By Topic

Geometrically invariant watermarking for copyright protection and biometric authentication using feature detectors

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Mathivadhani, D. ; Dept. of Comput. Sci., Avinashilingam Univ. For Women, Coimbatore, India ; Meena, C.

Protection of biometric data is gaining interest and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Among the various biometrics, iris is very famous in the authentication area, as they are unique to each person and are mainly used for the establishment of instant personal identity. This paper proposes a feature-based robust digital image watermarking algorithm is proposed to achieve the goal of image authentication and protection simultaneously. The first step is to identify the feature key areas for embedding. The Hessian-Affine feature detector and Gillie's key detector are used for this purpose. In the next step, the copyright watermark is embedded into these regions and the authentication watermark is embedded in the remaining regions by using a block-wise fragile watermarking technique. The experiments were conducted with and without attacks and was proved that the algorithms are able to resist the attacks. A comparison between the two feature selection algorithms was also performed based on the number of feature points detected with and without attacks. Both the algorithms prove that they are efficient in terms of watermark embedding and extraction and can resist various image processing and geometric attacks.

Published in:

Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on  (Volume:4 )

Date of Conference:

26-28 Feb. 2010