{"title":"印刷隐写术应用于人脸验证中身份照片的认证","authors":"Włodzimierz Kasprzak, M. Stefanczyk, A. Wilkowski","doi":"10.1109/CYBConf.2015.7175987","DOIUrl":null,"url":null,"abstract":"Steganography methods are proposed for the authentication of the holder's photo in an ICAO-consistent (travel) document. The embedded message is heavily influenced by the print-scan process, as the electronic image is first printed to be included into the document (or identity card) and is scanned next to constitute the reference template in an automatic face verification procedure. Two sufficiently robust steganography methods are designed, modifications of the “Fujitsu method” and the “triangle net” method. A third method, a commercial Digimarc tool is also applied. The methods are tested w.r.t. to face image authentication ability in a face verification procedure, using two commercial biometric SDK-s. Test results demonstrate the feasibility in biometric verification and high authentication quality of proposed approach.","PeriodicalId":177233,"journal":{"name":"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)","volume":"2011 12","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Printed steganography applied for the authentication of identity photos in face verification\",\"authors\":\"Włodzimierz Kasprzak, M. Stefanczyk, A. Wilkowski\",\"doi\":\"10.1109/CYBConf.2015.7175987\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Steganography methods are proposed for the authentication of the holder's photo in an ICAO-consistent (travel) document. The embedded message is heavily influenced by the print-scan process, as the electronic image is first printed to be included into the document (or identity card) and is scanned next to constitute the reference template in an automatic face verification procedure. Two sufficiently robust steganography methods are designed, modifications of the “Fujitsu method” and the “triangle net” method. A third method, a commercial Digimarc tool is also applied. The methods are tested w.r.t. to face image authentication ability in a face verification procedure, using two commercial biometric SDK-s. Test results demonstrate the feasibility in biometric verification and high authentication quality of proposed approach.\",\"PeriodicalId\":177233,\"journal\":{\"name\":\"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)\",\"volume\":\"2011 12\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CYBConf.2015.7175987\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYBConf.2015.7175987","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Printed steganography applied for the authentication of identity photos in face verification
Steganography methods are proposed for the authentication of the holder's photo in an ICAO-consistent (travel) document. The embedded message is heavily influenced by the print-scan process, as the electronic image is first printed to be included into the document (or identity card) and is scanned next to constitute the reference template in an automatic face verification procedure. Two sufficiently robust steganography methods are designed, modifications of the “Fujitsu method” and the “triangle net” method. A third method, a commercial Digimarc tool is also applied. The methods are tested w.r.t. to face image authentication ability in a face verification procedure, using two commercial biometric SDK-s. Test results demonstrate the feasibility in biometric verification and high authentication quality of proposed approach.