Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.9.40

A Watermarking Technique for User Authentication Based on a Combination of Face Image and Device Identity in a Mobile Ecosystem  

Al-Jarba, Fatimah (Information Systems Department, Imam Mohammad Ibn Saud Islamic University)
Al-Khathami, Mohammed (Information Systems Department, Imam Mohammad Ibn Saud Islamic University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.9, 2021 , pp. 303-316 More about this Journal
Abstract
Digital content protection has recently become an important requirement in biometrics-based authentication systems due to the challenges involved in designing a feasible and effective user authentication method. Biometric approaches are more effective than traditional methods, and simultaneously, they cannot be considered entirely reliable. This study develops a reliable and trustworthy method for verifying that the owner of the biometric traits is the actual user and not an impostor. Watermarking-based approaches are developed using a combination of a color face image of the user and a mobile equipment identifier (MEID). Employing watermark techniques that cannot be easily removed or destroyed, a blind image watermarking scheme based on fast discrete curvelet transform (FDCuT) and discrete cosine transform (DCT) is proposed. FDCuT is applied to the color face image to obtain various frequency coefficients of the image curvelet decomposition, and for high frequency curvelet coefficients DCT is applied to obtain various frequency coefficients. Furthermore, mid-band frequency coefficients are modified using two uncorrelated noise sequences with the MEID watermark bits to obtain a watermarked image. An analysis is carried out to verify the performance of the proposed schema using conventional performance metrics. Compared with an existing approach, the proposed approach is better able to protect multimedia data from unauthorized access and will effectively prevent anyone other than the actual user from using the identity or images.
Keywords
Watermark; User authentication; Biometrics; Digital content; IMEI;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. W. Hatoum, J.-F. Couchot, R. Couturier, and R. Darazi, "Using Deep learning for image watermarking attack," Signal Process. Image Commun., p. 116019, 2020.   DOI
2 A. Rahman, "Optimum information embedding in digital watermarking," J. Intell. Fuzzy Syst., vol. 37, no. 1, pp. 553-564, 2019.   DOI
3 P. Vaidya and C. M. PVSSR, "A robust semi-blind watermarking for color images based on multiple decompositions," Multimed. Tools Appl., vol. 76, no. 24, pp. 25623-25656, 2017.   DOI
4 C. Kant and S. Chaudhary, "A Watermarking Based Approach for Protection of Templates in Multimodal Biometric System," Procedia Comput. Sci., vol. 167, pp. 932-941, 2020, doi: 10.1016/j.procs.2020.03.392.   DOI
5 E. Candes, L. Demanet, D. Donoho, and L. Ying, "Fast discrete curvelet transforms," Multiscale Model. Simul., vol. 5, no. 3, pp. 861-899, 2006.   DOI
6 "CVG - UGR - Image database." https://ccia.ugr.es/cvg/dbimagenes/c512.php (accessed Mar. 11, 2021).
7 D. Liu, Z. Yuan, and Q. Su, "A blind color image watermarking scheme with variable steps based on Schur decomposition," Multimed. Tools Appl., pp. 1-23, 2019.
8 A. M. Cheema, S. M. Adnan, and Z. Mehmood, "A Novel Optimized Semi-Blind Scheme for Color Image Watermarking," IEEE Access, vol. 8, pp. 169525-169547, 2020.   DOI
9 Q. Wei, H. Wang, and G. Zhang, "A Robust Image Watermarking Approach Using Cycle Variational Autoencoder," Secur. Commun. Netw., vol. 2020, 2020.
10 D. C. Wyld, J. Zizka, and D. Nagamalai, Eds., Advances in Computer Science, Engineering & Applications, vol. 166. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
11 H.-Y. Shum and M. Liao, Advances in Multimedia Information Processing-Pcm 2001: Second IEEE Pacific Rim Conference on Multimedia, Beijing, China, October 24-26, 2001, Proceedings, vol. 2. Springer Science & Business Media, 2001.
12 X. Kang, F. Zhao, G. Lin, and Y. Chen, "A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength," Multimed. Tools Appl., vol. 77, no. 11, pp. 13197-13224, 2018.   DOI
13 Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, 2006.   DOI
14 M. Begum and M. S. Uddin, "Analysis of Digital Image Watermarking Techniques through Hybrid Methods," Adv. Multimed., vol. 2020, 2020.
15 W.-H. Chang and L.-W. Chang, "Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments," in 2010 10th International Symposium on Communications and Information Technologies, 2010, pp. 749-754.
16 S. Parusheva, "A comparative study on the application of biometric technologies for authentication in online banking," vol. 39, no. 4, p. 12, 2015.
17 P. Temdee and R. Prasad, Context-aware communication and computing: Applications for smart environment. Springer, 2018.
18 R. Jiang, S. Al-Maadeed, A. Bouridane, D. Crookes, and A. Beghdadi, Biometric Security and Privacy. Springer, 2017.
19 H.-T. Hu and L.-Y. Hsu, "Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics," Multimed. Tools Appl., vol. 76, no. 5, pp. 6575-6594, 2017.   DOI
20 N. Nikolaidis and I. Pitas, "Robust image watermarking in the spatial domain," Signal Process., vol. 66, no. 3, pp. 385-403, 1998.   DOI
21 D. Singh and S. K. Singh, "DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection," Multimed. Tools Appl., vol. 76, no. 11, pp. 13001-13024, 2017.   DOI
22 C. De Vleeschouwer, J.-F. Delaigle, and B. Macq, "Invisibility and application functionalities in perceptual watermarking an overview," Proc. IEEE, vol. 90, no. 1, pp. 64-77, 2002.   DOI
23 J. H. Abawajy, S. Mukherjea, S. M. Thampi, and A. Ruiz-Martinez, Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings, vol. 536. Springer, 2015.
24 O. Hemida, Y. Huo, H. He, and F. Chen, "A restorable fragile watermarking scheme with superior localization for both natural and text images," Multimed. Tools Appl., vol. 78, no. 9, pp. 12373-12403, 2019.   DOI
25 H. Agarwal, B. Raman, and I. Venkat, "Blind reliable invisible watermarking method in wavelet domain for face image watermark," Multimed. Tools Appl., vol. 74, no. 17, pp. 6897-6935, 2015.   DOI
26 L. Rzouga Haddada and N. Essoukri Ben Amara, "Double watermarking-based biometric access control for radio frequency identification card," Int. J. RF Microw. Comput.-Aided Eng., vol. 29, no. 11, p. e21905, 2019.
27 A. Singh, M. Dave, and A. Mohan, "Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain," Wirel. Pers. Commun., vol. 83, no. 3, pp. 2133-2150, Aug. 2015, doi: 10.1007/s11277-015-2505-0.   DOI
28 X. Zhang, Q. Su, Z. Yuan, and D. Liu, "An efficient blind color image watermarking algorithm in spatial domain combining discrete Fourier transform," Optik, vol. 219, p. 165272, 2020.   DOI
29 "What is IMEI Number? - IMEI.info." https://www.imei.info/faq-what-is-IMEI/ (accessed Nov. 16, 2020).
30 "What is MEID? - IMEI.info." https://www.imei.info/faq-what-is-MEID/ (accessed Nov. 16, 2020).
31 J. Abraham and V. Paul, "An imperceptible spatial domain color image watermarking scheme," J. King Saud Univ.-Comput. Inf. Sci., vol. 31, no. 1, pp. 125-133, 2019.   DOI
32 I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital watermarking and steganography. Morgan kaufmann, 2007.
33 M. Abdullatif, A. M. Zeki, J. Chebil, and T. S. Gunawan, "Properties of digital image watermarking," in 2013 IEEE 9th International Colloquium on Signal Processing and its Applications, Kuala Lumpur, Mar. 2013, pp. 235-240, doi: 10.1109/CSPA.2013.6530048.   DOI
34 M. Begum and M. S. Uddin, "Analysis of Digital Image Watermarking Techniques through Hybrid Methods," Adv. Multimed., vol. 2020, 2020.
35 R. Thanki, S. Borra, V. Dwivedi, and K. Borisagar, "An efficient medical image watermarking scheme based on FDCuT-DCT," Eng. Sci. Technol. Int. J., vol. 20, no. 4, pp. 1366-1379, 2017.   DOI
36 "SIPI Image Database." http://sipi.usc.edu/database/ (accessed Mar. 11, 2021).
37 Q. Su et al., "New rapid and robust color image watermarking technique in spatial domain," IEEE Access, vol. 7, pp. 30398-30409, 2019.   DOI
38 X. Zhang, Q. Su, Z. Yuan, and D. Liu, "An efficient blind color image watermarking algorithm in spatial domain combining discrete Fourier transform," Optik, vol. 219, p. 165272, 2020.   DOI
39 M. R. M. Isa, S. Aljareh, and Z. Yusoff, "A watermarking technique to improve the security level in face recognition systems," Multimed. Tools Appl., vol. 76, no. 22, pp. 23805-23833, 2017.   DOI
40 S. Ramakrishnan, Cryptographic and Information Security Approaches for Images and Videos. CRC Press, 2018.
41 X. Zhao and A. T. Ho, "An introduction to robust transform based image watermarking techniques," in Intelligent multimedia analysis for security applications, Springer, 2010, pp. 337-364.
42 P. Singh, B. Raman, and P. P. Roy, "A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform," Multimed. Tools Appl., vol. 76, no. 3, pp. 3871-3897, 2017.   DOI
43 W. Huai-bin, Y. Hong-liang, W. Chun-dong, and W. Shao-ming, "A new watermarking algorithm based on DCT and DWT fusion," in 2010 International Conference on Electrical and Control Engineering, 2010, pp. 2614-2617.
44 L. Laur, M. Daneshmand, M. Agoyi, and G. Anbarjafari, "Robust grayscale watermarking technique based on face detection," in 2015 23nd Signal Processing and Communications Applications Conference (SIU), May 2015, pp. 471-475, doi: 10.1109/SIU.2015.7129861.   DOI