Verification watermarks on fingerprint recognition and retrieval

作者: Sharatchandra Pankanti , Minerva M. Yeung

DOI: 10.1117/12.344704

关键词: Digital watermarkingFeature extractionFingerprint (computing)Robustness (computer science)Image processingComputer scienceWatermarkCopy protectionFingerprint recognitionArtificial intelligenceComputer vision

摘要: Current 'invisible' watermarking techniques aim at producing watermarked data that suffer no or little quality degradation and perceptually identical to the original versions. The most common utility of a image is (1) for viewing display, (2) extracting embedded watermark in subsequent copy protection applications. issue often centered on robustness detection extraction. In addition studies, fundamental question will center utilization value images beyond perceptual evaluation. Essentially we have study how watermarks inserted affect processing images, what schemes can develop cater these tasks. This work focuses used automatic personal identification technology based fingerprints. We investigate effects fingerprint recognition retrieval accuracy using proposed invisible fragile technique verification applications specific system. shall also describe scheme, feature extraction used. believe provided value-added protection, as well copyright notification capability, collection processes usage.

参考文章(6)
Ioannis Pitas, Georgios Vougiatzis, Chaotic Mixing of Digital Images and Applications to Watermarking Proc. of European Conf. on Multimedia Applications,services and Techniques (ECMAST'96). ,(1996)
Minerva M Yeung, Frederick C Mintzer, Invisible watermarking for image verification Journal of Electronic Imaging. ,vol. 7, pp. 578- 591 ,(1998) , 10.1117/1.482612
N.K. Ratha, K. Karu, Shaoyun Chen, A.K. Jain, A real-time matching system for large fingerprint databases IEEE Transactions on Pattern Analysis and Machine Intelligence. ,vol. 18, pp. 799- 813 ,(1996) , 10.1109/34.531800
M.M. Yeung, F. Mintzer, An invisible watermarking technique for image verification international conference on image processing. ,vol. 2, pp. 680- 683 ,(1997) , 10.1109/ICIP.1997.638587
M. Holliman, N. Memon, Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes IEEE Transactions on Image Processing. ,vol. 9, pp. 432- 441 ,(2000) , 10.1109/83.826780
L. Hong, S. Pankanti, A. K. Jain, R. Bolle, An identity-authentication system using fingerprints : Automated biometrics Proceedings of the IEEE. ,vol. 85, pp. 1365- 1388 ,(1997)