CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Article:Offline Handwritten Signature based Blind Biometric Watermarking and Authentication Technique using Biorthogonal Wavelet Transform

by Vandana S.Inamdar, Priti. P. Rege, Meenakshi S Arya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Number 1
Year of Publication: 2010
Authors: Vandana S.Inamdar, Priti. P. Rege, Meenakshi S Arya
10.5120/1547-1970

Vandana S.Inamdar, Priti. P. Rege, Meenakshi S Arya . Article:Offline Handwritten Signature based Blind Biometric Watermarking and Authentication Technique using Biorthogonal Wavelet Transform. International Journal of Computer Applications. 11, 1 ( December 2010), 19-27. DOI=10.5120/1547-1970

@article{ 10.5120/1547-1970,
author = { Vandana S.Inamdar, Priti. P. Rege, Meenakshi S Arya },
title = { Article:Offline Handwritten Signature based Blind Biometric Watermarking and Authentication Technique using Biorthogonal Wavelet Transform },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 11 },
number = { 1 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 19-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume11/number1/1547-1970/ },
doi = { 10.5120/1547-1970 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:59:29.215868+05:30
%A Vandana S.Inamdar
%A Priti. P. Rege
%A Meenakshi S Arya
%T Article:Offline Handwritten Signature based Blind Biometric Watermarking and Authentication Technique using Biorthogonal Wavelet Transform
%J International Journal of Computer Applications
%@ 0975-8887
%V 11
%N 1
%P 19-27
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A method for establishing the identity of an individual is essential in all transactions whether they are commercial or personal. The ability to establish identity with certainty can prevent fraud or forgery. In the midst of an electronic revolution, this remains a major concern in ecommerce, telecommunications, healthcare, and security. In this paper, we present a novel method for biometric image watermarking using the biorthogonal wavelet transform and authentication of the recovered signature from the image data. In proposed approach the offline signature, which is a biometric characteristics of owner is embedded in second level detailed coefficients of discrete wavelet transform of cover image. The novelty of the proposed scheme is that, it also goes a step further wherein it extracts the features of recovered signatures and does the template matching with features of signature data base.

References
  1. A. K.Jain, L. Hong and S. Pankanti ,“Biometric Identification”, Comm. ACM, vol. 43, no. 2, pp. 91-98, Feb. 2000
  2. Hartung F, Kutter M ,“Multimedia watermarking Technique”, IEEE proceeding on Signal Processing,” vol 87, no.7, pp.1079-1107, July 1999
  3. Anil K. Jain, Stan Z. Li, “Encyclopedia of Biometrics,” Springer (2009)
  4. Cheng-Yaw Low, Andrew Beng-Jin Teoh, Connie Tea, “ Fusion of LSB and DWT Biometric watermarking for offline handwritten signature,” 2008 Congress on Image and signal processing , IEEE Computer Society, pp.702-708, 2008.
  5. Anil K Jain, Umut Uludag, ” Multimedia Content protection via Biometric based encryption,” IEEE international conference on Multimedia and Expo”, July 2003.
  6. Mayank Vasta, Richa Singh, Afzel noore ,“Improving Biometric recognition accuracy and robustness using DWT and SVM watermarking,” IEICE Electronics Express, vol 2 , no.12, pp.362-367, June 2005
  7. W. Zhu et al, ”Multi resolution Watermarking for Images and Video,” IEEE Transaction On Circuits & Systems for Video Technology, vol.9, no.4, June 1999, pp.545-550
  8. W. Zhu et al ,”Multi resolution Watermarking for Images and Video : A Unified Approach,” Proc. IEEE International Conference on Image Processing, ICIP-98, vol.1, pp.465-468.
  9. A. M. Namboodiri , A. K. Jain, “Multimedia Document Authentication using On-line Signature as Watermarks,” Proc. of the International Society for Optical Engineering (SPIE), 2004.
  10. Kundur D. and D. Hatzinakos ,“Digital watermarking using multi resolution wavelet decomposition,” Technical report, Dept. of Electrical and Computer Engineering, University of Toronto, 1998
  11. Yang S.H. ,“Wavelet filter evaluation for image watermarking,” Technical report, Dept. of Computer Science and Information Engineering, National Taipei University of Technology, China, 2002
  12. Marusic S., D.B. Tay, G. Deng, and M. Palaniswami ,“Even-length biorthogonal wavelets for digital watermarking”, Technical Report School of Electrical Engineering and Telecommunication, University of South Wales, Australia, 2004
  13. Pla O.G., E.T. Lin, and E.J. Delp ,“A wavelet watermarking algorithm based on a tree structure,” Technical report Polytechnic University of Catalonia, Spain, 2004
  14. Huang Z.Q., and Z. Jiang ,“Watermarking Still Images Using Parameterized Wavelet Systems,” Technical report School of Computing and IT, University of Western Sydney, Australia, 2003
  15. Fritz Keinert, “Biorthogonal wavelets for fast matrix computations,” Mathematics subject classification, 1991.
  16. Mark Nixon, Alberto Aguado, ”Feature Extraction and image Processing ,” Elsevier, 2005.
  17. Santi P. Maity, Malay K. Kundu, Mrinal Kr. Mandal ,“Capacity Improvement in Spread Spectrum Watermarking using Biorthogonal Wavelet,” 2005 IEEE proceedings, pp.1426-1429.
  18. Nikolaidis N., and I. Pitas, “Copyright protection of images using robust digital signatures,” in Proc. IEEE ICASSP’96, pp. 2168–2171.
  19. Shih-Hsuan Yang, “Wavelet filter evaluation for image watermarking,” ICASSP 2003.
  20. Anil K Jain, Umut Uludag, “ Hiding Biometric data,” IEEE transaction on pattern analysis and Machine intelligence, vol. 25, no.11, pp.1494-1498, November 2003
  21. Piotr Porwik, ”The compact three stages method of the signature recognition,” 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07).
  22. Hernandez J.R, F.P. Gonzalez, and M., Amado, “DCT-domain image watermarking and generalized Gaussian models,” Technical report University de Vigo, Spain,1998
  23. Nino D., M. Abdallah, and B. Hammo ,“Dual domain watermarking in the biological colour model,” ICIA International Conference , Sri Lanka, Colombo, 2006, pp. 407-411.
  24. Yuehua Z., C. Guixian and D. Yunhai, “An image watermark algorithm based on discrete cosine transform block classifying,” ACM International Conference , 2004 , pp. 234-235
  25. Wu X., J. Hu, Z. Gu, and J Huang, “A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters,” Technical Report School of Information Science and Technology, Sun Yat-Sen University, 2005, China.
  26. Zohu Wang, Alan Bovik, Hamid sheikh, Eero Simoncelli, “ Image Quality Assessment From Error visibility to Structural Similarity “, IEEE transaction on Image Processing, vol 13, no. 4, April 2004
  27. Cox J. Kilian, F. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for multimedia,” IEEE Transaction on Image Processing, vol. 6, pp. 1673–1687, Dec. 1997
  28. Suhad Hajjara, Moussa abdallah, Amjad Hudaib ,” Digital Image Watermarking Using Localized Biorthogonal wavelets,” European journal of scientific research, vol. 26, no.4 (2009),pp. 594-608
  29. Lindsay I Smith ,” A tutorial on Principal Component Analysis” Feb.26, 2002
  30. Tonphone Kaewkongka, Kosin C , Bundit T ,”Offline Signature Recognition using Parameterized Hough Transform,” 5th international symposium on Signal Processing and Applications, ISSPA 99,Brisbane, Australia, August 1999
Index Terms

Computer Science
Information Sciences

Keywords

Biometric watermarking Biorthogonal wavelets discrete wavelet transform template matching Hough transform Principal component analysis