2016
DOI: 10.1515/bpasts-2016-0090
|View full text |Cite
|
Sign up to set email alerts
|

Verification of iris image authenticity using fragile watermarking

Abstract: Abstract. This paper proposes and evaluates a watermarking-based approach to certify the authenticity of iris images when they are captured by a genuine equipment. In the proposed method, the iris images are secretly signed before being used in biometric processes, and the resulting signature is embedded into the JPEG carrier image in the DCT domain in a data-dependent way. Any alteration of the original (certified) image makes the signature no longer corresponding to this image and this change can be quickly … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(15 citation statements)
references
References 20 publications
0
14
0
1
Order By: Relevance
“…The first subsection illustrates the experiments that have been conducted to evaluate the performance of the proposed segmentation algorithm (ISA) in comparison with the Hough transform based segmentation [21][22][23][24]. The second subsection presents a general comparison between the proposed MBW scheme and the schemes in [3,9,[11][12][13][14][15][16][17].…”
Section: Comparison With the State-of-the-art Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…The first subsection illustrates the experiments that have been conducted to evaluate the performance of the proposed segmentation algorithm (ISA) in comparison with the Hough transform based segmentation [21][22][23][24]. The second subsection presents a general comparison between the proposed MBW scheme and the schemes in [3,9,[11][12][13][14][15][16][17].…”
Section: Comparison With the State-of-the-art Methodsmentioning
confidence: 99%
“…Table 5 shows a general comparison between the proposed MBW scheme and the schemes in [3,9,[11][12][13][14][15][16][17]; where the schemes [11][12][13][14][15][16][17] have been applied to iris images in the study that have been presented in [8], therefore, the comparison here depends on the performance of these schemes in [8]. As shown in Table 5, the proposed scheme performs better than all the compared schemes in [3,9,[11][12][13][14][15][16][17] in terms of intactness of the iris region which is an essential property to avoid affecting the features of the iris region and consequently there will be no effect on the recognition performance. In terms of robustness, the proposed scheme performs better than the schemes in [9,[11][12][13][14][15][16][17].…”
Section: Performance Evaluation Of Mbwmentioning
confidence: 99%
See 3 more Smart Citations