A review on performance, security and various biometric template protection schemes for biometric authentication systems

A Sarkar, BK Singh - Multimedia Tools and Applications, 2020 - Springer
Identifying a person based on their behavioral and biological qualities in an automated
manner is called biometrics. The authentication system substituting traditional password and …

An overview of steganography techniques applied to the protection of biometric data

M Douglas, K Bailey, M Leeney, K Curran - Multimedia Tools and …, 2018 - Springer
Identification of persons by way of biometric features is an emerging phenomenon. Over the
years, biometric recognition has received much attention due to its need for security …

Secure data hiding techniques: a survey

L Singh, AK Singh, PK Singh - Multimedia Tools and Applications, 2020 - Springer
This article presents a detailed discussion of different prospects of digital image
watermarking. This discussion of watermarking included: brief comparison of similar …

Robust and hybrid SVD-based image watermarking schemes: A survey

SBB Ahmadi, G Zhang, S Wei - Multimedia tools and applications, 2020 - Springer
These days, researchers have used many techniques in e-multimedia data for intellectual
property protection. One of these important techniques is watermarking which is superior to …

Secure sparse watermarking on DWT-SVD for digital images

A Bose, SP Maity - Journal of Information Security and Applications, 2022 - Elsevier
This paper suggests a sparse watermark image embedding scheme on the singular values
of the pre-selected wavelet sub-band coefficients of the digital images. Dictionary learning …

Audio watermarking using spikegram and a two-dictionary approach

Y Erfani, R Pichevar, J Rouat - IEEE transactions on …, 2016 - ieeexplore.ieee.org
This paper introduces a new audio watermarking technique based on a perceptual kernel
representation of audio signals (spikegram). Spikegram is a recent method to represent …

A framework for iris biometrics protection: a marriage between watermarking and visual cryptography

MAM Abdullah, SS Dlay, WL Woo, JA Chambers - IEEE Access, 2016 - ieeexplore.ieee.org
This paper presents a novel security architecture for protecting the integrity of iris images
and templates using watermarking and visual cryptography (VC). The proposed scheme …

Deep belief networks for iris recognition based on contour detection

M Baqar, A Ghani, A Aftab, S Arbab… - … Conference on Open …, 2016 - ieeexplore.ieee.org
Iris recognition has proved to be one of the most reliable and stable biometric for human
identification. This paper outlines an iris recognition approach based on deep learning. In …

[图书][B] Encyclopedia of image processing

PA Laplante - 2018 - books.google.com
The Encyclopedia of Image Processing presents a vast collection of well-written articles
covering image processing fundamentals (eg color theory, fuzzy sets, cryptography) and …

Security of E-healthcare data using DWT-SVD based Hybrid watermarking

KS Singh, P Singh, HV Singh - 2022 10th International …, 2022 - ieeexplore.ieee.org
Due to advancement in technology nowadays, it is easy to manipulate and produce illegal
multimedia data. As a consequent, different strategy of information security has been created …