A New Watermarking System Based on Discrete Cosine Transform (DCT) in Color Biometric Images

This paper recommend a biometric color images hiding approach An Watermarking System based on Discrete Cosine Transform (DCT), which is used to protect the security and integrity of transmitted biometric color images. Watermarking is a very important hiding information (audio, video, color image, gray image) technique. It is commonly used on digital objects together with the developing technology in the last few years. One of the common methods used for hiding information on image files is DCT method which used in the frequency domain. In this study, DCT methods in order to embed watermark data into face images, without corrupting their features.

[1]  Oscar C. Au,et al.  Data hiding for halftone images , 2000, Electronic Imaging.

[2]  Lamri Laouamer,et al.  New Images Watermarking Scheme Based on Singular Value Decomposition , 2013, J. Inf. Hiding Multim. Signal Process..

[3]  Ja-Ling Wu,et al.  Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[4]  Chun-Shien Lu,et al.  Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .

[5]  Xinyang Huang,et al.  A Image Digital Watermarking based on DWT in Invariant Wavelet Domain , 2007, Fourth International Conference on Image and Graphics (ICIG 2007).

[6]  Shi-Jinn Horng,et al.  A wavelet-tree-based watermarking method using distance vector of binary cluster , 2009, Expert Syst. Appl..

[7]  Jeng-Shyang Pan,et al.  Genetic watermarking based on transform-domain techniques , 2004, Pattern Recognit..

[8]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[9]  Gerhard C. Langelaar,et al.  Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .

[10]  Richa Singh,et al.  Feature based RDWT watermarking for multimodal biometric system , 2009, Image Vis. Comput..

[11]  Ioannis Pitas,et al.  Applications of toral automorphisms in image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[12]  Richard P. Wildes,et al.  Iris recognition: an emerging biometric technology , 1997, Proc. IEEE.

[13]  Russ Ryan The importance of biometric standards , 2009 .

[14]  Ioannis Pitas,et al.  Copyright protection of images using robust digital signatures , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[15]  Stephen M. Matyas,et al.  A Biometric Standard for Information Management and Security , 2000, Comput. Secur..

[16]  N. Ahmed,et al.  Discrete Cosine Transform , 1996 .

[17]  Bo Tao,et al.  Adaptive watermarking in the DCT domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[18]  Ahmet M. Eskicioglu,et al.  AN OPTIMAL WATERMARKING SCHEME BASED ON SINGULAR VALUE DECOMPOSITION , 2003 .

[19]  Mauro Barni,et al.  A DCT-domain system for robust image watermarking , 1998, Signal Process..

[20]  Dong-Sik Jang,et al.  Expert system for low frequency adaptive image watermarking: Using psychological experiments on human image perception , 2007, Expert Syst. Appl..

[21]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[22]  Korris Fu-Lai Chung,et al.  Robust digital image watermarking based on subsampling , 2006, Appl. Math. Comput..

[23]  Won-gyum Kim,et al.  Multimodal biometric image watermarking using two-stage integrity verification , 2009, Signal Process..

[24]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[25]  A. Ben Hamza,et al.  Image watermarking scheme using nonnegative matrix factorization and wavelet transform , 2009, Expert Syst. Appl..

[26]  Sharath Pankanti,et al.  An identity-authentication system using fingerprints , 1997, Proc. IEEE.

[27]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[28]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[29]  Yin Yong,et al.  Real-time Shadow Rendering in Scene System of Marine Simulator , 2007, Fourth International Conference on Image and Graphics (ICIG 2007).

[30]  Murat Hüsnü Sazli,et al.  Speech recognition with artificial neural networks , 2010, Digit. Signal Process..

[31]  Richard Walters Managing risk through the integration of physical and logical security , 2010 .