Biometrics Images Using Watermarking in an ICA

  • Authors

    • N. Umasankari
    • Dr. B.Muthukumar
    2018-10-02
    https://doi.org/10.14419/ijet.v7i4.10.26115
  • DCT, Fingerprint, ICA, Multimodal, Retina, Steganography, Watermark.
  • Abstract

    In this paper we use Digital watermarking for individuals all in all water stamping, customers of the substance are affirmed to perceive the watermark. It is the way of concealing the mystery information behind any two pictures. This paper contains procedure of DCT is the one of pressure method for concealing the pictures behind cover pictures and mystery picture and to expand the nature of the pictures of retina and fingerprint images determination utilizing MATLAB. The steganographic watermarking is the procedure, where content clients are uninformed of the nearness of watermark. The legitimacy procedure and controlled by a client and coordinated into a database give another measurement of security against extortion, distortion, and duplication. The Verification and security have been main problems perfect from the most punctual beginning stage of the PC age. As a result of moral programmers nowadays a vast gap in system security.

     

  • References

    1. [1] Jianqing Liang, Qinghua Hu, Pengfei Zhu,Wenwu Wang, “Efficient multi-modal geometric mean metric learningâ€, Article in Press Content available in Science Direct in Pattern Recognition, Published on 27 February 2017. Copyright © 2017,Elsevier.

      [2] Khan Muhammad, Muhammad Sajjad, Irfan Mehmood, Seungmin Rho, Sung Wook Baik, “Image steganography using uncorrelated color space and its application for security of visual contents in online social networksâ€, Article in Press, Contents available in Science Direct in Future Generation Computer Systems, Published on 24 November2016, Copyright © 2016,Elsevier.

      [3] Mahmoud. Y. Shams, Ahmad. S. Tolba, Shahenda. H. Sarhan, “Face, Iris, and Fingerprint Multimodal Identification System based on local binary pattern with variance histogram and combined learning vector quantizationâ€, Journal of Theoretical and Applied Information Technology, Published on 15th July 2016, Vol.89. No.1, ISSN: 1992-8645, E-ISSN: 1817-3195, © 2005 - 2016 JATIT & LLS.

      [4] Wioletta Wojtowicz, Marek R Ogiela, “Digital Images authentication scheme based on bimodal watermarking in an independent domainâ€, Journal of J.Vis. Commun. Image R.38 (2016) 1-10, Published

      [5] online 17 February 2016, Vol. No. 38, 2016, Page 1-10, Copy right © 2016, Elsevier.

      [6] Debanjan Sadhya, Dr. Sanjay Kumar, “Privacy Preservation for soft biometrics based multimodal recognition systemâ€, Journal of computers & security, 58 (2016) 160-179 Published online 21 January 2016, Copy right© 2016,Elsevier.

      [7] Dual C. Kar, Clifton J. Mulkey , “A Multi – threshold based audio steganography schemeâ€, Journal of INFORMATION SECURITY AND APPLICATIONS, 23 (2015) 54-67, Published online 16 April 2015 Copyright© 2015, Elsevier

      [8] Subhas Barnan, Debasis samiran Chattopadhyay,â€Fingerprint-based crypto-biometric system for network securityâ€, EURASIP Journal on INFORMATION SECURITY (2015)2015:3, Springer Open Journal, Published Online:03 April 2015. Springer Open Access.

      [9] Kyle O.Bailey, James S. Okolica, Gilbert L.Peterson, “User identification and authentication using multi-modal behavioral biometricsâ€, Journal of COMPUTERS & SECURITY 43 (2014) 77-89, Published online 7 March 2014 Elsevier.

      [10] Vijay Laxmi, Chhagan Lal, M.S. Gaur, Deepanshu Mehta, “JellyFish attack: Analysis, detection and countermeasure in TCP-based MANETâ€, Journal of INFORMATION SECURITY

      [11] AND APPLICATIONS, Published online 5 November 2014,22 (2015) 99-112, Copyright© 2014, Elsevier.

      [12] Divya Rai, Lalit V kulkarni, “Energy efficient cluster based approach in wireless Ad-hoc network: Surveyâ€, International Journal of Research in Computer and Communication Technology IJRCCT, Vol 3, Issue 1, January-2014.ISSN(Online)2278-5841,ISSN(Print) 2320-5156.

      [13] Prerana Kamble, Sangita Nikumbh, “Multimodal Biometric Security System with Steganographic Techniqueâ€, International Journal of Science and Research, Volume 3 Issue 11, November 2014, ISSN(Online): 2319-7064, Impact Factor(2012):3.358.

      [14] Tapalina BHATTASALI, Khalid SAEED, Nabendu CHAKI, Rituparna CHAKI, “Bio Authentication for Layered Remote Health Monitor Frameworkâ€, Journal of Medical Informatics & Technologies, Vol. 23/2014, ISSN 1642-6037.

      [15] Ajay Jangra, Shivi Goel,“Biometric based Security Solutions for MANETâ€, International Journal Computer Network and Information Security (2013) 10, 44-50 (http://www.mecs-press.org/), Published Online August 2013, Copyright © 2013 MECS.

      [16] N.Uma sankari ,†Network Security In Multimodal Biometricsâ€, PIONEER RESEARCH & DEVELOPMENT GROUP (ww.prdg.org), International Journal of Research in Engineering & Advanced Technology, Vol.1, Issue 1, March, 2013 ISSN:2320-8791.

  • Downloads

  • How to Cite

    Umasankari, N., & B.Muthukumar, D. (2018). Biometrics Images Using Watermarking in an ICA. International Journal of Engineering & Technology, 7(4.10), 780-784. https://doi.org/10.14419/ijet.v7i4.10.26115

    Received date: 2019-01-18

    Accepted date: 2019-01-18

    Published date: 2018-10-02