Iris Image Watermarking Technique for Security and Manipulation Reveal

0Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

Providing security while storing or sharing iris images has been considered an interesting research topic. Accordingly, various watermarking techniques have been used for iris image protection. Most of the available techniques have been presented to keep the secret data attached to their related images or hide a logo that can be used for copyright purposes. The previous security techniques can successfully meet their aims; however, they cannot reveal the manipulations in the iris region. This research aims to provide security and reveal manipulations in the iris region. Two algorithms have been implemented based on iris image watermarking technology in the proposed method. On the sender side, the proposed algorithm divides the image into the iris region (IR) and non-iris region (NIR), then generates the manipulation, reveals data from the IR, and thereafter embeds it in NIR. At the receiver side, the secret data is extracted from the NIR and compared with that generated from the IR to reveal manipulations if they exist. Experimental results obtained from evaluating the performance of the suggested technique demonstrated the efficiency in providing security and revealing manipulations in the IR. The proposed technique can be utilized in biometric-based security systems to check the input iris image before continuing to the individual’s recognition procedure. Different watermarking techniques can be applied in future research to obtain the one with the best performance.

Cite

CITATION STYLE

APA

Thabit, R., & Shukr, S. M. (2022). Iris Image Watermarking Technique for Security and Manipulation Reveal. International Journal on Informatics Visualization, 6(4), 743–748. https://doi.org/10.30630/joiv.6.4.1287

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free