Multibiometric Watermarking with Compressive Sensing Theory (Record no. 79632)

000 -LEADER
fixed length control field 04045nam a22006135i 4500
001 - CONTROL NUMBER
control field 978-3-319-73183-4
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801221412.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180103s2018 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319731834
-- 978-3-319-73183-4
082 04 - CLASSIFICATION NUMBER
Call Number 621.382
100 1# - AUTHOR NAME
Author Thanki, Rohit M.
245 10 - TITLE STATEMENT
Title Multibiometric Watermarking with Compressive Sensing Theory
Sub Title Techniques and Applications /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2018.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XXI, 172 p. 104 illus., 48 illus. in color.
490 1# - SERIES STATEMENT
Series statement Signals and Communication Technology,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Chapter 1. Introduction -- Chapter 2.Related Works and Background Information -- Chapter 3.Issues in Biometric System and Proposed Research Methodology -- Chapter 4.Multibiometric Watermarking Technique using Discrete Wavelet Trans-form (DWT) -- Chapter 5. Multibiometric Watermarking Technique using Discrete Cosine Trans-form (DCT) and Discrete Wavelet Transform (DWT) -- Chapter 6.Multibiometric Watermarking Technique using Discrete Wavelet Trans-form (DWT) and Singular Value Decomposition (SVD) -- Chapter 7.Multibiometric Watermarking Technique using Fast Discrete Curvelet Transform (FDCuT) and Discrete Cosine Transform (DCT) -- Chapter 8.Conclusions and Future Work.
520 ## - SUMMARY, ETC.
Summary, etc This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.
700 1# - AUTHOR 2
Author 2 Dwivedi, Vedvyas J.
700 1# - AUTHOR 2
Author 2 Borisagar, Komal R.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-319-73183-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
100 1# - AUTHOR NAME
-- (orcid)0000-0002-0645-6266
-- https://orcid.org/0000-0002-0645-6266
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2018.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Signal processing.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational linguistics.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Natural language processing (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Database management.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Signal, Speech and Image Processing .
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational Linguistics.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Natural Language Processing (NLP).
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Database Management.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1860-4870
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.