Reversible watermarking technique for fingerprint authentication based on DCT

In this paper, a new reversible and blind fingerprint image watermarking technique based on the differential method and discrete cosine transform (DCT) domains is presented. The focus is to increase the security of the fingerprint image in authentication systems. Two CTtransformed sub-vectors are em...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohamed, Lebcir, Suryanti, Awang, Benziane, Ali
Format: Conference or Workshop Item
Language:English
English
Published: IOP Publishing 2020
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/27721/1/66.%20Reversible%20watermarking%20technique%20for%20fingerprint%20authentication%20based%20on%20DCT.pdf
http://umpir.ump.edu.my/id/eprint/27721/2/66.1%20Reversible%20watermarking%20technique%20for%20fingerprint%20authentication%20based%20on%20DCT.pdf
http://umpir.ump.edu.my/id/eprint/27721/
https://doi.org/10.1088/1757-899X/769/1/012070
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In this paper, a new reversible and blind fingerprint image watermarking technique based on the differential method and discrete cosine transform (DCT) domains is presented. The focus is to increase the security of the fingerprint image in authentication systems. Two CTtransformed sub-vectors are employed to embed the bits of the watermark sequence in a differential scheme. The original sub-vectors are acquired by the DCT transform on the host fingerprint image. In the extraction process, a minor variance between the sub-vectors that correspond to the watermarked fingerprint image directly allows access to the embedded watermark sequence; therefore, the extraction process doesn’t require an original fingerprint. The original fingerprint image is then recovered from the watermarked fingerprint image based on the reversible watermarking technique. The similarity between the reversible fingerprint image and the original is considered, and we could extract minutiae points from it without a problem. The proposed technique is evaluated using 80 fingerprint images from 10 persons for each from FVC2002 fingerprint database. Eight fingerprint images have been taken from each person to be used as the template then the process was followed by embedding the watermark into each fingerprint image. The experimental results validate the proposed method able to give promising results in preserving the fingerprint image security.