Share Email Print
cover

Proceedings Paper

Signature-based authentication system using watermarking in the ridgelet and Radon-DCT domain
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

In this paper we propose a signature-based biometric system, where watermarking is applied to signature images in order to hide and keep secret some signature features in a static representation of the signature itself. Being a behavioral biometric, signatures are intrinsically different from other commonly used biometric data, possessing dynamic properties which can not be extracted from a single signature image. The marked images can be used for user authentication, letting their static characteristics being analyzed by automatic algorithms or security attendants. When a higher security is needed, the embedded features can be extracted and used, thus realizing a multi-level decision procedure. The proposed watermarking techniques are tailored to images with sharpened edges, just like a signature picture. In order to obtain a robust method, able to hide relevant data while keeping intact the original structure of the host, the mark is embedded as close as possible to the lines that constitute the signature, using the properties of the Radon transform. An extensive set of experimental results, obtained varying the system's parameters and concerning both the mark extraction and the verification performances, show the effectiveness of our approach.

Paper Details

Date Published: 8 October 2007
PDF: 12 pages
Proc. SPIE 6741, Optics and Photonics for Counterterrorism and Crime Fighting III, 67410I (8 October 2007); doi: 10.1117/12.738013
Show Author Affiliations
Emanuele Maiorana, Univ. degli Studi Roma Tre (Italy)
Patrizio Campisi, Univ. degli Studi Roma Tre (Italy)
Alessandro Neri, Univ. degli Studi Roma Tre (Italy)


Published in SPIE Proceedings Vol. 6741:
Optics and Photonics for Counterterrorism and Crime Fighting III
Colin Lewis, Editor(s)

© SPIE. Terms of Use
Back to Top