A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system
暂无分享,去创建一个
Santoso Wibowo | Afaf Tareef | Eyad Ben Tarif | Saleh A. Wasimi | S. Wibowo | S. Wasimi | Afaf Tareef
[1] Reena Mary George. Facial Template Protection Using Extended Visual Cryptography And Chaotic Encryption , 2013 .
[2] Krunal P Rane,et al. SVD-Based Digital Image Watermarking , 2013 .
[3] Anushikha Singh,et al. Digital right management control for joint ownership of digital images using biometric features , 2014, 2014 International Conference on Signal Processing and Integrated Networks (SPIN).
[4] Ingemar J. Cox,et al. The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..
[5] Kazuya Nakano,et al. Encrypted sensing for enhancing security of biometric authentication , 2014, 2014 13th Workshop on Information Optics (WIO).
[6] Guillermo Sapiro,et al. Sparse Representation for Computer Vision and Pattern Recognition , 2010, Proceedings of the IEEE.
[7] B. Kiran Bala,et al. Multi Modal Biometrics using Cryptographic Algorithm , 2014 .
[8] Pritee Khanna,et al. Biometric template protection using cancelable biometrics and visual cryptography techniques , 2016, Multimedia Tools and Applications.
[9] Anil K. Jain,et al. Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[10] Anil K. Jain,et al. Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.
[11] Anil K. Jain,et al. FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.
[12] Syed Abdul Rahman Al-Haddad,et al. Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition , 2016, Multimedia Tools and Applications.
[13] Gaurav Bhatnagar,et al. Biometric Inspired Multimedia Encryption Based on Dual Parameter Fractional Fourier Transform , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[14] Robert Sabourin,et al. Securing high resolution grayscale facial captures using a blockwise coevolutionary GA , 2013, Expert Syst. Appl..
[15] P. Aruna,et al. Comparison of DCT, SVD and BFOA based multimodal biometric watermarking systems , 2015 .
[16] Richa Singh,et al. Robust biometric image watermarking for fingerprint and face template protection , 2006, IEICE Electron. Express.
[17] Richa Singh,et al. Feature based RDWT watermarking for multimodal biometric system , 2009, Image Vis. Comput..
[18] Anushikha Singh,et al. Digital ownership tags based on biometric features of iris and fingerprint for content protection and ownership of digital images and audio signals , 2015, Multimedia Tools and Applications.
[19] Cheng-Chi Lee,et al. A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2012, Nonlinear Dynamics.
[20] Nirmala Saini,et al. Biometrics based key management of double random phase encoding scheme using error control codes , 2013 .
[21] Marios Savvides,et al. Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching , 2009, 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[22] Ivan W. Selesnick. The slantlet transform , 1999, IEEE Trans. Signal Process..
[23] Anil K. Jain,et al. On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[24] Michael Elad,et al. Image Denoising Via Sparse and Redundant Representations Over Learned Dictionaries , 2006, IEEE Transactions on Image Processing.
[25] Paresh Marwaha,et al. Visual cryptographic steganography in images , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.
[26] Jaishri Chourasia. Identification and authentication using visual cryptography based fingerprint watermarking over natural image , 2013, CSI Transactions on ICT.
[27] Rajat Raina,et al. Efficient sparse coding algorithms , 2006, NIPS.
[28] Sung Bum Pan,et al. Hiding Biometric Data for Secure Transmission , 2005, KES.
[29] Gaurav Bhatnagar,et al. A novel chaos-based secure transmission of biometric data , 2015, Neurocomputing.
[30] Thirimachos Bourlai,et al. Securing multimodal biometric data through watermarking and steganography , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[31] Ke Huang,et al. Sparse Representation for Signal Classification , 2006, NIPS.
[32] Anne M. P. Canuto,et al. A Comparative Analysis of Cryptographic Algorithms and Transformation Functions for Biometric Data , 2013, 2013 12th International Conference on Machine Learning and Applications.
[33] Thomas Blumensath,et al. Accelerated iterative hard thresholding , 2012, Signal Process..
[34] Bin Ma,et al. Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking , 2013, Multimedia Tools and Applications.
[35] Manuel Graña,et al. Image Security and Biometrics: A Review , 2012, HAIS.
[36] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[37] Chin-Chen Chang,et al. SVD-based digital image watermarking scheme , 2005, Pattern Recognit. Lett..
[38] Chin-Chen Chang,et al. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.
[39] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[40] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[41] Mauro Barni,et al. Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing , 2015, IEEE Signal Processing Magazine.
[42] Balasubramanian Raman,et al. Blind reliable invisible watermarking method in wavelet domain for face image watermark , 2014, Multimedia Tools and Applications.
[43] Lanlan Li,et al. Protect biometric data with compound chaotic encryption , 2016, Secur. Commun. Networks.
[44] Xinpeng Zhang,et al. Effective reversible data hiding in encrypted image with privacy protection for image content , 2015, J. Vis. Commun. Image Represent..
[45] K. Harshika. Image Quality Assessment for Fake Biometric Detection : Application to Iris , Fingerprint , and Face Recognition , 2017 .
[46] Laurent Nana,et al. Feature Based Encryption Technique for Securing Forensic Biometric Image Data Using AES and Visual Cryptography , 2014, 2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation.
[47] Swanirbhar Majumder,et al. A Novel EMD based Watermarking of Fingerprint Biometric Using GEP , 2013 .