
operate in any one of several domains (spatial, Fourier,
DCT, wavelet, etc.). A system’s expected application
profile and threat model will dictate the choice of
watermarking algorithm, the nature of the watermark
to utilize, and a viable set of algorithmic parameters.
Carefully making these dec isions will result in a formi-
dable layer of postdecryption protection without
compromising on the performance aspects of the un-
derlying biometric system(s).
Related Entries
▶ Binding of Biometric and User Data
▶ Biometric Encryption
▶ Biometric System Design
References
1. Tirkel, A.Z., Rankin, G.A., van Schyndel, R.M., Ho, W.J., Mee,
N.R.A., Osborne, C.F.: Electronic Watermark pp. 666–673
(1993)
2. Artz, D.: Digital steganography: hiding data within data. Internet
Computing, IEEE 5(3), 75–80 (May/Jun 2001). DOI 10.1109/
4236.935180
3. Zheng, D., Liu, Y., Zhao, J., El-Saddik, A.: A Survey of RST
Invariant Image Watermarking Algorithms. ACM Comput.
Surv. 39(2), (2007)
4. Ahmad, S., Lu, Z.M.: A joint biometrics and watermarking based
framework for fingerprinting, copyright protection, proof of
ownership, and security applications. Computational Intelli-
gence and Security Workshops, 2007. CISW 2007. International
Conference on pp. 676–679 (15-19 Dec. 2007)
5. Ratha, N.K., Connell, J.H., Bolle, R.M.: Secure data hiding in
wavelet compressed fingerprint images. In: MULTIMEDIA ’00:
Proceedings of the 2000 ACM workshops on Multimedia,
pp. 127–130. ACM, New York, NY, USA (2000). DOI http://
doi.acm.org/10.1145/357744.357902
6. Noore, A., Singh, R., Vatsa, M., Houck, M.M.: Enhancing secu-
rity of fingerprints through contextual biometric watermarking.
Forensic Science International 169, 188–194
7. Low, C.Y., Teoh, A.B.J., Tee, C.: A preliminary study on biometric
watermarking for offline handwritten signature. Telecommuni-
cations and Malaysia International Conference on Communica-
tions, 2007. ICT-MICC 2007. IEEE International Conference on
pp. 691–696 (14-17 May 2007)
8. Maiorana, E., Campisi, P., Neri, A.: Biometric signature authen-
tication using radon transform-based watermarking techniques.
Biometrics Symposium, 2007 pp. 1–6 (11-13 Sept. 2007). DOI
10.1109/BCC.2007.4430543
9. Bartlow, N., Kalka, N., Cukic, B., Ross, A.: Protecting iris images
through asymmetric digital watermarking. Automatic Identifi-
cation Advanced Technologies, 2007 IEEE Workshop on
pp. 192–197 (7-8 June 2007). DOI 10.1109/AUTOID.2007.380618
10. Kutter, M., Jordan, F., Bossen, F.: Digital signature of color
images using amplitude modulation. In: Proc. SPIE EI, San
Jose, CA, pp. 518–526 (1997)
11. Jain, A.K., Uludag, U., Hsu, R.L.: Hiding a face in a fingerprint
image. In: ICPR ’02: Proceedings of the 16 th International
Conference on Pattern Recognition (ICPR’02) Volume 3,
p. 30756. IEEE Computer Society, Washington, DC, USA (2002)
12. Musgrave, C.: Biometric watermarks. Patent 6,208,746, U.S.
Patent and Trademark Office, Washington, D.C. (2001)
13. Morikawa, G., Tokura, G.: Picture taking apparatus and method
of controlling same. Patent 7,305,089, U.S. Patent and Trade-
mark Office, Washington, D.C. (2007)
14. Petitcolas, F.A., Anderson, R.J., Kuhn, M.G.: Attacks on copy-
right marking systems. In: Information Hiding, pp. 218–238
(1998). citeseer.ist.psu.edu/petitcolas98attacks.html
15. Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet,
S., Pun, T.: Second generation benchmarking and application
oriented evaluation In: IHW ’01: Proceedings of the 4th
International Workshop on Information Hiding, pp. 340–353
Springer, London, UK (2001)
Iris Encoding and Recognition using
Gabor Wavelets
JOHN DAUGMAN
Cambridge University, Cambridge, UK
Synonyms
Daugman algorithm; IrisCode; Iris2pi
Definition
The method of encoding iris patterns that is used in all
current public deployments of iris recognition technol-
ogy is based on a set of mathematical functions called
▶ Gabor wavelets that analyze and extract the unique
texture of an iris. They encode it in terms of its phase
structure at multiple scales of analysis. When this
phase information is coarsely quantized, it creates a
random bit stream that is suffic iently stable for a given
eye, yet random and diverse for different eyes, that iris
patterns can be recognized very rapidly and reliably
over large databases by a simple test of statistical inde-
pendence. The success of this biometric algorithm may
be attributed in part to certain important properties of
the Gabor wavelets as encoders, and to the simplicity
Iris Encoding and Recognition using Gabor Wavelets
I
787
I