SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 06-11
www.iosrjournals.org
www.iosrjournals.org 6 | Page
Enhancing Security of Multimodal Biometric Authentication
System by Implementing Watermarking Utilizing DWT and DCT
Dr. N. Chaudhary1
, Dr. D. Singh2
, D.Hussain3
1
(Professor, Computer Science and Engineering, College of Technology and Engineering, India)
2
(Assistant Professor, Computer Science and Engineering, College of Technology and Engineering, India)
3
(Computer Science and Engineering, College of Technology and Engineering, India)
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
I. INTRODUCTION
In this era of Information technology and electronic revolution, automatic access of individuals to
services is becoming vital. Authenticating the identity of an individual is a prerequisite for completion of all
commercial or personal transactions. Forgery and fraud can be prevented only if one establishes its identity with
certainty which is unattainable in case of traditional authentication methods that are either token based such as
ID Card ( that are likely to be lost, forged or stolen), or knowledge based such as passwords (which can be
forgotten). This has led in the emergence and formulation of a new technological area known as biometric
recognition, or simply stated as biometrics [1]. Biometrics is the science of asserting the identity of an individual
through physical assessment for example fingerprints, iris, hand geometry, face recognition etc. or behavioral
characteristic that include voice, gait recognition, keystroke scanning, signature-scan. The association of
biometric traits with the user is permanent and also these traits are unique for an individual and cannot be easily
modified and forged. Thus biometrics is believed to be a more reliable technology. Biometric authentication
systems have inherent advantages over traditional personal identification techniques [2]. However, the security
of biometrics data is preeminent and must be shielded from external invasion and tampering as they are not
endowed with security themselves [1]. It is therefore necessary to provide security to the biometric templates of
individuals at all times.
One way of addressing this issue is Encryption [3, 4]. Encryption does not contribute to the much
needed mutually integrated security and is ineffective once the data is decrypted after it is being transmitted over
the network. Cryptography uses methods of encryption to construct secure information. As cryptography and
encryption are not fully capable of providing security throughout the entire life of the work [4], digital
watermarking has emerged to fulfill this requirement. In biometric watermarking, a piece of information termed
as watermark, is embedded into the host image using a secret key, in such a way that the contents of the host
image are not modified to the extent that are perceptible to the Human Visual System (HVS).Further biometric
authentication systems based upon only one of the biometric modalities may not fulfill the requirements of
demanding applications in terms of universality, uniqueness, performance, acceptability, permanence,
collectability and circumvention. These factors paved a way for the development of multimodal biometric
authentication system. Multimodal biometric systems use more than one biometric trait in order to identify an
individual. These systems provide superior recognition rate in contrast to unimodal systems [5]. The biometric
modalities, such as fingerprint, face and iris are one of the most conventional and effective modalities [6].
Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking
www.iosrjournals.org 7 | Page
To enhance the security and performance of multimodal biometrics authentication system this paper targets
on watermarking face image with fingerprint image by using a robust watermarking scheme. Then comparing
the watermarked image and extracted image with the original images in order to prove that the watermarking
and extraction procedure does not affect the recognition capacity of the overall system.
This paper is formulated in the following manner: the background details related to the technique are
stated in Section II. The proposed robust watermarking algorithm for biometric images is described in Section
III. In Section IV the results are outlined to assess the significance of the proposed technique on the overall
performance of the system. And, conclusions of the scheme are drawn in Section V.
II. BACKGROUND
1. Watermarking
Watermarking [7,8,9] is the technique of embedding data into elements such as an image, video or
audio file for authentication purpose. The data which is embedded can later be detected and extracted from, the
elements for security reasons. A watermarking algorithm comprises of a watermark structure, an embedding
algorithm, and a detection or extraction algorithm. In most of the applications where security is necessary,
embedded watermark is required to be robust, invisible and should have a high capacity. Essentially watermarks
are used for the purpose of copyright protection i.e. identifying from where the content originated, tracing illegal
distribution of copies and undermining unauthorized access to content. The requirements for watermarks in
varied scenarios differ. Embedding a single watermark into the content at the source of distribution is sufficient
for identification of the origin of content [11]. To trace illegal copies, based on the identity or location of the
recipient in the network a unique watermark is required. Non-blind schemes are suitable for both these
application as watermark extraction or detection is required only when there is a dispute in context of the
ownership of content. Access control, is performed through semi-blind or blind schemes where the watermark
should be checked in all authorized consumer devices.
Recently, many watermarking schemes have been developed using the two most popular transforms
that are Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT). The generic model of
watermark embedding and extraction is shown in Fig. 1.
Fig.1: Model for Watermark embedding and extraction
In embedding module the host image is watermarked with the message image using a secret key and
embedding function. The watermarked image is stored in the database or transmitted over the network where
there is a possibility that it may be attacked. In the extraction module the watermarked image which might have
been attacked is fed to the extraction function along with the secret key and the watermark or message image is
extracted from it.
Discrete Wavelet Transform
The primary concept of DWT is that a one dimensional signal is divided into two parts one is high
frequency band and another is low frequency band. Then the low frequency band is further split into two parts
and the same process continues until the desired level is reached. For M*N 2-D images, applying DWT
corresponds to processing the image by 2-D filters in each dimension and results in the generation of four
M/2*N/2 coefficients. The filters divide the input image into four non-overlapping multi-resolution coefficient
sets, (LL1) a lower resolution approximation image as well as (HL1) horizontal high frequency band, (LH1)
vertical high frequency band and (HH1) diagonal high frequency band. The information of low frequency band
is an image close to the original image. In DWT decomposition, input signal must be a multiple of 2n
. Where, n
is equivalent to the number of levels. DWT provides sufficient information to analyze and synthesize the actual
signal and also requires less computation time. Fig. 2 shows the two-level DWT decomposition of an image.
Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking
www.iosrjournals.org 8 | Page
Fig.2: Two level DWT decomposition
Discrete Cosine Transform
In digital signal processing one of the most prevalent linear transformation functions is DCT. It
converts spatial or time domain signal to frequency domain and the image is transformed into a form of an even
function. In comparison to spatial domain techniques DCT techniques are more robust. Algorithms based on
DCT are robust against common image processing operations like adjustment, blurring, brightness, low pass
filtering, and contrast and so on. One-dimensional signals like speech waveforms can be processed with one
dimensional DCT. For analysis of 2D signals like images, we require 2-D DCT. The two-dimensional DCT of
any given matrix gives the frequency coefficients in form of another matrix. The lowest frequency coefficients
are represented at the Left topmost corner of the matrix while the highest frequency coefficients are represented
at the right bottom most corner of the matrix.
Formula for 2-D DCT:
F(m,n) =
Formula for 2-D inverse DCT:
F(i,j) =
Where,
Singular Value Decomposition
Singular Value Decomposition is an effective tool for image transformation and it is based on a
theorem from linear algebra which states that a rectangular matrix A can be divided into the product of three
matrices; U - an orthogonal matrix, S- a diagonal matrix, and V - the transpose of an orthogonal matrix. The
theorem is represented as:
A m*n= Um*m Sm*n VT
n*n
Where;
UT
U = I; VT
V = I;
The columns of U are orthonormal eigenvectors of AAT
,
The columns of V are orthonormal eigenvectors of AT
A, and
S is a diagonal matrix that contains the square roots of eigenvalues from U or V in descending order.
III. THE PROPOSED SCHEME
In the proposed scheme one biometric data is watermarked with another biometric data using SVD
based hybrid watermarking scheme. In the proposed scheme face image is used as the cover image or host
image which is watermarked using the fingerprint image. This hybrid watermarking technique is depicted
schematically as well as algorithmically.
1. Watermark Embedding Algorithm
Initially weinput the Cover image I and DWT is applied on the Cover image I which decomposes
image into four sub-bands LL, HL, LH and HH further DCT is applied to all the high frequency bands and SVD
is applied to all the high frequency bands to get the matrices SH1_I, SH2_I and SH3_I. Watermark image W is
given as input. DWT is applied on the Watermark image W which decomposes into four sub-bands LL1, HL1,
LH1 and HH1.DCT is applied to all high frequency bands further SVD is applied to all the higher frequency
bands and get the respective matrices.Utilizing the singular values of Watermark image the singular values of
Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking
www.iosrjournals.org 9 | Page
the cover image are modified.Modified SVD matrix is constructed. Inverse DCT is applied to all high frequency
bands then inverse DWT is applied to get the final watermarked image.
Fig. 3 shows the watermarking procedure schematically
Fig.3: Watermark embedding procedure
2. Watermark Extraction Algorithm
Input Watermarked image W_I.DWT is applied on the Watermarked image W_I; it decomposes image
into four sub-bands LL_W, HL_W, LH_W and HH_W. All high frequency bands are selected and DCT is
applied to all those bands. Then SVD is applied to all the high frequency bands to get the matrices SH1_WI,
SH2_WI and SH3_WI.SH1_WI, SH2_WI and SH3_WI are modified. Modified SVD matrix is
constructed.Inverse DCT is applied to all high frequency bands.Inverse DWT is applied to get the final extracted
watermark image.
Fig. 4 shows the watermark extraction procedure schematically
Fig. 4: Watermark extraction procedure
IV. IMPLEMENTATION AND RESULTS
Broadly, a watermarking algorithm can be assessed based on two parameters: imperceptibility and
robustness. The similarity or correlation between the original watermark and the Extracted watermark is
quantitatively measured by utilizing Normalized Cross-Correlation (NCC) [12].
The formula for Normalized Cross-Correlation (NCC) is
Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking
www.iosrjournals.org 10 | Page
NCC =
The value of Normalized Cross-Correlation lies between [-1, 1]. And greater NCC value means the
watermark is more robust [13,14]. Peak Signal to Noise Ratio (PSNR) is used in quantitatively analyzing the
concealing capacity of the algorithm. Peak Signal to Noise Ratio (PSNR) is defined as:
PSNR =
The unit is decibels (dB). The larger the value of PSNR is, the better the imperceptibility of
watermark.Performance of the algorithm is tested by simulating the experiment on MATLAB 2012a. 256x256
pixels of gray-level host image and watermark image are chosen for the purpose of simulation of the algorithm.
The original cover image, watermarked image and the extracted watermark images are shown in Fig.5.
Fig. 5: [A] Original cover and Watermark image [B] Watermarked image and Extracted watermark
The watermarked image resembles the original image in vision impression to a large extent. To the Human
Visual System there is no clearly visible difference between the two images. Thus, this algorithm hides
watermark very well. The PSNR of the original cover image and watermarked image is 46.041 dB, which is
considered a quite good value. Along with that, the NCC of the original watermark image and extracted
watermark is 0.9727, which shows that the two images are strongly correlated.
In order to test the robustness of the algorithm, it is tested under different types of attacks. The images on
which attacks have been applied are shown in Fig.7. The Extracted Watermark images along with their NCC
values are shown in Fig.6
Fig. 6: [A] watermarked images that are attacked [B] Extracted watermark with normalized cross
correlation
The simulation results show that the watermark image can be extracted well even after the watermarked
image is attacked. Simulation results indicate that this watermarking algorithm is robust against many common
attacks like adding salt noise, filter, image compression, sharp enhancing, image cutting and rotation.
V. CONCLUSION
This paper proposed a discrete wavelet transform (DWT) and discrete cosine transform (DCT) based
watermarking algorithm for biometric data. By using Singular Value Decomposition, watermarking signals are
embedded in the high frequency bands of wavelet transformation domain. And before the embedding procedure
is followed the watermark image is also transformed using both DWT and DCT. The simulation results prove
that this watermarking algorithm not only keeps the image quality well, but is also robust against many image
processing operations. This algorithm is very efficient in embedding signals and also anti-attack.
Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking
www.iosrjournals.org 11 | Page
REFERENCES
[1] A. K. Jain, U. Uludag, Hiding Biometric Data,IEEE Trans. Pattern Analysis and Machine Intelligence, 25(11), Nov. 2003, 1494 –
1498.
[2] A. K. Jain, A. Ross, and S. Prabhakar, An introduction to biometric recognition,IEEE Transactions on Circuits and Systems for Video
Technology,14(1),200,4-20.
[3] U. Uludag, S. Pankanti, S. Prabhakar, and A.K. Jain, Biometric cryptosystems: issues and challenges, Proceedings of IEEE, 92(
6),2004, 948-960.
[4] Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data,
Eurocrypt2004, 523-540.
[5] A.Nagar, K.Nandakumar, A. K.Jain, Multibiometric Cryptosystems Based on Feature-Level Fusion, IEEETrans. Inf. Forensics
Security, 7( 1), Feb. 2012, 255 – 268
[6] Z. huiming, Z.Huile, A technology of hiding fingerprint minutiae in image,Research & progress of solid state electronics, 26(2),2006,
197-200.
[7] C. I. Podilchuk and E. J. Delp, Digital Watermarking: Algorithms and Applications, IEEE Signal Processing Magazine, July 2001,
33-46.
[8] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking (Morgan Kaufmann Publishers, 2002).
[9] E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp, Advances in Digital Video Content Protection, Proceedings of the IEEE,
Special Issue on Advances in Video Coding and Delivery, 2004.
[10] G.C. Langelaar, I. Setyawan, R.I. Lagendijik, Watermarking digital image and video data, IEEE Signal Processing Magazine 17 (5)
2000, 20–46.
[11] N.F. Johnson, Z. Duric and S. Jajodia, Information Hiding, Steganography and Watermarking-Attacks and Counter Measures,
Kluwer academic publisher, 2003, 15-29.
[12] M. Nageshkumar , P.K. Mahesh , M. N. ShanmukhaSwamy, An Efficient Secure Multimodal Biometric Fusion Using Palmprint and
Face Image,IJCSI International Journal of Computer Science Issues, 2, Aug. 2009,49-53.
[13] J Jiang, A. Armstrong, Data hiding approach for efficient image indexing, Electronics letters. 7th, 38(23),2002, 1424- 1425.
[14] I.J .Cox, J.G. Linnartz, Some general methods for tampering with watermarks, IEEE Journal on Selected Areas in
Communications,16(4),1998, 587-593.

More Related Content

What's hot

Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
 
An Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesAn Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesIJCSIS Research Publications
 
Efficient and secure authentication on remote server using stegno video objec...
Efficient and secure authentication on remote server using stegno video objec...Efficient and secure authentication on remote server using stegno video objec...
Efficient and secure authentication on remote server using stegno video objec...pradip patel
 
Techno info solutions titles list
Techno info solutions titles listTechno info solutions titles list
Techno info solutions titles listjanani technoinfo
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...Alexander Decker
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET Journal
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Journals
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Publishing House
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
 

What's hot (18)

Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
term 2
term 2term 2
term 2
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
 
An Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesAn Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security Techniques
 
Efficient and secure authentication on remote server using stegno video objec...
Efficient and secure authentication on remote server using stegno video objec...Efficient and secure authentication on remote server using stegno video objec...
Efficient and secure authentication on remote server using stegno video objec...
 
Techno info solutions titles list
Techno info solutions titles listTechno info solutions titles list
Techno info solutions titles list
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
 
BIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATIONBIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATION
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
 
Av26303311
Av26303311Av26303311
Av26303311
 

Viewers also liked

Prevalence of Iron Deficiency Anaemia among Pregnant Women in Calabar, Cross ...
Prevalence of Iron Deficiency Anaemia among Pregnant Women in Calabar, Cross ...Prevalence of Iron Deficiency Anaemia among Pregnant Women in Calabar, Cross ...
Prevalence of Iron Deficiency Anaemia among Pregnant Women in Calabar, Cross ...IOSR Journals
 
Vibration Analysis of Cracked Rotor Using Numerical Approach
Vibration Analysis of Cracked Rotor Using Numerical ApproachVibration Analysis of Cracked Rotor Using Numerical Approach
Vibration Analysis of Cracked Rotor Using Numerical ApproachIOSR Journals
 
Radiation dose to the eyes of readers at the least distance of distinct visio...
Radiation dose to the eyes of readers at the least distance of distinct visio...Radiation dose to the eyes of readers at the least distance of distinct visio...
Radiation dose to the eyes of readers at the least distance of distinct visio...IOSR Journals
 
The Historical Lack of Capital Accumulation in Iran's Agricultural Part
The Historical Lack of Capital Accumulation in Iran's Agricultural PartThe Historical Lack of Capital Accumulation in Iran's Agricultural Part
The Historical Lack of Capital Accumulation in Iran's Agricultural PartIOSR Journals
 
Quark Model Three Body Calculations for the Hypertriton Bound State
Quark Model Three Body Calculations for the Hypertriton Bound StateQuark Model Three Body Calculations for the Hypertriton Bound State
Quark Model Three Body Calculations for the Hypertriton Bound StateIOSR Journals
 
Discovery of Self-Sustained 235U Fission Causing Sunlight by Padmanabha Rao E...
Discovery of Self-Sustained 235U Fission Causing Sunlight by Padmanabha Rao E...Discovery of Self-Sustained 235U Fission Causing Sunlight by Padmanabha Rao E...
Discovery of Self-Sustained 235U Fission Causing Sunlight by Padmanabha Rao E...IOSR Journals
 
Uranium Concentrations measurement for Ground Water and Soil Samples in Al-Na...
Uranium Concentrations measurement for Ground Water and Soil Samples in Al-Na...Uranium Concentrations measurement for Ground Water and Soil Samples in Al-Na...
Uranium Concentrations measurement for Ground Water and Soil Samples in Al-Na...IOSR Journals
 
The Comparison of theMaterials in Styles of Iranian Architecture and its Effe...
The Comparison of theMaterials in Styles of Iranian Architecture and its Effe...The Comparison of theMaterials in Styles of Iranian Architecture and its Effe...
The Comparison of theMaterials in Styles of Iranian Architecture and its Effe...IOSR Journals
 
Improving Sales in SME Using Internet Marketing
Improving Sales in SME Using Internet MarketingImproving Sales in SME Using Internet Marketing
Improving Sales in SME Using Internet MarketingIOSR Journals
 
An Efficient Approach for Requirement Traceability Integrated With Software R...
An Efficient Approach for Requirement Traceability Integrated With Software R...An Efficient Approach for Requirement Traceability Integrated With Software R...
An Efficient Approach for Requirement Traceability Integrated With Software R...IOSR Journals
 
Effect of Antioxidant status on liver following Atrazine exposure and its pro...
Effect of Antioxidant status on liver following Atrazine exposure and its pro...Effect of Antioxidant status on liver following Atrazine exposure and its pro...
Effect of Antioxidant status on liver following Atrazine exposure and its pro...IOSR Journals
 
“Comparitive Study of Prevalence of Hyperlactatemia in HIV / AIDS Patients re...
“Comparitive Study of Prevalence of Hyperlactatemia in HIV / AIDS Patients re...“Comparitive Study of Prevalence of Hyperlactatemia in HIV / AIDS Patients re...
“Comparitive Study of Prevalence of Hyperlactatemia in HIV / AIDS Patients re...IOSR Journals
 
Electrophoretic Patterns of Esterases in Eri silkworm Samia Cynthia ricini
Electrophoretic Patterns of Esterases in Eri silkworm Samia Cynthia riciniElectrophoretic Patterns of Esterases in Eri silkworm Samia Cynthia ricini
Electrophoretic Patterns of Esterases in Eri silkworm Samia Cynthia riciniIOSR Journals
 
Analytical Determination of Antihestamine drugs Pure and its pharmaceutical P...
Analytical Determination of Antihestamine drugs Pure and its pharmaceutical P...Analytical Determination of Antihestamine drugs Pure and its pharmaceutical P...
Analytical Determination of Antihestamine drugs Pure and its pharmaceutical P...IOSR Journals
 
The influence of Rolling process on the porosity and wear behavior of Spray-f...
The influence of Rolling process on the porosity and wear behavior of Spray-f...The influence of Rolling process on the porosity and wear behavior of Spray-f...
The influence of Rolling process on the porosity and wear behavior of Spray-f...IOSR Journals
 
Effective Leadership-Employee Retention-Work Life Balance: A Cyclical Continuum
Effective Leadership-Employee Retention-Work Life Balance: A Cyclical ContinuumEffective Leadership-Employee Retention-Work Life Balance: A Cyclical Continuum
Effective Leadership-Employee Retention-Work Life Balance: A Cyclical ContinuumIOSR Journals
 
QSAR studies of some anilinoquinolines for their antitumor activity as EGFR i...
QSAR studies of some anilinoquinolines for their antitumor activity as EGFR i...QSAR studies of some anilinoquinolines for their antitumor activity as EGFR i...
QSAR studies of some anilinoquinolines for their antitumor activity as EGFR i...IOSR Journals
 
Analysis Of Lpg Cylinder Using Composite Materials
Analysis Of Lpg Cylinder Using Composite MaterialsAnalysis Of Lpg Cylinder Using Composite Materials
Analysis Of Lpg Cylinder Using Composite MaterialsIOSR Journals
 
Synthesis, Structure Investigation and Dyeing Assessment of Novel Bisazo Disp...
Synthesis, Structure Investigation and Dyeing Assessment of Novel Bisazo Disp...Synthesis, Structure Investigation and Dyeing Assessment of Novel Bisazo Disp...
Synthesis, Structure Investigation and Dyeing Assessment of Novel Bisazo Disp...IOSR Journals
 

Viewers also liked (20)

Prevalence of Iron Deficiency Anaemia among Pregnant Women in Calabar, Cross ...
Prevalence of Iron Deficiency Anaemia among Pregnant Women in Calabar, Cross ...Prevalence of Iron Deficiency Anaemia among Pregnant Women in Calabar, Cross ...
Prevalence of Iron Deficiency Anaemia among Pregnant Women in Calabar, Cross ...
 
Vibration Analysis of Cracked Rotor Using Numerical Approach
Vibration Analysis of Cracked Rotor Using Numerical ApproachVibration Analysis of Cracked Rotor Using Numerical Approach
Vibration Analysis of Cracked Rotor Using Numerical Approach
 
Radiation dose to the eyes of readers at the least distance of distinct visio...
Radiation dose to the eyes of readers at the least distance of distinct visio...Radiation dose to the eyes of readers at the least distance of distinct visio...
Radiation dose to the eyes of readers at the least distance of distinct visio...
 
The Historical Lack of Capital Accumulation in Iran's Agricultural Part
The Historical Lack of Capital Accumulation in Iran's Agricultural PartThe Historical Lack of Capital Accumulation in Iran's Agricultural Part
The Historical Lack of Capital Accumulation in Iran's Agricultural Part
 
Quark Model Three Body Calculations for the Hypertriton Bound State
Quark Model Three Body Calculations for the Hypertriton Bound StateQuark Model Three Body Calculations for the Hypertriton Bound State
Quark Model Three Body Calculations for the Hypertriton Bound State
 
Discovery of Self-Sustained 235U Fission Causing Sunlight by Padmanabha Rao E...
Discovery of Self-Sustained 235U Fission Causing Sunlight by Padmanabha Rao E...Discovery of Self-Sustained 235U Fission Causing Sunlight by Padmanabha Rao E...
Discovery of Self-Sustained 235U Fission Causing Sunlight by Padmanabha Rao E...
 
Uranium Concentrations measurement for Ground Water and Soil Samples in Al-Na...
Uranium Concentrations measurement for Ground Water and Soil Samples in Al-Na...Uranium Concentrations measurement for Ground Water and Soil Samples in Al-Na...
Uranium Concentrations measurement for Ground Water and Soil Samples in Al-Na...
 
The Comparison of theMaterials in Styles of Iranian Architecture and its Effe...
The Comparison of theMaterials in Styles of Iranian Architecture and its Effe...The Comparison of theMaterials in Styles of Iranian Architecture and its Effe...
The Comparison of theMaterials in Styles of Iranian Architecture and its Effe...
 
Improving Sales in SME Using Internet Marketing
Improving Sales in SME Using Internet MarketingImproving Sales in SME Using Internet Marketing
Improving Sales in SME Using Internet Marketing
 
An Efficient Approach for Requirement Traceability Integrated With Software R...
An Efficient Approach for Requirement Traceability Integrated With Software R...An Efficient Approach for Requirement Traceability Integrated With Software R...
An Efficient Approach for Requirement Traceability Integrated With Software R...
 
Effect of Antioxidant status on liver following Atrazine exposure and its pro...
Effect of Antioxidant status on liver following Atrazine exposure and its pro...Effect of Antioxidant status on liver following Atrazine exposure and its pro...
Effect of Antioxidant status on liver following Atrazine exposure and its pro...
 
“Comparitive Study of Prevalence of Hyperlactatemia in HIV / AIDS Patients re...
“Comparitive Study of Prevalence of Hyperlactatemia in HIV / AIDS Patients re...“Comparitive Study of Prevalence of Hyperlactatemia in HIV / AIDS Patients re...
“Comparitive Study of Prevalence of Hyperlactatemia in HIV / AIDS Patients re...
 
Electrophoretic Patterns of Esterases in Eri silkworm Samia Cynthia ricini
Electrophoretic Patterns of Esterases in Eri silkworm Samia Cynthia riciniElectrophoretic Patterns of Esterases in Eri silkworm Samia Cynthia ricini
Electrophoretic Patterns of Esterases in Eri silkworm Samia Cynthia ricini
 
F0644044
F0644044F0644044
F0644044
 
Analytical Determination of Antihestamine drugs Pure and its pharmaceutical P...
Analytical Determination of Antihestamine drugs Pure and its pharmaceutical P...Analytical Determination of Antihestamine drugs Pure and its pharmaceutical P...
Analytical Determination of Antihestamine drugs Pure and its pharmaceutical P...
 
The influence of Rolling process on the porosity and wear behavior of Spray-f...
The influence of Rolling process on the porosity and wear behavior of Spray-f...The influence of Rolling process on the porosity and wear behavior of Spray-f...
The influence of Rolling process on the porosity and wear behavior of Spray-f...
 
Effective Leadership-Employee Retention-Work Life Balance: A Cyclical Continuum
Effective Leadership-Employee Retention-Work Life Balance: A Cyclical ContinuumEffective Leadership-Employee Retention-Work Life Balance: A Cyclical Continuum
Effective Leadership-Employee Retention-Work Life Balance: A Cyclical Continuum
 
QSAR studies of some anilinoquinolines for their antitumor activity as EGFR i...
QSAR studies of some anilinoquinolines for their antitumor activity as EGFR i...QSAR studies of some anilinoquinolines for their antitumor activity as EGFR i...
QSAR studies of some anilinoquinolines for their antitumor activity as EGFR i...
 
Analysis Of Lpg Cylinder Using Composite Materials
Analysis Of Lpg Cylinder Using Composite MaterialsAnalysis Of Lpg Cylinder Using Composite Materials
Analysis Of Lpg Cylinder Using Composite Materials
 
Synthesis, Structure Investigation and Dyeing Assessment of Novel Bisazo Disp...
Synthesis, Structure Investigation and Dyeing Assessment of Novel Bisazo Disp...Synthesis, Structure Investigation and Dyeing Assessment of Novel Bisazo Disp...
Synthesis, Structure Investigation and Dyeing Assessment of Novel Bisazo Disp...
 

Similar to Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking Utilizing DWT and DCT

ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEAIRCC Publishing Corporation
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...AIRCC Publishing Corporation
 
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ijcsit
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518IJRAT
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwtIAEME Publication
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
Review on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesReview on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesIRJET Journal
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Journals
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Publishing House
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric ImagesIRJET Journal
 

Similar to Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking Utilizing DWT and DCT (20)

ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
 
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
 
ITIMP35.pptx
ITIMP35.pptxITIMP35.pptx
ITIMP35.pptx
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
Review on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesReview on Quantum Watermarking Techniques
Review on Quantum Watermarking Techniques
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking Utilizing DWT and DCT

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 06-11 www.iosrjournals.org www.iosrjournals.org 6 | Page Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking Utilizing DWT and DCT Dr. N. Chaudhary1 , Dr. D. Singh2 , D.Hussain3 1 (Professor, Computer Science and Engineering, College of Technology and Engineering, India) 2 (Assistant Professor, Computer Science and Engineering, College of Technology and Engineering, India) 3 (Computer Science and Engineering, College of Technology and Engineering, India) Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal biometric recognition is not able to meet the performance requirements of the applications. According to recent trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the directions of improving the performance of biometric identification system by going multimodal and, increasing the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction and presented outcomes justifies the effectiveness of the scheme. Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics, Singular Value Decomposition, Watermarking I. INTRODUCTION In this era of Information technology and electronic revolution, automatic access of individuals to services is becoming vital. Authenticating the identity of an individual is a prerequisite for completion of all commercial or personal transactions. Forgery and fraud can be prevented only if one establishes its identity with certainty which is unattainable in case of traditional authentication methods that are either token based such as ID Card ( that are likely to be lost, forged or stolen), or knowledge based such as passwords (which can be forgotten). This has led in the emergence and formulation of a new technological area known as biometric recognition, or simply stated as biometrics [1]. Biometrics is the science of asserting the identity of an individual through physical assessment for example fingerprints, iris, hand geometry, face recognition etc. or behavioral characteristic that include voice, gait recognition, keystroke scanning, signature-scan. The association of biometric traits with the user is permanent and also these traits are unique for an individual and cannot be easily modified and forged. Thus biometrics is believed to be a more reliable technology. Biometric authentication systems have inherent advantages over traditional personal identification techniques [2]. However, the security of biometrics data is preeminent and must be shielded from external invasion and tampering as they are not endowed with security themselves [1]. It is therefore necessary to provide security to the biometric templates of individuals at all times. One way of addressing this issue is Encryption [3, 4]. Encryption does not contribute to the much needed mutually integrated security and is ineffective once the data is decrypted after it is being transmitted over the network. Cryptography uses methods of encryption to construct secure information. As cryptography and encryption are not fully capable of providing security throughout the entire life of the work [4], digital watermarking has emerged to fulfill this requirement. In biometric watermarking, a piece of information termed as watermark, is embedded into the host image using a secret key, in such a way that the contents of the host image are not modified to the extent that are perceptible to the Human Visual System (HVS).Further biometric authentication systems based upon only one of the biometric modalities may not fulfill the requirements of demanding applications in terms of universality, uniqueness, performance, acceptability, permanence, collectability and circumvention. These factors paved a way for the development of multimodal biometric authentication system. Multimodal biometric systems use more than one biometric trait in order to identify an individual. These systems provide superior recognition rate in contrast to unimodal systems [5]. The biometric modalities, such as fingerprint, face and iris are one of the most conventional and effective modalities [6].
  • 2. Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking www.iosrjournals.org 7 | Page To enhance the security and performance of multimodal biometrics authentication system this paper targets on watermarking face image with fingerprint image by using a robust watermarking scheme. Then comparing the watermarked image and extracted image with the original images in order to prove that the watermarking and extraction procedure does not affect the recognition capacity of the overall system. This paper is formulated in the following manner: the background details related to the technique are stated in Section II. The proposed robust watermarking algorithm for biometric images is described in Section III. In Section IV the results are outlined to assess the significance of the proposed technique on the overall performance of the system. And, conclusions of the scheme are drawn in Section V. II. BACKGROUND 1. Watermarking Watermarking [7,8,9] is the technique of embedding data into elements such as an image, video or audio file for authentication purpose. The data which is embedded can later be detected and extracted from, the elements for security reasons. A watermarking algorithm comprises of a watermark structure, an embedding algorithm, and a detection or extraction algorithm. In most of the applications where security is necessary, embedded watermark is required to be robust, invisible and should have a high capacity. Essentially watermarks are used for the purpose of copyright protection i.e. identifying from where the content originated, tracing illegal distribution of copies and undermining unauthorized access to content. The requirements for watermarks in varied scenarios differ. Embedding a single watermark into the content at the source of distribution is sufficient for identification of the origin of content [11]. To trace illegal copies, based on the identity or location of the recipient in the network a unique watermark is required. Non-blind schemes are suitable for both these application as watermark extraction or detection is required only when there is a dispute in context of the ownership of content. Access control, is performed through semi-blind or blind schemes where the watermark should be checked in all authorized consumer devices. Recently, many watermarking schemes have been developed using the two most popular transforms that are Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT). The generic model of watermark embedding and extraction is shown in Fig. 1. Fig.1: Model for Watermark embedding and extraction In embedding module the host image is watermarked with the message image using a secret key and embedding function. The watermarked image is stored in the database or transmitted over the network where there is a possibility that it may be attacked. In the extraction module the watermarked image which might have been attacked is fed to the extraction function along with the secret key and the watermark or message image is extracted from it. Discrete Wavelet Transform The primary concept of DWT is that a one dimensional signal is divided into two parts one is high frequency band and another is low frequency band. Then the low frequency band is further split into two parts and the same process continues until the desired level is reached. For M*N 2-D images, applying DWT corresponds to processing the image by 2-D filters in each dimension and results in the generation of four M/2*N/2 coefficients. The filters divide the input image into four non-overlapping multi-resolution coefficient sets, (LL1) a lower resolution approximation image as well as (HL1) horizontal high frequency band, (LH1) vertical high frequency band and (HH1) diagonal high frequency band. The information of low frequency band is an image close to the original image. In DWT decomposition, input signal must be a multiple of 2n . Where, n is equivalent to the number of levels. DWT provides sufficient information to analyze and synthesize the actual signal and also requires less computation time. Fig. 2 shows the two-level DWT decomposition of an image.
  • 3. Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking www.iosrjournals.org 8 | Page Fig.2: Two level DWT decomposition Discrete Cosine Transform In digital signal processing one of the most prevalent linear transformation functions is DCT. It converts spatial or time domain signal to frequency domain and the image is transformed into a form of an even function. In comparison to spatial domain techniques DCT techniques are more robust. Algorithms based on DCT are robust against common image processing operations like adjustment, blurring, brightness, low pass filtering, and contrast and so on. One-dimensional signals like speech waveforms can be processed with one dimensional DCT. For analysis of 2D signals like images, we require 2-D DCT. The two-dimensional DCT of any given matrix gives the frequency coefficients in form of another matrix. The lowest frequency coefficients are represented at the Left topmost corner of the matrix while the highest frequency coefficients are represented at the right bottom most corner of the matrix. Formula for 2-D DCT: F(m,n) = Formula for 2-D inverse DCT: F(i,j) = Where, Singular Value Decomposition Singular Value Decomposition is an effective tool for image transformation and it is based on a theorem from linear algebra which states that a rectangular matrix A can be divided into the product of three matrices; U - an orthogonal matrix, S- a diagonal matrix, and V - the transpose of an orthogonal matrix. The theorem is represented as: A m*n= Um*m Sm*n VT n*n Where; UT U = I; VT V = I; The columns of U are orthonormal eigenvectors of AAT , The columns of V are orthonormal eigenvectors of AT A, and S is a diagonal matrix that contains the square roots of eigenvalues from U or V in descending order. III. THE PROPOSED SCHEME In the proposed scheme one biometric data is watermarked with another biometric data using SVD based hybrid watermarking scheme. In the proposed scheme face image is used as the cover image or host image which is watermarked using the fingerprint image. This hybrid watermarking technique is depicted schematically as well as algorithmically. 1. Watermark Embedding Algorithm Initially weinput the Cover image I and DWT is applied on the Cover image I which decomposes image into four sub-bands LL, HL, LH and HH further DCT is applied to all the high frequency bands and SVD is applied to all the high frequency bands to get the matrices SH1_I, SH2_I and SH3_I. Watermark image W is given as input. DWT is applied on the Watermark image W which decomposes into four sub-bands LL1, HL1, LH1 and HH1.DCT is applied to all high frequency bands further SVD is applied to all the higher frequency bands and get the respective matrices.Utilizing the singular values of Watermark image the singular values of
  • 4. Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking www.iosrjournals.org 9 | Page the cover image are modified.Modified SVD matrix is constructed. Inverse DCT is applied to all high frequency bands then inverse DWT is applied to get the final watermarked image. Fig. 3 shows the watermarking procedure schematically Fig.3: Watermark embedding procedure 2. Watermark Extraction Algorithm Input Watermarked image W_I.DWT is applied on the Watermarked image W_I; it decomposes image into four sub-bands LL_W, HL_W, LH_W and HH_W. All high frequency bands are selected and DCT is applied to all those bands. Then SVD is applied to all the high frequency bands to get the matrices SH1_WI, SH2_WI and SH3_WI.SH1_WI, SH2_WI and SH3_WI are modified. Modified SVD matrix is constructed.Inverse DCT is applied to all high frequency bands.Inverse DWT is applied to get the final extracted watermark image. Fig. 4 shows the watermark extraction procedure schematically Fig. 4: Watermark extraction procedure IV. IMPLEMENTATION AND RESULTS Broadly, a watermarking algorithm can be assessed based on two parameters: imperceptibility and robustness. The similarity or correlation between the original watermark and the Extracted watermark is quantitatively measured by utilizing Normalized Cross-Correlation (NCC) [12]. The formula for Normalized Cross-Correlation (NCC) is
  • 5. Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking www.iosrjournals.org 10 | Page NCC = The value of Normalized Cross-Correlation lies between [-1, 1]. And greater NCC value means the watermark is more robust [13,14]. Peak Signal to Noise Ratio (PSNR) is used in quantitatively analyzing the concealing capacity of the algorithm. Peak Signal to Noise Ratio (PSNR) is defined as: PSNR = The unit is decibels (dB). The larger the value of PSNR is, the better the imperceptibility of watermark.Performance of the algorithm is tested by simulating the experiment on MATLAB 2012a. 256x256 pixels of gray-level host image and watermark image are chosen for the purpose of simulation of the algorithm. The original cover image, watermarked image and the extracted watermark images are shown in Fig.5. Fig. 5: [A] Original cover and Watermark image [B] Watermarked image and Extracted watermark The watermarked image resembles the original image in vision impression to a large extent. To the Human Visual System there is no clearly visible difference between the two images. Thus, this algorithm hides watermark very well. The PSNR of the original cover image and watermarked image is 46.041 dB, which is considered a quite good value. Along with that, the NCC of the original watermark image and extracted watermark is 0.9727, which shows that the two images are strongly correlated. In order to test the robustness of the algorithm, it is tested under different types of attacks. The images on which attacks have been applied are shown in Fig.7. The Extracted Watermark images along with their NCC values are shown in Fig.6 Fig. 6: [A] watermarked images that are attacked [B] Extracted watermark with normalized cross correlation The simulation results show that the watermark image can be extracted well even after the watermarked image is attacked. Simulation results indicate that this watermarking algorithm is robust against many common attacks like adding salt noise, filter, image compression, sharp enhancing, image cutting and rotation. V. CONCLUSION This paper proposed a discrete wavelet transform (DWT) and discrete cosine transform (DCT) based watermarking algorithm for biometric data. By using Singular Value Decomposition, watermarking signals are embedded in the high frequency bands of wavelet transformation domain. And before the embedding procedure is followed the watermark image is also transformed using both DWT and DCT. The simulation results prove that this watermarking algorithm not only keeps the image quality well, but is also robust against many image processing operations. This algorithm is very efficient in embedding signals and also anti-attack.
  • 6. Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking www.iosrjournals.org 11 | Page REFERENCES [1] A. K. Jain, U. Uludag, Hiding Biometric Data,IEEE Trans. Pattern Analysis and Machine Intelligence, 25(11), Nov. 2003, 1494 – 1498. [2] A. K. Jain, A. Ross, and S. Prabhakar, An introduction to biometric recognition,IEEE Transactions on Circuits and Systems for Video Technology,14(1),200,4-20. [3] U. Uludag, S. Pankanti, S. Prabhakar, and A.K. Jain, Biometric cryptosystems: issues and challenges, Proceedings of IEEE, 92( 6),2004, 948-960. [4] Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data, Eurocrypt2004, 523-540. [5] A.Nagar, K.Nandakumar, A. K.Jain, Multibiometric Cryptosystems Based on Feature-Level Fusion, IEEETrans. Inf. Forensics Security, 7( 1), Feb. 2012, 255 – 268 [6] Z. huiming, Z.Huile, A technology of hiding fingerprint minutiae in image,Research & progress of solid state electronics, 26(2),2006, 197-200. [7] C. I. Podilchuk and E. J. Delp, Digital Watermarking: Algorithms and Applications, IEEE Signal Processing Magazine, July 2001, 33-46. [8] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking (Morgan Kaufmann Publishers, 2002). [9] E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp, Advances in Digital Video Content Protection, Proceedings of the IEEE, Special Issue on Advances in Video Coding and Delivery, 2004. [10] G.C. Langelaar, I. Setyawan, R.I. Lagendijik, Watermarking digital image and video data, IEEE Signal Processing Magazine 17 (5) 2000, 20–46. [11] N.F. Johnson, Z. Duric and S. Jajodia, Information Hiding, Steganography and Watermarking-Attacks and Counter Measures, Kluwer academic publisher, 2003, 15-29. [12] M. Nageshkumar , P.K. Mahesh , M. N. ShanmukhaSwamy, An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image,IJCSI International Journal of Computer Science Issues, 2, Aug. 2009,49-53. [13] J Jiang, A. Armstrong, Data hiding approach for efficient image indexing, Electronics letters. 7th, 38(23),2002, 1424- 1425. [14] I.J .Cox, J.G. Linnartz, Some general methods for tampering with watermarks, IEEE Journal on Selected Areas in Communications,16(4),1998, 587-593.