for image based on fractional Fourier transform. In: 2nd Pacific-Asia Conference on Web Mining and Web-Based Application, pp. 51ā€“54. IEEE Press, Wuhan (2009)

    Google ScholarĀ 

  5. Lee, J.J., Kim, W., Lee, N.Y., Ki, G.Y.: A new incremental watermarking based on dual-tree complex wavelet transform. J. Supercomputing 33, 133ā€“140 (2005)

    ArticleĀ  Google ScholarĀ 

  6. Wang, Y., Doherty, J.F., Dyck, R.E.: A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Proc. 11(2), 77ā€“88 (2002)

    ArticleĀ  Google ScholarĀ 

  7. Wang, S.H., Lin, Y.P.: Wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Proc. 13(2), 154ā€“165 (2004)

    ArticleĀ  Google ScholarĀ 

  8. Barni, M., Bartolini, F., Pive, A.: Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. Image Proc. 5(10), 783ā€“791 (2001)

    ArticleĀ  Google ScholarĀ 

  9. Bhatnagar, G., Raman, B.: A new reference watermarking scheme based on DWTā€“SVD. Comput. Stand. Interfaces 31(5), 1002ā€“1013 (2009)

    ArticleĀ  Google ScholarĀ 

  10. Ismail, I., Amin, M., Diab, H.: A digital image encryption algorithm based a composition of two chaotic logistic maps. Int. J. Netw. Secur. 11(1), 1ā€“10 (2010)

    Google ScholarĀ 

  11. Fateri, S., Enayatifar, R.: A new method for image encryption via standard rules of CA and logistic map function. Int. J. Phys. Sci. 6(12), 2921ā€“2926 (2011)

    Google ScholarĀ 

  12. Calonder, M., Lepetit, V., Strecha, C., Fua, P.: BRIEF: binary robust independent elementary features. In: Daniilidis, K., Marago, P., Paragios, N. (eds.) Computer Visionā€”ECCV 2010, Part IV, LNCS, vol. 6314, pp. 778ā€“792. Springer, Heidelberg (2010)

    Google ScholarĀ 

  13. Leutenegger, S., Chli, M., Siegwart, R.Y.: BRISK: binary robust invariant scalable keypoints. In: IEEE International Conference on Computer Vision, pp. 2548ā€“2555. IEEE Press, Barcelona (2011)

    Google ScholarĀ 

  14. Koch, E., Zhao, J.: Towards robust and hidden image copyright labeling. In: IEEE Workshop on Nonlinear Signal and Image Processing. pp. 123ā€“132. IEEE Press, Halkidiki (1995)

    Google ScholarĀ 

  15. Wang, Z., Lu, L., Bovik, A.C.: Video quality assessment based on structural distortion measurement. Sig. Process. Image Commun. 19(2), 121ā€“132 (2004)

    ArticleĀ  Google ScholarĀ 

  16. Chandler, D.M., Hemami, S.S.: VSNR: a wavelet-based visual signal-to-noise ratio for natural images. IEEE Trans. Image Proc. 16(9), 2284ā€“2298 (2007)

    ArticleĀ  MathSciNetĀ  Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Margarita Favorskaya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Favorskaya, M., Oreshkina, E. (2015). Digital Gray-Scale Watermarking Based on Biometrics. In: Damiani, E., Howlett, R., Jain, L., Gallo, L., De Pietro, G. (eds) Intelligent Interactive Multimedia Systems and Services. Smart Innovation, Systems and Technologies, vol 40. Springer, Cham. https://doi.org/10.1007/978-3-319-19830-9_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19830-9_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19829-3

  • Online ISBN: 978-3-319-19830-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics