Picture ID Authentication Using Invisible Watermark and Facial Recognition Features

Wensheng Zhou, Hua Xie

2005

Abstract

Picture ID authentication is very important for any identification verifications and extremely critical for homeland security. Here we propose a unique picture ID authentication apparatus which combines invisible watermark embedding and detection technology with facial recognition techniques. To demonstrate this apparatus, we implemented a system that is capable of fast and secure verification on the integrity and authenticity of ID documents with face images for Boeing. The proposed invisible watermarks tolerate most-common attacks such as recompression. We believe with only minor improvement this picture ID authentication system can be deployed in real environment at airports and country borders.

References

  1. B. B. Zhu, M D. Swanson, and A. H. Tewfik, “When seeing isn't believing,” IEEE Signal Proceeding Magazine, March, 2004.
  2. P. Sagetong and W. Zhou, “Dynamic Wavelet Feature-based Watermarking for Copyright Tracking in Digital Movie Distribution Systems,” the IEEE International Conference of Imaging Processing, Rochester, NY, September, 2002.
  3. W. Zhou, T. Rockwood and P. Sagetong, “Non-repudiation Oblivious Watermarking Schema for Secure Digital Video Distribution,” the IEEE International Workingshop for Signal Processing, Virgin Island, December, 2002.
  4. W. Diffle and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. on Information Theory, Vol. 22, No. 6, pp-644-654, Nov 1976.
  5. B. Zhu, M.D. Swanson, and A.H. Tewfik, “A transparent authentication and distortion measurement technique for images,” in Proc. 7th IEEE Digital Signal Processing Workshop, Loen, Norway, Sept. 1996, pp. 45-48.
  6. M. Schneider and S.-F. Chang, “A robust content based digital signature for image authentication,” in Proc. IEEE Int. Conf. Image Processing, 1996, vol. 3, pp. 227-230.
  7. D.-C. Lou and J.-L. Liu, “Fault resilient and compression tolerant digital signature for image authentication,” IEEE Trans. Consumer Electron., vol. 46, no. 1, pp. 31-39, 2000.
  8. M.P. Queluz, “Content-based integrity protection of digital images,” in Proc. SPIE Conf. Security Watermarking Multimedia Contents, Jan. 1999, vol. 3657, pp. 85-93.
  9. J. Dittmann, A. Steinmetz, and R. Steinmetz, “Content-based digital signature for motion pictures authentication and content-fragile watermarking,” IEEE Int. Conf. Multimedia Computing and Systems, 1999, vol. 2, pp. 209-213.
  10. C.-T. Li, D.-C. Lou, and T.-H. Chen, “Image authentication and integrity verification via content-based watermarks and a public key cryptosystem,” in Proc. IEEE Int. Conf. Image Processing, 2000, vol. 3, pp. 694-697.
  11. S. Bhattacharjee and M. Kutter, “Compression tolerant image authentication,” in Proc. IEEE Int. Conf. Image Processing, 1998, vol. 1, pp. 435-439.
  12. Chai Wah Wu. On the design of content-based multimedia authentication systems. IEEE Transaction on Multimedia, Vol. 4, No. 3, September, 2002.
  13. F. Bartolini, A. Tefas, M. Barni and I. Pitas. Image Authentication Techniques for Surveillance Applications. Proceedings of the IEEE, Vol. 89, No. 10, October, 2001.
  14. Turk, M., and Pentland, A. Face recognition using Eigenfaces. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR) (June 1991), pp. 586-591.
  15. D. Bolme, R. Beveridge, M. T., and Draper, B. The CSU face identifichation evaluation system: Its purpose, features and structure. In International Conference on Vision Systems (April 2003), pp. 304-311.
  16. G. Arce L. Xie. “A joint wavelet compression and authentication watermarking,” In IEEE International Conference on Image Processing, Chicago, IL, Oct 1998.
  17. G. R. Arce L. Xie, “A blind wavelet based digital signature for image authentication,” Proceedings of the EUSIPCO-98, Sept. 1998.
  18. G. R. Arce L. Xie. “A blind content based digital image signature,” Proceedings of the 2nd Annual Fedlab Symposium on ATIRP, Feb. 1998.
Download


Paper Citation


in Harvard Style

Zhou W. and Xie H. (2005). Picture ID Authentication Using Invisible Watermark and Facial Recognition Features . In Proceedings of the 5th International Workshop on Pattern Recognition in Information Systems - Volume 1: PRIS, (ICEIS 2005) ISBN 972-8865-28-7, pages 12-21. DOI: 10.5220/0002579100120021


in Bibtex Style

@conference{pris05,
author={Wensheng Zhou and Hua Xie},
title={Picture ID Authentication Using Invisible Watermark and Facial Recognition Features},
booktitle={Proceedings of the 5th International Workshop on Pattern Recognition in Information Systems - Volume 1: PRIS, (ICEIS 2005)},
year={2005},
pages={12-21},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002579100120021},
isbn={972-8865-28-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 5th International Workshop on Pattern Recognition in Information Systems - Volume 1: PRIS, (ICEIS 2005)
TI - Picture ID Authentication Using Invisible Watermark and Facial Recognition Features
SN - 972-8865-28-7
AU - Zhou W.
AU - Xie H.
PY - 2005
SP - 12
EP - 21
DO - 10.5220/0002579100120021