{"title":"A fragile watermarking technique for fingerprint protection","authors":"V. Subashini, S. Poornachandra, M. Ramakrishnan","doi":"10.1109/RAICS.2013.6745495","DOIUrl":null,"url":null,"abstract":"This paper presents a fragile watermarking algorithm for biometric fingerprint images based on the run length pattern of pixels. The algorithm works with binary form of fingerprint images. The carrier image is converted into a one dimensional vector and the run lengths of the pixels are computed. The run length vector is then split into overlapping vector patterns of length three where the mid part of the vector is considered for watermark embedding. The watermark may be text data or a binary image. The new scheme has a good data embedding capacity. The paper also discusses the means to extract the embedded watermark.","PeriodicalId":184155,"journal":{"name":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAICS.2013.6745495","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper presents a fragile watermarking algorithm for biometric fingerprint images based on the run length pattern of pixels. The algorithm works with binary form of fingerprint images. The carrier image is converted into a one dimensional vector and the run lengths of the pixels are computed. The run length vector is then split into overlapping vector patterns of length three where the mid part of the vector is considered for watermark embedding. The watermark may be text data or a binary image. The new scheme has a good data embedding capacity. The paper also discusses the means to extract the embedded watermark.