Effects of Reversible Watermarking on Iris Recognition Performance

Fragile watermarking has been proposed as a means
of adding additional security or functionality to biometric systems,
particularly for authentication and tamper detection. In this paper
we describe an experimental study on the effect of watermarking
iris images with a particular class of fragile algorithm, reversible
algorithms, and the ability to correctly perform iris recognition.
We investigate two scenarios, matching watermarked images
to unmodified images, and matching watermarked images to
watermarked images. We show that different watermarking schemes
give very different results for a given capacity, highlighting the
importance ofinvestigation. At high embedding rates most algorithms
cause significant reduction in recognition performance. However,
in many cases, for low embedding rates, recognition accuracy is
improved by the watermarking process.





References:
Biometric Working Group, "Biometric security concerns,” Biometric
Working Group, UK Government, Tech. Rep., 2003.
[2] C. Roberts, "Biometric attack vectors and defences,” Computers &
Security, vol. 26, no. 1, pp. 14 – 25, 2007.
[3] J. Hammerle-Uhl, ¨ K. Raab, and A. Uhl, "Watermarking as a means
to enhance biometric systems: a critical survey,” in Proceedings of the
13th international conference on Information hiding,ser. IH’11. Berlin,
Heidelberg: Springer-Verlag, 2011, pp. 238–254.
[4] ——, "Experimentalstudy on the impact of robust watermarking on iris
recognition accuracy,” in Proceedings of the 2010 ACM Symposium on
Applied Computing. ACM, 2010, pp. 1479–1484.
[5] J. Dong and T. Tan, "Effects of watermarking on iris recognition
performance,” in Proc. 10th Int. Conf. Control, Automation, Robotics
and Vision ICARCV 2008, 2008, pp. 1156–1161.
[6] J.-B. Feng, I.-C. Lin, C.-S. Tsai, and Y.-P. Chu, "Reversible
watermarking: Current status and key issues,” I. J. Network Security,
vol. 2, no. 3, pp. 161–170, 2006.
[7] A. K. Jain, U. Uludag, and R.-L. Hsu, "Hiding a face in a fingerprint
image,” in Proc. 16th Int Pattern Recognition Conf, vol. 3, 2002, pp.
756–759.
[8] A. Hassanien, "Hiding iris data for authentication of digital images using
wavelet theory,” Pattern Recognition and Image Analysis, vol. 16, pp.
637–643, 2006, 10.1134/S1054661806040092.
[9] P. Blythe and J. Fridrich, "Secure digital camera,” in in Proceedings of
Digital Forensic Research Workshop (DFRWS, 2004, pp. 17–19.
[10] M. M. Yeung and S. Pankanti, "Verification watermarks on fingerprint
recognition and retrieval,” in Proc. SPIE EI, 1999, pp. 66–78.
[11] N. Bartlow, N. Kalka, B. Cukic, and A. Ross, "Protecting iris images
through asymmetric digital watermarking,” in Proc. IEEE Workshop
Automatic Identification Advanced Technologies, 2007, pp. 192–197.
[12] T. Hoang, D. Tran, and D. Sharma, "Remote multimodal biometric
authentication using bit priority-based fragile watermarking,” in Proc.
19th Int. Conf. Pattern Recognition ICPR 2008, 2008, pp. 1–4.
[13] A. Jain and U. Uludag, "Hiding fingerprint minutiae in images,” in
Proceedings of Third Workshop on Automatic Identification Advanced
Technologies (AutoID), 2002, 2002, pp. 97–102.
[14] A. Noore, R. Singh, M. Vatsa, and M. M. Houck, "Enhancing security
of fingerprintsthrough contextual biometric watermarking,” Forensic Sci
Int, vol. 169, no. 2, pp. 188–194, Jul. 2007.
[15] M. Vatsa, R. Singh, and A. Noore, "Feature based rdwt watermarking
for multimodal biometric system,” Image Vision Comput., vol. 27, pp.
293–304, February 2009.
[16] R. Huber, H. Stogner ¨ , and A. Uhl, "Two-factor biometric recognition
with integrated tamper-protection watermarking,” in Proceedings of the
12th IFIP TC 6/TC 11 international conference on Communications and
multimedia security,ser. CMS’11. Berlin, Heidelberg: Springer-Verlag,
2011, pp. 72–84.
[17] A. K. Jain and U. Uludag, "Hiding biometric data,” IEEE Transactions
on Pattern Analysis and Machine Intelligence, vol. 25, no. 11, pp.
1494–1498, 2003.
[18] T. Satonaka, "Biometric watermark authentication with multiple
verification rule,” in Proc. 12th IEEE Workshop Neural Networks for
Signal Processing, 2002, pp. 597–606.
[19] J. Daugman, "High confidence visual recognition of persons by a test
of statistical independence,” IEEE Transactions on Pattern Analysis and
Machine Intelligence, vol. 15, no. 11, pp. 1148–1161, 1993.
[20] E. Krichen, A. Mellakh, S. Salicetti, and B. Dorizzi, "Osiris (open
source for iris) reference system,” BioSecure Project, Tech. Rep., 2008.
[Online]. Available: http:/www.biosecure.info
[21] C. Xu and J. Prince, "Snakes, shapes, and gradient vector flow,” IEEE
Transactions on Image Processing, vol. 7, no. 3, pp. 359–369, 1998.
[22] P. Phillips, K. Bowyer, P. Flynn, X. Liu, and W. Scruggs, "The iris
challenge evaluation 2005,” in Biometrics: Theory, Applications and
Systems, 2008. BTAS 2008. 2nd IEEE International Conference on.
IEEE, 2008, pp. 1–8.
[23] M. Celik, G. Sharma, A. Tekalp, and E. Saber, "Lossless generalized-lsb
data embedding,” IEEE Transactions on Image Processing, vol. 14,
no. 2, pp. 253–266, 2005.
[24] J. Tian, "Reversible data embedding using a difference expansion,” IEEE
Transactions on Circuits and Systems For Video Technology, vol. 13,
no. 8, pp. 890–896, 2003.
[25] V. Sachnev, H. Kim, J. Nam, S. Suresh, and Y. Shi, "Reversible
watermarking algorithm using sorting and prediction,” IEEE
Transactions on Circuits and Systems For Video Technology, vol. 19,
no. 7, pp. 989–999, 2009.
[26] S. Weng, Y. Zhao,J. Pan, and R. Ni, "Reversible watermarking based on
invariability and adjustment on pixel pairs,” Signal Processing Letters,
IEEE, vol. 15, pp. 721–724, 2008.
[27] Y. Li, C. Yeh, and C. Chang, "Data hiding based on the
similarity between neighboring pixels with reversibility,” Digital Signal
Processing, vol. 20, no. 4, pp. 1116–1128, 2010.
[28] B. Yang, M. Schmucker, W. Funk, C. Busch, and S. Sun, "Integer
dct-based reversible watermarking for images using companding
technique,” in Proceedings of SPIE, vol. 5306. Citeseer, 2004, pp.
5306–41.
[29] S. Lee, C. Yoo, and T. Kalker, "Reversible image watermarking based
on integer-to-integer wavelet transform,” Information Forensics and
Security, IEEE Transactions on, vol. 2, no. 3, pp. 321–330, 2007.
[30] Z. Wang, A. Bovik, H. Sheikh, and E. Simoncelli, "Image quality
assessment: From error visibility to structural similarity,” IEEE
Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, 2004.
[31] E. DeLong, D. DeLong, and D. Clarke-Pearson, "Comparing the areas
under two or more correlated receiver operating characteristic curves: a
nonparametric approach.” Biometrics, vol. 44, no. 3, pp. 837–845, 1988.