IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Securing Biometrics Using Watermarking

Securing Biometrics Using Watermarking
View Sample PDF
Author(s): Punam Bedi (University of Delhi, India), Roli Bansal (University of Delhi, India)and Priti Sehgal (University of Delhi, India)
Copyright: 2016
Pages: 25
Source title: Human-Computer Interaction: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-8789-9.ch048

Purchase

View Securing Biometrics Using Watermarking on the publisher's website for pricing and purchasing information.

Abstract

This chapter focuses on the role of watermarking techniques in biometric systems. Biometric systems are automated systems of verifying or recognizing the identity of a living person based on a physiological or behavioral characteristic. While biometric-based techniques have inherent advantages over other authentication techniques, ensuring the security and integrity of data is a major concern. Data hiding techniques are thus used in biometric systems for securing biometric data itself. Amongst all the biometric techniques, fingerprint-based identification is the oldest and the most well established method used in numerous applications because fingerprints are unique and they remain unchanged during the human life span. However, fingerprint images should be watermarked without affecting their quality and their minutia matching ability. Moreover, if the watermark embedded in the fingerprint image is the face image of the same individual, the watermarking scheme will have two levels of security such that it will not only protect the cover fingerprint but also provides a more secure system of personal recognition and authentication at the receiver's end. This work finds application in a number of security implementations based on multimodal biometric authentication. Computationally intelligent techniques can be employed to develop efficient watermarking algorithms in terms of watermarked image quality and distortion tolerance ability.

Related Content

Rekha Mewafarosh, Shivani Agarwal, Deeksha Dwivedi. © 2024. 15 pages.
Rishi Prakash Shukla. © 2024. 9 pages.
Priya Makhija, Megha Kukreja, R. Thanga Kumar. © 2024. 11 pages.
Balraj Verma, Niti Chatterji. © 2024. 18 pages.
Peterson K. Ozili. © 2024. 17 pages.
Animesh Kumar Sharma, Rahul Sharma. © 2024. 20 pages.
Mohammad Badruddoza Talukder, Firoj Kabir, Fahmida Kaiser, Farhana Yeasmin Lina. © 2024. 20 pages.
Body Bottom