Papers by khalil zebbiche
Comments on "efficient SVD speech watermarking with encrypted images
Multimedia Tools and Applications
Chaos based fingerprint image encryption in the wavelet domain
2023 International Conference on Advances in Electronics, Control and Communication Systems (ICAECCS)
Multibit decoding of multiplicative watermarking for fingerprint images
ABSTRACT In this paper, we propose an optimum decoder of multibit, multiplicative watermarks hidd... more ABSTRACT In this paper, we propose an optimum decoder of multibit, multiplicative watermarks hidden within discrete wavelet transform (DWT) coefficients of fingerprint images. The structure of the decoder is based on the maximum-likelihood (ML) method which requires a probability distribution function (PDF). Generalized Gaussian PDF is used to model the statistical behaviour of the DWT coefficients. The performance of the decoder is tested in realistic scenarios, where attacks are taken into account. The experiments reveal that the proposed decoder provides very attractive results and the decoding error is within an acceptable range of tolerance.
Interpolation-based reversible data hiding in the transform domain for fingerprint images
Multimedia Tools and Applications, 2022
A motivation for the use of watermarking techniques in biometric systems has been the need to pro... more A motivation for the use of watermarking techniques in biometric systems has been the need to provide increased security to the biometrics data themselves. We introduce an application of wavelet-based watermarking method to hide the fingerprint minutiae data in fingerprint images. The application provides a high security to both hidden data (i.e. fingerprint minutiae) that have to be transmitted and the host image (i.e. fingerprint). The original unmarked fingerprint image is not required to extract the minutiae data. The method is essentially introduced to increase the security of fingerprint minutiae transmission and can also used to protect the original fingerprint image.. 1.
Efficient Interpolation-based Reversible Watermarking for Protecting Fingerprint Images
2021 International Conference on Networking and Advanced Systems (ICNAS)
On the Security of Robust Image Watermarking Algorithm based on Discrete Wavelet Transform, Discrete Cosine Transform and Singular Value Decomposition
Among emergent applications of digital watermarking, owne r id ntification, proof of ownership an... more Among emergent applications of digital watermarking, owne r id ntification, proof of ownership and transaction tracki ng are applications that protect data by embedding the owner’s information (watermark) in it. Recently, a robust image wat ermarking scheme based on discrete wavelet transform, discrete cosin e tra sform and singular value decomposition was proposed b y Hu et al. [1]. However, this scheme has shown some drawbacks. In this pap er, we present two ambiguity attacks that clearly demonstra te the ineffectiveness of the above scheme some watermarking a pplic tions, such as proof of ownership, transaction track ing and data authentication.
Perceptual image hashing has been broadly used in the literature to authenticate images or to ide... more Perceptual image hashing has been broadly used in the literature to authenticate images or to identify similar contents for image copy detection. It can be used to improve the security of fingerprint-based identification systems, especially to guarantee the authenticity of fingerprint images. In this paper, a comparative study of the most used techniques in the field of perceptual hashing is provided, aiming at evaluating their performance when applied to fingerprint images. The study includes five techniques, namely: A-Hash, D-Hash, P-Hash, W-Hash and SVD-Hash. The performance has been assessed in terms of perceptual robustness, discrimination capability and authentication characteristics, through extensive experiments. The obtained results are promising and show that overall both the A-Hash and P-Hash performed well when compared to other evaluated techniques.
Real time watermarking to authenticate the WSQ bitstream
2012 3rd International Conference on Image Processing Theory, Tools and Applications (IPTA), 2012

Proceedings of the 11th International Conference on Signal Processing and Multimedia Applications, 2014
The Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neigh... more The Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighbourhood, have been successfully applied to texture analysis, face recognition, and image retrieval. In the paper, we present a new application of the LBP operators for securing digital fingerprint in AFIS System (Automated Fingerprint Identification System), while inserting a robust watermark (ID image and Face image) to increase not only security but also to facilitate the recognition of the person. To improve the security of the embedding, the watermarks are scrambled using Arnold technique and are then hidden in the fingerprint image of the corresponding person. Experimental results show that the proposed watermarking method is robust against commonly-used image processing operations, such as additive noise, luminance change, contrast enhancement, and JPEG compression while does not change the fingerprint features and maintains a good visibility of the original fingerprint images.
Maximum-Likelihood Based Watermark Detection on Fingerprint Images
The integrity and security of fingerprint images can be achieved by using watermarking techniques... more The integrity and security of fingerprint images can be achieved by using watermarking techniques. We introduce Maximum-Likelihood (ML) watermark detection method to detect an invisible watermark within discrete wavelet transform (DWT) coefficients of fingerprint images. Such an optimum technique, which is based on Bayes’ decision theory and the Neyman-Pearson criterion, requires parameters of a probability distribution function (PDF) which must model the statistical behavour of the DWT coefficients accurately. Both Generalized Gaussian (GG) and Laplacian models yield attractive results but with a slight superiority for the GG model.
Perceptual Masking Model Using Lifting Wavelet Transform for Fingerprint Images
Advances in Computing Systems and Applications
Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted images
Multimedia Tools and Applications

Multimedia Tools and Applications
In this paper, a robust additive image watermarking system operating in the Dual Tree Complex Wav... more In this paper, a robust additive image watermarking system operating in the Dual Tree Complex Wavelet Transform (DTCWT) domain is proposed. The system takes advantage of a new perceptual masking model that exploits the Human Visual System (HVS) characteristics at the embedding stage. It also uses an efficient watermark detection structure, called the Rao-test, to verify the presence of the candidate watermark. This structure relies on the statistical modeling of high frequency DTCWT coefficients by the Generalized Gaussian distribution. Experimental results show that the proposed system outperforms related state-of-the-art watermarking systems in terms of imperceptibility and robustness. Keywords DTCWT • Perceptual masking • Additive watermarking • Watermark detection 1 Introduction Recent advances in information technologies have enabled users to access, manipulate and distribute digital multimedia easily, allowing massive production and sharing of digital data. However, issues have arisen regarding the protection of intellectual property because the current technology also facilitates unauthorized copying and illegal distribution of
Efficient and secure cryptosystem for fingerprint images in wavelet domain
Multimedia Tools and Applications
Ambiguity attacks on robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition
Journal of Electrical Systems and Information Technology

International Journal of Digital Multimedia Broadcasting, 2008
In this paper, a novel scheme to watermark biometric images is proposed. It exploits the fact tha... more In this paper, a novel scheme to watermark biometric images is proposed. It exploits the fact that biometric images, normally, have oneregion of interest, which represents the relevant part of information processable by most of the biometric-based identification/authentication systems. This proposed scheme consists of embedding the watermark into the region of interest only; thus, preserving the hidden data from the segmentation process that removes the useless background and keeps the region of interest unaltered; a process which can be used by an attacker as a cropping attack. Also, it provides more robustness and better imperceptibility of the embedded watermark. The proposed scheme is introduced into the optimum watermark detection in order to improve its performance. It is applied to fingerprint images, one of the most widely used and studied biometric data. The watermarking is assessed in two well-known transform domains: the discrete wavelet transform (DWT) and the discrete F...

EURASIP Journal on Information Security, 2008
This paper describes an efficient watermarking technique for use to protect fingerprint images. T... more This paper describes an efficient watermarking technique for use to protect fingerprint images. The rationale is to embed the watermarks into the ridges area of the fingerprint images so that the technique is inherently robust, yields imperceptible watermarks, and resists well against cropping and/or segmentation attacks. The proposed technique improves the performance of optimum multibit watermark decoding, based on the maximum likelihood scheme and the statistical properties of the host data. The technique has been applied successfully on the well-known transform domains: discrete cosine transform (DCT) and discrete wavelet transform (DWT). The statistical properties of the coefficients from the two transforms are modeled by a generalized Gaussian model, widely adopted in the literature. The results obtained are very attractive and clearly show significant improvements when compared to the conventional technique, which operates on the whole image. Also, the results suggest that the segmentation (cropping) attack does not affect the performance of the proposed technique, which also provides more robustness against other common attacks.
Comments on “A robust color image watermarking with singular value decomposition method”
Advances in Engineering Software, 2016
Comments on “Homomorphic image watermarking with a singular value decomposition algorithm”
Information Processing & Management, 2016
Uploads
Papers by khalil zebbiche