Iris Image Authentication based on Adaptive Watermarking System

International Journal of Computer Trends and Technology (IJCTT)          
© 2016 by IJCTT Journal
Volume-34 Number-2
Year of Publication : 2016
Authors : Dr. Methaq Talib Gaata, Refah Aamer Jaafar
DOI :  10.14445/22312803/IJCTT-V34P111


Dr. Methaq Talib Gaata, Refah Aamer Jaafar "Iris Image Authentication based on Adaptive Watermarking System". International Journal of Computer Trends and Technology (IJCTT) V34(2):63-67, April 2016. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
In recent years, biometric data play a key role in the identification and verification systems. With this significant progress in the use of biometric data many of the attacks that threaten the security and authenticity and integrity of biometric data itself emerged. For that, biometric data protection has become an urgent need for the purpose of protecting against fraud and alteration. This paper introduces an authentication approach to establish the authenticity of iris images based on adaptive watermarking system. The key idea is based on extract features from the iris image early and then uses these features as a watermark in order to insert into the same iris image. The fuzzy edge detector has been used to determining appropriate embedding locations and to avoid the region used during the iris recognition system. After avoid the region of interest (ROI) which used for iris recognition the Genetic Algorithm (GA) is used to find the optimal locations for watermark embedding in intelligently manner. The GA is applied in embedding and extracting the watermark. Also, original iris image does not require in watermark extraction process. Experimental results show the performance of proposed system is good enough to achieve the iris image authentication with very high quality and the embedding of watermark is not affected on the ROI which used in iris recognition.

[1] Abdullah MAM, Dlay SS, Woo WL. ?Securing Iris Images with a Robust Watermarking Algorithm based on Discrete Cosine Transform In: 10th International Conference on Computer Vision Theory and Applications (VISAPP 2015). 2015, Berlin, Germany.
[2] S.Usha, M.Karthik, ?A Robust Digital Image Watermarking for Biometric Template Protection Applications International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 4, Issue 4, April 2015.
[3] Ajay Jangra and Shivi Goel, "Biometric based Security Solutions for MANET: A Review" International Journal Computer Network and Information Security, Vol.10, pp. 44-50, 2013.
[4] Rakhi C. Motwani, "A Voice-Based Biometric Watermarking Scheme For Digital Rights Management of 3D Mesh Models" Ph.D Thesis in in Computer Science and Engineering, University of Nevada, Reno, 2010.
[5] Methaq T. Gaata ?An Efficient Image Watermarking Approach based on Fourier Transform International Journal of Computer Applications, Vol. 136, No. 9, 2016.
[6] Punam Bedi, Roli Bansal, Priti Sehgal, ?Multimodal Biometric Authentication using PSO based Watermarking Published by Elsevier Ltd. Procedia Technology 4 (2012) pp. 612 – 618.
[7] Jinyu Lu, Tao Qu, and Hamid Reza Karimi, ?Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform Mathematical Problems in Engineering, Vol. 2014.
[8] Marcin Smereka, Ignacy Dule, "CIRCULAR OBJECT DETECTION USING A MODIFIED HOUGH TRANSFORM" International Journal of Appl. Math. Comput. Sci.,Vol. 18, No. 1, pp. 85–91, 2008.
[9] CASIA IrisV1 Database.
[10] Z. Wang, A. Bovik, H. Sheikh and E.Simoncelli, ?Image Quality Assessment: From Error Visibility to Structural Similarity, IEEE Transactions on Image Processing, vol. 13, no.4, pp. 600-612, April 2004.
[11] Sonam Chauhan, Sachin Chaudhary, " A Robust Invisible Digital Image Watermarking using DWT, DCT and SVD" International Journal of Computer Trends and Technology (IJCTT) – volume 23 Number 3–May 2015.
[12] Gaurav Gupta, Kanika Sharma, "A Hardware Efficient Robust Digital Image Watermarking Algorithm Using Integer DCT" International Journal of Engineering Trends and Technology (IJCTT) – Volume 25 Number 2- July 2015.

Adaptive Watermarking, Biometric, Iris, GA, Fuzzy.