Verification of iris image authenticity using fragile watermarking
暂无分享,去创建一个
Adam Czajka | Włodzimierz Kasprzak | Artur Wilkowski | Włodzimierz Kasprzak | A. Wilkowski | A. Czajka
[1] Marios Savvides,et al. Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching , 2009, 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[2] Alastair Allen,et al. Effects of Reversible Watermarking on Iris Recognition Performance , 2014 .
[3] Arun Ross,et al. Iris Digital Watermarking , 2009, Encyclopedia of Biometrics.
[4] P. Lipiński. Watermarking software in practical applications , 2011 .
[5] Dexin Zhang,et al. DCT-Based Iris Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Swanirbhar Majumder,et al. Singular value decomposition and wavelet-based iris biometric watermarking , 2013, IET Biom..
[7] John Daugman,et al. New Methods in Iris Recognition , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[8] Richard Guest,et al. Information technology -- 29107-7 Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 -- Part 7: Signature/sign time series data , 2011 .
[9] George W. Quinn,et al. Standard Iris Storage Formats , 2013, Handbook of Iris Recognition.
[10] Wlodzimierz Kasprzak,et al. Steganographic Authentication Method for Electronic IDs , 2013, ICIAR.
[11] Andreas Uhl,et al. Comparison of compression algorithms' impact on iris recognition accuracy II: revisiting JPEG , 2008, Electronic Imaging.
[12] Zhenan Sun,et al. Generation of iris sensor PRNU fingerprints from uncorrelated data , 2014, 2nd International Workshop on Biometrics and Forensics.
[13] Abdulmotaleb El-Saddik,et al. Combining DWT and LSB watermarking to secure revocable iris templates , 2010, 10th International Conference on Information Science, Signal Processing and their Applications (ISSPA 2010).
[14] Jing Dong,et al. Effects of watermarking on iris recognition performance , 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision.
[15] Dexin Zhang,et al. Correction to "DCT-Based Iris Recognition" , 2007, IEEE Trans. Pattern Anal. Mach. Intell..
[16] W. Nowakowski,et al. The average time complexity of probabilistic algorithms for finding generators in finite cyclic groups , 2015 .
[17] Andreas Uhl,et al. Experimental study on the impact of robust watermarking on iris recognition accuracy , 2010, SAC '10.
[18] John Daugman,et al. Effect of Severe Image Compression on Iris Recognition Performance , 2008, IEEE Transactions on Information Forensics and Security.
[19] Jonathan Blackledge,et al. Cryptography Using Steganography: New Algorithms and Applications , 2011 .
[20] Edward J. Delp,et al. A Review of Fragile Image Watermarks , 2007 .
[21] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[22] Andreas Uhl,et al. Evaluating the Impact of Iris Image Compression on Segmentation and Recognition Accuracy , 2012 .
[23] Kefeng Fan,et al. A Novel Digital Content Protection Scheme Combining Iris Identity Based Digital Signature and Semi-fragile Watermark , 2006, 2006 International Conference on Communication Technology.
[24] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[25] Li Xia,et al. Enhancing iris-feature security with steganography , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.
[26] George W. Quinn,et al. IREX I: Performance of Iris Recognition Algorithms on Standard Images | NIST , 2009 .
[27] Petra Mutzel,et al. A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.