Biometrics Images Using Watermarking in an ICA

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    In this paper we use Digital watermarking for individuals all in all water stamping, customers of the substance are affirmed to perceive the watermark. It is the way of concealing the mystery information behind any two pictures. This paper contains procedure of DCT is the one of pressure method for concealing the pictures behind cover pictures and mystery picture and to expand the nature of the pictures of retina and fingerprint images determination utilizing MATLAB. The steganographic watermarking is the procedure, where content clients are uninformed of the nearness of watermark. The legitimacy procedure and controlled by a client and coordinated into a database give another measurement of security against extortion, distortion, and duplication. The Verification and security have been main problems perfect from the most punctual beginning stage of the PC age. As a result of moral programmers nowadays a vast gap in system security.

     


  • Keywords


    DCT, Fingerprint, ICA, Multimodal, Retina, Steganography, Watermark.

  • References


      [1] Jianqing Liang, Qinghua Hu, Pengfei Zhu,Wenwu Wang, “Efficient multi-modal geometric mean metric learning”, Article in Press Content available in Science Direct in Pattern Recognition, Published on 27 February 2017. Copyright © 2017,Elsevier.

      [2] Khan Muhammad, Muhammad Sajjad, Irfan Mehmood, Seungmin Rho, Sung Wook Baik, “Image steganography using uncorrelated color space and its application for security of visual contents in online social networks”, Article in Press, Contents available in Science Direct in Future Generation Computer Systems, Published on 24 November2016, Copyright © 2016,Elsevier.

      [3] Mahmoud. Y. Shams, Ahmad. S. Tolba, Shahenda. H. Sarhan, “Face, Iris, and Fingerprint Multimodal Identification System based on local binary pattern with variance histogram and combined learning vector quantization”, Journal of Theoretical and Applied Information Technology, Published on 15th July 2016, Vol.89. No.1, ISSN: 1992-8645, E-ISSN: 1817-3195, © 2005 - 2016 JATIT & LLS.

      [4] Wioletta Wojtowicz, Marek R Ogiela, “Digital Images authentication scheme based on bimodal watermarking in an independent domain”, Journal of J.Vis. Commun. Image R.38 (2016) 1-10, Published

      [5] online 17 February 2016, Vol. No. 38, 2016, Page 1-10, Copy right © 2016, Elsevier.

      [6] Debanjan Sadhya, Dr. Sanjay Kumar, “Privacy Preservation for soft biometrics based multimodal recognition system”, Journal of computers & security, 58 (2016) 160-179 Published online 21 January 2016, Copy right© 2016,Elsevier.

      [7] Dual C. Kar, Clifton J. Mulkey , “A Multi – threshold based audio steganography scheme”, Journal of INFORMATION SECURITY AND APPLICATIONS, 23 (2015) 54-67, Published online 16 April 2015 Copyright© 2015, Elsevier

      [8] Subhas Barnan, Debasis samiran Chattopadhyay,”Fingerprint-based crypto-biometric system for network security”, EURASIP Journal on INFORMATION SECURITY (2015)2015:3, Springer Open Journal, Published Online:03 April 2015. Springer Open Access.

      [9] Kyle O.Bailey, James S. Okolica, Gilbert L.Peterson, “User identification and authentication using multi-modal behavioral biometrics”, Journal of COMPUTERS & SECURITY 43 (2014) 77-89, Published online 7 March 2014 Elsevier.

      [10] Vijay Laxmi, Chhagan Lal, M.S. Gaur, Deepanshu Mehta, “JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET”, Journal of INFORMATION SECURITY

      [11] AND APPLICATIONS, Published online 5 November 2014,22 (2015) 99-112, Copyright© 2014, Elsevier.

      [12] Divya Rai, Lalit V kulkarni, “Energy efficient cluster based approach in wireless Ad-hoc network: Survey”, International Journal of Research in Computer and Communication Technology IJRCCT, Vol 3, Issue 1, January-2014.ISSN(Online)2278-5841,ISSN(Print) 2320-5156.

      [13] Prerana Kamble, Sangita Nikumbh, “Multimodal Biometric Security System with Steganographic Technique”, International Journal of Science and Research, Volume 3 Issue 11, November 2014, ISSN(Online): 2319-7064, Impact Factor(2012):3.358.

      [14] Tapalina BHATTASALI, Khalid SAEED, Nabendu CHAKI, Rituparna CHAKI, “Bio Authentication for Layered Remote Health Monitor Framework”, Journal of Medical Informatics & Technologies, Vol. 23/2014, ISSN 1642-6037.

      [15] Ajay Jangra, Shivi Goel,“Biometric based Security Solutions for MANET”, International Journal Computer Network and Information Security (2013) 10, 44-50 (http://www.mecs-press.org/), Published Online August 2013, Copyright © 2013 MECS.

      [16] N.Uma sankari ,” Network Security In Multimodal Biometrics”, PIONEER RESEARCH & DEVELOPMENT GROUP (ww.prdg.org), International Journal of Research in Engineering & Advanced Technology, Vol.1, Issue 1, March, 2013 ISSN:2320-8791.


 

View

Download

Article ID: 26115
 
DOI: 10.14419/ijet.v7i4.10.26115




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.