Normal view MARC view ISBD view

Multibiometric Watermarking with Compressive Sensing Theory [electronic resource] : Techniques and Applications / by Rohit M. Thanki, Vedvyas J. Dwivedi, Komal R. Borisagar.

By: Thanki, Rohit M [author.].
Contributor(s): Dwivedi, Vedvyas J [author.] | Borisagar, Komal R [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Signals and Communication Technology: Publisher: Cham : Springer International Publishing : Imprint: Springer, 2018Edition: 1st ed. 2018.Description: XXI, 172 p. 104 illus., 48 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319731834.Subject(s): Signal processing | Computational linguistics | Natural language processing (Computer science) | Database management | Signal, Speech and Image Processing | Computational Linguistics | Natural Language Processing (NLP) | Database ManagementAdditional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification: 621.382 Online resources: Click here to access online
Contents:
Chapter 1. Introduction -- Chapter 2.Related Works and Background Information -- Chapter 3.Issues in Biometric System and Proposed Research Methodology -- Chapter 4.Multibiometric Watermarking Technique using Discrete Wavelet Trans-form (DWT) -- Chapter 5. Multibiometric Watermarking Technique using Discrete Cosine Trans-form (DCT) and Discrete Wavelet Transform (DWT) -- Chapter 6.Multibiometric Watermarking Technique using Discrete Wavelet Trans-form (DWT) and Singular Value Decomposition (SVD) -- Chapter 7.Multibiometric Watermarking Technique using Fast Discrete Curvelet Transform (FDCuT) and Discrete Cosine Transform (DCT) -- Chapter 8.Conclusions and Future Work.
In: Springer Nature eBookSummary: This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.
    average rating: 0.0 (0 votes)
No physical items for this record

Chapter 1. Introduction -- Chapter 2.Related Works and Background Information -- Chapter 3.Issues in Biometric System and Proposed Research Methodology -- Chapter 4.Multibiometric Watermarking Technique using Discrete Wavelet Trans-form (DWT) -- Chapter 5. Multibiometric Watermarking Technique using Discrete Cosine Trans-form (DCT) and Discrete Wavelet Transform (DWT) -- Chapter 6.Multibiometric Watermarking Technique using Discrete Wavelet Trans-form (DWT) and Singular Value Decomposition (SVD) -- Chapter 7.Multibiometric Watermarking Technique using Fast Discrete Curvelet Transform (FDCuT) and Discrete Cosine Transform (DCT) -- Chapter 8.Conclusions and Future Work.

This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.

There are no comments for this item.

Log in to your account to post a comment.