Biometric Template Security Using Invisible Watermarking With Minimum Degradation in Quality of Template
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 12
Abstract
In this paper, we present an approach to enhance the Biometric Template Security by using Invisible Watermarking. For embedding the watermark in the Biometric Template, we used Parity Checker Method [2]. The use of Parity Checker Method ensures that the change in Biometric Template should be minimum. The watermark that is embedded in the Biometric Template may contain person’s name, person’s address or some unique features of the person. The same watermark is embedded four times in the Biometric Template to enhance its security so that if one watermark is changed by attacker,the other watermark remains intact. For each biometric template there will be a secret key that is used for embedding of watermark. The maintenance of secret key will be responsibility of database manager. The same key can be used for all biometric templates which reduces the responsibility of database manager up to a greater extent but at the cost of security. So, we used the separate key for each Biometric Template.
Authors and Affiliations
Rajkumar Yadav , Kamaldeep , Ravi Saini
Multimodal Authentication For High End Security
In earlier days Traditional authentication method in computer systems are based on knowledge and token based. Unfortunately lot of drawbacks are in these systems. Passwords often be forgotten, disclosed or changed. A rel...
Sectorization of Walsh and Walsh Wavelet in CBIR
this paper proposes the new Walsh Wavelet generation and its use in the Content based image retrieval. The Walsh Wavelet has been used to transform the images and sectored it into various sector sizes to generate the fea...
Introducing a New Language for Stream Applications
Stream programs represent an important class of high-performance computing. These programs are rich in parallelism and can be naturally targeted to distributed and multi-core architectures. Since computer architectures g...
Hybrid Particle Swarm Optimization for Regression Testing
Regression Testing ensures that any enhancement made to software will not affect specified functionality of software. The execution of all test cases can be long and complex to run; this makes it a costlier process. The...
Data Confidentiality and Loss Prevention using Virtual Private Database
As organizations increase their adoption of database systems as the key data management technology for day-to-day operations and decision making, the security of data managed by these systems becomes crucial. Database sy...