TY - JOUR
T1 - Using SVD and DWT based steganography to enhance the security of watermarked fingerprint images
AU - Douglas, Mandy
AU - Bailey, Karen
AU - Leeney, Mark
AU - Curran, Kevin
PY - 2017
Y1 - 2017
N2 - Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV's) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
AB - Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV's) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
KW - Biometrics
KW - Security
KW - Steganography
KW - Watermarking
UR - http://www.scopus.com/inward/record.url?scp=85031684782&partnerID=8YFLogxK
U2 - 10.12928/TELKOMNIKA.v15i3.6437
DO - 10.12928/TELKOMNIKA.v15i3.6437
M3 - Article
AN - SCOPUS:85031684782
SN - 1693-6930
VL - 15
SP - 1368
EP - 1379
JO - Telkomnika (Telecommunication Computing Electronics and Control)
JF - Telkomnika (Telecommunication Computing Electronics and Control)
IS - 3
ER -