CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Iris Recognition based Image Authentication

by K. Seetharaman, R. Ragupathy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 44 - Number 7
Year of Publication: 2012
Authors: K. Seetharaman, R. Ragupathy
10.5120/6272-8434

K. Seetharaman, R. Ragupathy . Iris Recognition based Image Authentication. International Journal of Computer Applications. 44, 7 ( April 2012), 1-8. DOI=10.5120/6272-8434

@article{ 10.5120/6272-8434,
author = { K. Seetharaman, R. Ragupathy },
title = { Iris Recognition based Image Authentication },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 44 },
number = { 7 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume44/number7/6272-8434/ },
doi = { 10.5120/6272-8434 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:34:54.063923+05:30
%A K. Seetharaman
%A R. Ragupathy
%T Iris Recognition based Image Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 44
%N 7
%P 1-8
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper introduces an efficient approach to protect the ownership by hiding iris code from iris recognition system into digital image for an authentication purpose using the reversible watermarking scheme. This scheme embeds bookkeeping data of histogram modification and iris code into the first level high frequency sub-bands of images found by Integer Wavelet Transform (IWT) using threshold embedding technique. The watermarked-image carrying iris code is obtained after applying inverse IWT. Simply by reversing the embedding process, the original image and iris code are extracted back from watermarked-image. Authentication is done using the metric called Hamming Distance. Experimental results show that this approach outperforms the prior arts in terms of PSNR. Also, we tested with different attacks on watermarked-image for showing the sustainability of the system.

References
  1. C. Y. Low, A. B. Teoh and C. Tee, "Fusion of LSB and DWT Biometric Watermarking Using Offline Handwritten Signature for Copyright Protection", Proceedings of the Third International Conference on Advances in Biometrics, Lecture Notes In Computer Science, vol. 5558, pp. 786 – 795, 2009.
  2. H. G. Schaathun, "On watermarking/ fingerprinting for copyright protection", Proceedings of the First International Conference on Innovative Computing, Information and Control, IEEE Computer Society, vol. 3, pp. 50-53, 2006.
  3. S. Jain, "Digital watermarking techniques: a case study in fingerprints & faces", Proceedings ICVGIP 2000, pp. 139-144, 2000.
  4. E. Maiorana, P. Campisi, A. Neri, "Biometric Signature Authentication Using Radon Transform-Based Watermarking Techniques", IEEE Biometrics Symposium, pp. 1-6, 2007.
  5. P. Tzouveli, K. Ntalianis, S. Kollias, "Human face watermarking based on Zernike moments", Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, pp. 399-404, 2005.
  6. A. K. Jain, K. Nandakumar and A. Nagar, "Biometric Template Security", EURASIP Journal on Advances in Signal Processing, Article ID 579416, 2008.
  7. Y. Lee, H. J. Kang and Y. H. Ki, "Copyright Authentication Enhancement of Digital Watermarking Based on Intelligent Human Visual System Scheme", Knowledge-Based Intelligent Information and Engineering Systems, Intelligent Watermarking Algorithms and Applications, vol. 3682, pp. 567-572, 2005.
  8. G. Coatrieux, M. Lamard, W. Daccache, W. Puentes, C. Roux, "A Low Distortion and Reversible Watermark: Application to Angiographic Images of the Retina", 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEE-EMBS, pp. 2224-2227, 2005.
  9. J. Daugman and C. Downing , "Epigenetic randomness, complexity, and singularity of human iris patterns", Proceedings of the Royal Society, Biological Sciences, pp. 1737 – 1740, 2001.
  10. Ajay Kumar, Arun Passi, "Comparison and combination of iris matchers for reliable personal authentication", Pattern Recognition, vol. 43, pp. 1016–1026, 2010.
  11. S. Sanderson, J. Erbetta, "Authentication for secure environments based on iris scanning technology", IEE Colloquium on Visual Biometrics, 2000.
  12. Nick Bartlow, Nathan Kalka, Bojan Cukic, and Arun Ross, "Protecting Iris Images through Asymmetric Digital Watermarking", Proceedings of the Fifth IEEE workshop on Automatic Identification advanced Technologies, Italy, pp. 191-197, June 2007.
  13. I. Daubechies and W. Sweldens, "Factoring wavelet transforms intolifting steps",Journal of Fourier Anal. Appl. , vol. 4, no. 3, pp. 245–267, 1998.
  14. B. Yang, M. Schmucker, W. Funk, C. Busch, and S. Sun, "IntegerDCT-based reversible watermarking for images using companding technique", Proc. SPIE, Security, Steganography, and Watermarkingof Multimedia Contents, San Jose, CA, pp. 405–415, Jan. 2004.
  15. G. Xuan, Y. Q. Shi, Q. Yao, Z. Ni, C. Yang, J. Gao, and P. Chai,"Lossless data hiding using histogram shifting method based on integerwavelets", LNCS, Int. Workshop Digital Watermarking,Korea, Nov. 2006.
  16. D. Coltuc and A. Tremeau, "Simple reversiblewatermarking schemes", Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, pp. 561–568, Jan. 2005.
  17. J. Tian, "Reversible data embedding using a difference expansion", IEEE Transactions on Circuits and Systems for Video Technology, pp. 890-896, August 2003.
  18. J. Daugman, "How iris recognition works", IEEE transactions on circuits and systems for video technology, vol. 14, pp. 21-30, January 2004.
  19. Mohammed A. M. Abdullah, F. H. A. Al-Dulaimi, Waleed Al-Nuaimy, Ali Al-Ataby, "Smart card with iris recognition for high security access environment", IEEE, pp. 382-385, 2010.
  20. D. Field, "Relations between the statistics of natural images and the response properties of cortical cells", Journal of the Optical Society of America, 1987.
  21. P. Duhamel, and M. Vetterli, "Fast Fourier Transforms: A Tutorial Review and a State of the Art", Signal Processing, vol. 19, pp. 259-299, April 1990.
  22. J. Daugman, "New Methods in Iris Recognition", IEEE transactions on systems, man, and cybernetics—part b: cybernetics, vol. 37, pp. 1167-1175, October 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Iris Code Reversible Watermarking Hamming Distance Integer Wavelet Transforms Iris Recognition