The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the past, many efforts have been directed to develop biometrie template protection schemes to guard bio-metric reference data, i.e. templates. One fundamental premise in the design of such schemes is that the average entropy of the templates should be maximised in order to improve the level of protection. In parallel, several works have addressed the difficult problem of measuring the average entropy...
Morphed face images are artificially generated images, which blend the facial images of two or more different data subjects into one. The resulting morphed image resembles the constituent faces, both in visual and feature representation. If a morphed image is enroled as a probe in a biometric system, the data subjects contributing to the morphed image will be verified against the enroled probe. As...
An iris is unique physiological biometric trait compared to other biological traits to authenticate a person. In this paper we propose straight line fusion based iris recognition using Adaptive Histogram Equalization (AHE), Histogram Equalization (HE) and Discrete Wavelet Transform (DWT). The CASIA V.I iris database is considered and horizontal iris template is generated in the pre-processing. The...
Applications using face biometric are ubiquitous in various domains. We propose an efficient method using Discrete Wavelet Transform (DWT), Extended Directional Binary codes (EDBC), three matrix decompositions and Singular Value Decomposition (SVD) for face recognition. The combined effect of Schur, Hessenberg and QR matrix decompositions are utilized with existing algorithm. The discrimination power...
Iris Biometric is a unique physiological noninvasive trait of human beings that remains stable over a person's life. In this paper, we propose an Iris Recognition using Hybrid Domain Features (IRHDF) as Dual Tree Complex Wavelet Transform (DTCWT) and Over Lapping Local Binary Pattern (OLBP). An eye is preprocessed to extract the complex wavelet features to obtain the Region of Interest (ROI) area...
Face Recognition is important Biometric credentials for identification or verification of a person. In this paper, we propose a novel technique of generating compressed unique features of face images which helps in improving matching speed of recognition. The training face database samples are applied to 2D-DWT to obtain LL band features. The LL band features are subjected to normalization to scale...
The gaining popularity of the visible spectrum iris recognition has sparked the interest in adopting it for various access control applications. Along with the popularity of visible spectrum iris recognition comes the threat of identity spoofing, presentation, or direct attack. This paper presents a novel scheme for detecting video presentation attacks in visible spectrum iris recognition system by...
Offline signature verification system is widely used as a behavioral biometric for identifying a person. This behavioral biometric trait is a challenge in designing the system that has to counter intrapersonal and interpersonal variations. In this paper, we propose a novel technique PCVOS: Principal Component Variances based Off-line Signature Verification on two critical parameters viz., the Pixel...
Steganography is an authenticated technique for maintaining secrecy of embedded data. The novel concept of replacing mantissa part of cover image by the generated mantissa part of payload is proposed for higher capacity and security. The Lifting wavelet Transform (LWT) is applied on both cover image and payload of sizes a * a and 3a * 2a respectively. The mantissa values of Vertical band (CV), Horizontal...
The real time biometric systems are used to authenticate persons for various applications. In this paper, we propose an efficient VLSI architecture for fingerprint recognition using O2D-DWT architecture and modified CORDIC-FFT. The O2D-DWT architecture is designed using only adders and shifters for high speed operation and is applied on fingerprint image to generate four sub-bands. The optimized Fast...
The Palmprint is an efficient physiological biometric trait to identify a person. In this paper we propose Palmprint Identification using Log Transformation of Transform Domain Features. The Region of Interest (ROI) of palmprint image is extracted using preprocessing. The KWT and DWT are applied on preprocessed image to generate features. The KWT and DWT features of test image and database images...
In this paper we propose Non Embedding Steganography using Average Technique in Transform domain (NESATT). The Lifting Wavelet Transform (LWT) is applied on both cover image and payload image. The Diagonal band (CD) of cover image and Approximation band (PA) of payload are segmented into N × N blocks. The PA band of payload is divided by CD to generate resultant matrix based on Non Embedding Threshold...
This paper proposes a Link Reliability based Two-Hop Routing protocol for Wireless Sensor Networks (WSNs). The protocol achieves to reduce packet deadline miss ratio (DMR) while considering link reliability, two-hop delay and power efficiency and utilizes memory and computational effective methods for estimating the link metrics. Numerical results provide insights that the protocol has a lower packet...
The Multiplier plays an important role in implementing real time Biometric systems, hence high speed with error free multipliers has to be designed. In this paper we propose FPGA based Recursive Error Free Mitchell Log Multiplier for image Filters. The 2×2 Mitchell log multiplier is considered and error correction term is introduced to correct error, to obtain 2×2 Error Free Mitchell Log Multiplier...
Biometric technology is considered as more effective technology for identification and recognition of individuals in most secure environments. Face recognition is a technique based on physiological biometric characteristics. In this paper, we propose Face Recognition using DT-CWT and LBP Features (FRDL) for different databases. The original face image is resized to uniform dimensions of 2p × 2q. The...
The steganography is used to hide information and communicate in secure way to the destination. In this paper we propose Secure Steganography using Hybrid Domain Technique (SSHDT). The cover image of different formats and sizes are considered and resized to dimensions of power of 2. The Daubechies Lifting Wavelet Transforms (LWT) is applied on cover image to generate four sub bands XA, XH, XV and...
Hand written signature is complex behavioral biometric trait and is widely accepted for personal and document authentication. In this paper we propose Off-line Signature Identification Based on Discrete Wavelet Transform (DWT) and Spatial Domain Features (OSIDS) method. The method is tested using genuine and skilled forgery signatures. The signature is preprocessed using edge detection, filtering...
The face recognition is used to authenticate a person in several real time applications. In this paper, we propose Face Recognition based on DWT and DBC (FRDD) for PolyU Near Infra Red Face database. The face image is preprocessed to obtain only face part in an image. The DWT is applied on face part to derive four subbands. The LL subband is segmented into one hundred cells of each 5∗5 matrix. The...
The authentication of a person using bimodal biometric is robust and accurate compared to single biometric traits. In this paper we propose Dual Transformation Bimodal Biometrics Based on Feature Level Fusion (DBFLF). The Fingerprint and Face of each person is considered to identify a person. The fingerprint is preprocessed to obtain Region of Interest (ROI). The DTCWT is applied on ROI of fingerprint...
Steganography is used in covert communication for transportation of secrete information. In this paper we propose LWT based Encrypted Payload Steganography (LEPS). The payload is segmented into two parts say block 1 and block 2. The LWT is applied on block 2 to generate four sub bands. Payload block 1 is retained in the spatial domain itself. The values of approximation band coefficients of block...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.