Browse > Article
http://dx.doi.org/10.5391/JKIIS.2009.19.1.075

Biometric Features and Responsible Person Information Hiding by Watermarking Technique  

Lee, Wook-Jae (충북대학교 전기전자컴퓨터공학부 컴퓨터정보통신연구소)
Lee, Dae-Jong (충북대학교 전기전자컴퓨터공학부 컴퓨터정보통신연구소)
Park, Jin-Il (충북대학교 전기전자컴퓨터공학부 컴퓨터정보통신연구소)
Cho, Jae-Hoon (충북대학교 전기전자컴퓨터공학부 컴퓨터정보통신연구소)
Chun, Myung-Geun (충북대학교 전기전자컴퓨터공학부 컴퓨터정보통신연구소)
Publication Information
Journal of the Korean Institute of Intelligent Systems / v.19, no.1, 2009 , pp. 75-82 More about this Journal
Abstract
This paper propose a method to hide not only biometric features in the biometric image such as face and fingerprint for protecting them from unauthorized entity but also information of responsible person expressed as binary image which can be used to identify the responsibility of divulgence. For this, we investigate the recognition rates and bit error rates of extracted responsible person information watermark for the cases of using face and fingerprint images as cover images for fingerprint and face recognition which are the most popular biometric techniques. From these experiments, we confirm that the proposed method can be used for various application requiring to protect personal biometric information
Keywords
Biometric System; Watermarking; information hiding;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 전명근, 생체인식(Biometrics) 총론, 한국정보통신 교육원, 2004
2 M. Vatsa, R. Singh, A. Noore, 'Feature based RDWT watermarking for multimodal biometric system', Image Vis. Comput. Accepted paper 2007. (Available online at www.sciencedirect.com)
3 M. Faundez-Zanuy, M. Hagmuller, G, Kubin, 'Speaker identification security improvement by means of speech watermarking', Pattern Recognition, 40, pp. 3027-3034, 2007   DOI   ScienceOn
4 Zhixin Shi, Venu Govindaraju, 'A chaincode based scheme for fingerprint feature extraction', Pattern Recognition Letters, 27(5), pp. 462-468, 2006   DOI   ScienceOn
5 이욱재, 이대종, 문기영, 전명근, '웨이블렛을 이용한 생체정보의 강인한 워터마킹 알고리즘', 퍼지 및 지능시스템학회논문지, 17(5), pp. 632-639, 2007   과학기술학회마을   DOI
6 Keun-Chang Kwak, Witold Pedrycz 'Face recognition using a fuzzy fisherface classifier', Pattern recognition, 38, pp. 2005   DOI   ScienceOn
7 Anil K. Jain, Umut Uludag, 'I-riding Biometric Data', IEEE Trans. on Pattern Analysis and Machine Intelligence, 25(11), pp. 1494-1498, 2003   DOI   ScienceOn
8 한국정보보호진흥원, '생체 정보보호 가이드라인', 2006
9 C. Soutar, A. D. Roberge, A. Stoianov, R Gilroy and B. V. K. Vijaya Kumar, 'Biometric Encryption', ICSA Guide to Cryptography, McGraw-Hill, 1999, (Available at http://www.bioscrypt.com/assets/Biometric_Encryption.pdf)
10 전명근, '생체정보 이용과 프라이버시 보호,' 정보보호학회논문지, 15(6) 6, pp. 11-18, 2005
11 C. P. Wu and C. C. J. Kuo, Watermarking for Content Integrity Verification', IEEE International Symposium on Circuits and Systems(ISCAS), 2, pp. 436-439, 2002