Efficient Watermarking based an Robust Biometric Features
暂无分享,去创建一个
[1] R.Mary Lourde,et al. Fingerprint Identification in Biometric SecuritySystems , 2010 .
[2] G. R. Sinha,et al. Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT) , 2012 .
[3] Manuel Graña,et al. Image Security and Biometrics: A Review , 2012, HAIS.
[4] NIKITA KASHYAP. Image Watermarking Using 2-level Dwt , 2012 .
[5] Richa Singh,et al. Robust biometric image watermarking for fingerprint and face template protection , 2006, IEICE Electron. Express.
[6] Engin Avci,et al. A New Watermarking System Based on Discrete Cosine Transform (DCT) in Color Biometric Images , 2012, Journal of Medical Systems.
[7] Lindsay I. Smith,et al. A tutorial on Principal Components Analysis , 2002 .
[8] Khattab M. Ali Alheeti. Biometric Iris Recognition Based on Hybrid Technique , 2011 .
[9] Anil K. Jain,et al. Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.
[10] G. H. Raisoni,et al. Implementation of Discrete Wavelet Transform Implementation of Discrete Wavelet Transform Implementation of Discrete Wavelet Transform Implementation of Discrete Wavelet Transform Processor For Image Compression Processor For Image Compression Processor For Image Compression Processor For Image Comp , 2012 .
[11] Arun Ross,et al. Protecting Iris Images through Asymmetric Digital Watermarking , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.
[12] Sabine Delaitre,et al. Biometrics at the Frontiers: Assessing the Impact on Society , 2005 .
[13] Richa Singh,et al. Digital watermarking based secure multimodal biometric system , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[14] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[15] Juan Jose Roque. SLSB: Improving the Steganographic Algorithm LSB , 2009, WOSIS.
[16] Zhaoxiang Zhang,et al. Sparse Reconstruction Based Watermarking for Secure Biometric Authentication , 2011, CCBR.
[17] Ajith Abraham,et al. Spiking neural network and wavelets for hiding iris data in digital images , 2009, Soft Comput..
[18] Adrian Pocovnicu. Biometric Security for Cell Phones , 2009 .