J4 ›› 2010, Vol. 28 ›› Issue (03): 303-.

Previous Articles     Next Articles

Exchange Protocol and Implementation of Using Biometric Watermark

LIU Jinga|CHENG |Chaob |LI Da-weic   

  1. bCollege of Computer Science and Technology;
     cCenter for Computer Fundamental Education|Jilin University|Changchun |130012| China
  • Online:2010-05-30 Published:2010-06-12

Abstract:

To deal with watermark key secure transfer and uniqueness, the feasibility of combining biometric identification technology and digital watermark are studied,the existing watermarking protocol and model,the biometric identification technology in the protocol is introduced, and a secure digital watermarking protocol is proposed. Scheme of biometrics watermark based on fingerprint identification has been implemented to solve key problems for data volume of biometrics  which is too large to embed and extract watermarking in general case. The experiment showed that the scheme is effective and feasible.

Key words: information security, biometrics watermark, protocol, fingerprint identification

CLC Number: 

  • TP393