Robust Biometrics Based Authentication Scheme Using Watermarking

نویسنده

  • M. Raghavi
چکیده

Authentication is the demonstration of confirming reality of a quality of a datum or substance. For Robust Authentication using a Biometric verification which is considered a subset of biometric authentication. It can be particularly recognized through one or all the more recognizing natural qualities, for example, fingerprints. This paper proposed the concept of Embedding and Extracting the Encrypted Biometric signal into the user face image using Watermarking Technique. To provide a secure encryption using a Blowfish Algorithm and for Embedding process using a Least Significant Bit Technique. To shrink down a file size using a Huffman data compression for less memory consumption. To Use this application three main steps has to done. User need to register their profile information including biometric signal and their user image. Embedding encrypted biometric into user face image. Server need to match the user face image with every face on the database. If server identified the matched face, then it allow the user to use that application.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An improved hybrid image watermarking scheme in shearlet and wavelet domain

Watermarking is one of the best solutions for copyright protection and authentication of multimedia contents. In this paper a hybrid scheme is proposed using wavelet and shearlet transforms with singular value decomposition. For better security, Arnold map is used for encryption. Examining the results and comparing with other methods show that this hybrid proposed scheme with simultaneous utili...

متن کامل

Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

متن کامل

Multimodal Biometric Authentication using PSO based Watermarking

Multimodal Biometrics is the usage of multiple biometric indicators by personal identification systems for identifying individuals. It is applied to secure and authenticate the biometric data, enhance accuracy of recognition and reduce bandwidth. This paper presents a robust multimodal biometric image watermarking scheme using Particle Swarm Optimization (PSO). The key idea is to watermark an i...

متن کامل

A Robust Digital Image Watermarking Scheme Based on DWT

In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...

متن کامل

A Robust Digital Image Watermarking Scheme Based on DWT

In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...

متن کامل

Robust multiplicative video watermarking using statistical modeling

The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each block. The low frequency components of the wavelet coefficients are then used for data embedding to make the process robust against both malicious and unintentional attacks. Th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016