Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
Copyright protection has become a need in today’s world. To achieve a secure copyright protection we embedded some information in images and videos and that image or video is called copyright protected. The embedded information can’t be detected by human eye but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed image processing techniques i.e. Spatial Domain (Least Significant Bit (LSB)), Transform Domain (Discrete Cosine Transform (DCT)), Discrete Wavelet Transform (DWT) and there are numerous algorithm for watermarking using them. After having a good understanding of the same we have proposed a novel algorithm named as Stage Staffing Algorithm that generates results with high effectiveness, additionally we can use self extracted-watermark technique to increase the security and automate the process of watermark image. The proposed algorithm provides protection in three stages. We have implemented the algorithm and results of the simulations are shown. The various factors affecting spatial domain watermarking are also discussed.
In most networks and distributed systems, security
has always been of a major concern and authentication is the core
issue as it provides protection from unauthorized use and ensures
proper functioning of the system. This paper investigates and
proposes DS-NIZKP, an approach for authenticating users by
three factors, (namely password, smart-card and biometrics)
based on the concept of Zero Knowledge Proof (ZKP), so that no
sensitive information can be revealed during a communication.
The proposal employs the concept of digital signature (DS) to
authenticate the identity of the sender or the signer within a
single communication. Given that DS employs asymmetric
encryption, a one-way hash of the user’s identity is created then
signed using the private key. Hashing prevents from revealing
information about the user while signing provides authentication,
non-repudiation and integrity. This approach not only saves time
since just a single message between the prover and the verifier is
necessary but also defends privacy of the user in distributed
systems.
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
Technology has elevated to grab an important position in humans life, the best example is smartphones. They offer access to network as well as online banking transactions, where simplification of human labour affects security and user authentication, and passwords are first line of defense, it’s crucial to pick a strong password. Online banking applications currently use alphanumerical usernames and passwords for authentication, which are exposed to eves dropping, attacks, and shoulder surfing. Users often choose either easy to remember passwords, which can be easily guessed or difficult ones, which tend to be forgotten. The paper revolves around the views, limitation of current system and offers a dynamic biometrics, as it can be easily integrated into the existing computer security systems with minimal alteration and user intervention. The main objective is to secure using cued click point (CCP), which is one click based graphical password scheme for sequence of images and measuring, assessing humans typing rhythm, it’s based upon the human tendency to memorize graphical passwords more comfortably.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind
Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as
Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential
applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are
unknown. One of the more interesting applications of BSS is in field of image data security/authentication where
digital watermarking is proposed. Watermarking is a promising technique to help protect data security and
intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here
with their features and limitations. Thus literature survey is presented in two major categories-Digital image
watermarking methods and BSS based techniques in digital image watermarking and extraction
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
Copyright protection has become a need in today’s world. To achieve a secure copyright protection we embedded some information in images and videos and that image or video is called copyright protected. The embedded information can’t be detected by human eye but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed image processing techniques i.e. Spatial Domain (Least Significant Bit (LSB)), Transform Domain (Discrete Cosine Transform (DCT)), Discrete Wavelet Transform (DWT) and there are numerous algorithm for watermarking using them. After having a good understanding of the same we have proposed a novel algorithm named as Stage Staffing Algorithm that generates results with high effectiveness, additionally we can use self extracted-watermark technique to increase the security and automate the process of watermark image. The proposed algorithm provides protection in three stages. We have implemented the algorithm and results of the simulations are shown. The various factors affecting spatial domain watermarking are also discussed.
In most networks and distributed systems, security
has always been of a major concern and authentication is the core
issue as it provides protection from unauthorized use and ensures
proper functioning of the system. This paper investigates and
proposes DS-NIZKP, an approach for authenticating users by
three factors, (namely password, smart-card and biometrics)
based on the concept of Zero Knowledge Proof (ZKP), so that no
sensitive information can be revealed during a communication.
The proposal employs the concept of digital signature (DS) to
authenticate the identity of the sender or the signer within a
single communication. Given that DS employs asymmetric
encryption, a one-way hash of the user’s identity is created then
signed using the private key. Hashing prevents from revealing
information about the user while signing provides authentication,
non-repudiation and integrity. This approach not only saves time
since just a single message between the prover and the verifier is
necessary but also defends privacy of the user in distributed
systems.
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
Technology has elevated to grab an important position in humans life, the best example is smartphones. They offer access to network as well as online banking transactions, where simplification of human labour affects security and user authentication, and passwords are first line of defense, it’s crucial to pick a strong password. Online banking applications currently use alphanumerical usernames and passwords for authentication, which are exposed to eves dropping, attacks, and shoulder surfing. Users often choose either easy to remember passwords, which can be easily guessed or difficult ones, which tend to be forgotten. The paper revolves around the views, limitation of current system and offers a dynamic biometrics, as it can be easily integrated into the existing computer security systems with minimal alteration and user intervention. The main objective is to secure using cued click point (CCP), which is one click based graphical password scheme for sequence of images and measuring, assessing humans typing rhythm, it’s based upon the human tendency to memorize graphical passwords more comfortably.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind
Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as
Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential
applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are
unknown. One of the more interesting applications of BSS is in field of image data security/authentication where
digital watermarking is proposed. Watermarking is a promising technique to help protect data security and
intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here
with their features and limitations. Thus literature survey is presented in two major categories-Digital image
watermarking methods and BSS based techniques in digital image watermarking and extraction
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
Digital watermarking provides authentication, validation and copyright protection for multimedia contents over the internet. Text is the most widely used means of communication in addition to image, audio and video. So it needs to be protected. Text watermarking techniques that have been developed in past protects the text from illegal copying, imitation, and prevents copyright violations. In this paper, we have proposed an algorithm that ensures the integrity and confidentiality of the document. In this technique watermark is created based on the contents of the document and embeds it without changing the contents of the document and also encrypts the text to provide confidentiality. To authenticate and prove the integrity of the document the watermark can be easily extracted and verified for tampering.
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
The uniqueness, firmness, public recognition, and its minimum risk of intrusion made fingerprint is an expansively used personal authentication metrics. Fingerprint technology is a biometric technique used to distinguish persons based on their physical traits. Fingerprint based authentication schemes are becoming increasingly common and usage of these in fingerprint security schemes, made an objective to the attackers. The repute of the fingerprint image controls the sturdiness of a fingerprint authentication system. We intend for an effective method for fingerprint classification with the help of soft computing methods. The proposed classification scheme is classified into three phases. The first phase is preprocessing in which the fingerprint images are enhanced by employing median filters. After noise removal histogram equalization is achieved for augmenting the images. The second stage is the feature Extraction phase in which numerous image features such as Area, SURF, holo entropy, and SIFT features are extracted. The final phase is classification using hybrid Neural for classification of fingerprint as fake or original. The neural network is unified with BAT algorithm for optimizing the weight factor.
Security remains to be an important aspect in the current age that is characterized with heavy internet usage. People as well as organizations are moving away from ancient authentication schemes like passwords to biometric authentication schemes as they provide better confidentiality and integrity of authentication information. Although biometrics are unique to an individual, they are still susceptible to attacks thus the need to secure them. Several techniques such as encryption, steganography, have been proposed with aim of achieving the security need brought about their use. This paper reviewed some proposed models for biometric template security and their limitation as well as provide recommendation to address some of the limitations outlined.
Efficient and secure authentication on remote server using stegno video objec...pradip patel
Due to the present increase in world population, people in this world tend to occupy available locations present in any zone which also include zones falling in the high seismic zone categories. The buildings constructed in such zones must be analysed and designed to withstand these earthquakes, along with the cost economy. Bracing systems is very efficient and unyielding lateral load resisting system. Bracing systems serves as one of the component in buildings for increasing stiffness and strength to guard buildings from incidence caused by natural forces like earthquake. Braced frames widen their resistance to lateral forces by the bracing action of inclined members. The braces stimulate forces in the associated beams and columns so that all works like a truss which results in smaller sizes of beam and column sections that turns out to be economical. In this study, G+14 storey building model has been analysed considering “Inverted V” and “V” type RCC bracing system and steel bracing system under seismic loadings using STADD PRO for analysis. Results are concluded by comparison of storey displacement, storey drift and base shear for fixed base building
In wireless communications sensitive data is frequently changed, requiring remote authentication. Remote authentication involves the submission of encrypted data, along with visual and audio cues (facial images/videos, human voice etc.). Nonetheless, malicious program and different attacks will cause serious issues, particularly in cases of remote examinations or interviewing. This paper proposes a sturdy authentication mechanism supported semantic segmentation, chaotic cryptography and knowledge concealment. Assuming that user X needs to be remotely documented, initially X’s video object (VO) is mechanically segmental, employing a head and-body detector. Next, one amongst X’s biometric signals is encrypted by a chaotic cipher. Subsequently the encrypted signal is inserted to the most vital riffle coefficients of the VO, victimization its Qualified Significant riffle Trees (QSWTs). QSWTs give invisibility and vital resistance against loss transmission and compression, conditions that area unit typical in wireless networks. Finally, the Inverse distinct riffle rework (IDWT) is applied to supply the stegno-object (SO). Experimental results, regarding: (a) security deserves of the planned cryptography theme, (b) strength to stegno-analytic attacks, to numerous transmission losses and JPEG compression ratios and (c) information measure potency measures, indicate the promising performance of the planned biometrics-based authentication theme.
Lsb hiding using random approach for image watermarkingeSAT Journals
Abstract A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide protection for intellectual property from illegal copying. In this paper the method of nested digital image watermarking is used that means a watermark inside another watermark embedded into the cover image that is the main image. Here the Randomized LSB hiding algorithm is used for embedding one image into another as it has lesser complexity and the approach is more robust to the variations in the type of image. The blowfish algorithm is used to encrypt the watermark image before embedding into the cover image. The concept of encryption of watermark image before get embedded into the main image is used here to increase the security of the watermark image. This is because the research work is mainly focus on to get the more secured watermark by improving and enhancing the embedding capacity. Key Words: Digital image Watermarking, Randomized LSB, Blowfish, Copyright Protection
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention since its introduction in 1992. In this study, authentication system contained two parts: registration part and matching part. In both parts, iris image is used for personal identification. Localization of inner boundary only, extracted a region from the iris (without eyelashes problem), a feature vector is deduced from the texture of the image. The feature vector is used for classification of the iris texture, then it's treated by the hash function to produce the hash value (authentic value of a person). In matching part, produced hash value searched in the authorized person's database for taking a decision (success or fail) of the authentication. The method was evaluated on iris images takes from the CASIA iris image database version 1.0 [15]. The experimental results show that the vector extracted by the proposed method has very discriminating values that led to a recognition rate of over 100% on iris database. Also, authentication system is very accurate because it's used a secure method of authentication that iris-biometric and a hash function for avoiding stealing data from database.
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
This paper introduces the idea of hierarchical visual
cryptography. Authentication is the important issue over the
internet. This paper describes a secured authentication
mechanism with the help of visual cryptography. Visual
cryptography simply divides secret information in to number
of parts called shares. These shares are further transmitted
over the network and at the receiving end secrets are revealed
by superimposition. Many layers of visual cryptography exist
in proposed system hence called hierarchical visual
cryptography. Remote voting systems now a day’s widely using
visual cryptography for authentication purpose.
Prevalence of Iron Deficiency Anaemia among Pregnant Women in Calabar, Cross ...IOSR Journals
Iron is a component of a number of proteins including haemoglobin, myoglobin, cytochromes and enzymes involved in redox reactions. Inadequate iron intake can lead to varying degrees of deficiency, from low iron stores to early iron deficiency and iron-deficiency anaemia and this is dangerous to both baby and mother. The objective of this study is to assess the prevalence of iron deficiency and iron deficiency anaemia among pregnant women in Calabar, Cross River State Nigeria. Seventy pregnant women within the age range of 15-45 years from University of Calabar Teaching Hospital were recruited as subjects in this study. The control consisted of fifty age-matched apparently healthy non-pregnant women . The tests that were carried out using standard method include include full blood count (packed cell volume, haemoglobin, mean cell haemoglobin, mean cell haemoglobin concentration and red cell count), serum iron, total iron binding capacity, transferrin saturation,serum ferritin and soluble transferrin recptor. The prevalence of anaemia and iron deficiency anaemia were found to be significantly higher (p<0.05)><0.01)><0.01) increased in pregnant than non-pregnant. It was also shown that pregnant women in their third trimesters and multigravidae had the highest prevalence of iron deficiency and iron deficiency anaemia while pregnant women in their second trimester had the highest prevalence of anaemia. In conclusion the study has shown that the prevalence of anaemia, iron deficiency and iron deficiency anaemia among pregnant women in the studied area were still high and can be considered public health problem.
Vibration Analysis of Cracked Rotor Using Numerical ApproachIOSR Journals
In general rotating machines have wide applications in systems, plants, vehicles, and industries. Every rotating machine uses shaft as power transforming unit. It is very dangerous to operate the machine with the presence of crack in the shaft. The growth of the crack is dangerous to operate and may lead to catastrophic failure. It is to be detected at earlier stages. In this paper relation between vibration amplitude and on the crack depth was developed, this helps in determine the depth of the crack by measuring the vibration amplitudes. To develop the relation equation strain energy density function was used. By observing the generated curves amplitude of vibration increases with respect to the depth of the crack due to reduction in stiffness of the shaft.
Radiation dose to the eyes of readers at the least distance of distinct visio...IOSR Journals
This work reports the measurements of the radionuclide contents in some widely read daily newspapers published in Nigeria, using gamma spectrometry. The radionuclides detected in the newspapers measured consisted of the natural radionuclides belonging to the series headed by 228Ra and 226Ra as well as the singly occurring radionuclide 40K. The mean activity concentrations obtained for 40K, 226Ra and 228Ra respectively in the newspapers were 183.41±135.43, 9.06±3.64 and 6.11±1.36 Bqkg-1, 139.10±90.38, 7.58±1.87 and 5.29±1.33 Bqkg-1 and 152.10±114.32, 9.62±1.40 and 5.76±1.29 Bqkg-1 respectively from P1, P2 and P3. The doses to the eyes due to the measured activity concentrations in the newspaper samples were determined for a distance of 0.25 m (least distance of distinct vision) from the eyes. The annual effective doses to the eye resulting from the activities of the radionuclides identified with observed regularity in all the newspaper samples, obtained in this study are 0.012±0.010, 0.010±0.009, 0.010±0.009 μSv y-1 respectively for the newspapers. These values show that the doses to the lens of the eye from the Nigerian newspapers assessed in this work are very low compared to the annual dose limit of 15 mSv y
The Historical Lack of Capital Accumulation in Iran's Agricultural PartIOSR Journals
The increasing amount of income due to the discovery of oil in Iran has caused a gap between the production and need of agricultural products, causing the increase in the import of agricultural products in Iran's economy. The existing gap caused a drastic increase in the prices, and since the growth of agricultural products needed Infrastructure investment, it has been tried to control the increase in the prices with an increase in the import rate. So capital accumulation has not been done to the required rate and the production in agriculture has not increased to the expected rate. The share of workers in the agricultural sector of Iran has faced a decrease since 1980. This is while in the international level, agriculture for the growth of economy, decrease of poverty, food security, and the stability of environment is of high importance. A general investment can reduce risks in the agriculture and increase efficiency in private sectors, so the motives of farmers for investment will be increased.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
Digital watermarking provides authentication, validation and copyright protection for multimedia contents over the internet. Text is the most widely used means of communication in addition to image, audio and video. So it needs to be protected. Text watermarking techniques that have been developed in past protects the text from illegal copying, imitation, and prevents copyright violations. In this paper, we have proposed an algorithm that ensures the integrity and confidentiality of the document. In this technique watermark is created based on the contents of the document and embeds it without changing the contents of the document and also encrypts the text to provide confidentiality. To authenticate and prove the integrity of the document the watermark can be easily extracted and verified for tampering.
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
The uniqueness, firmness, public recognition, and its minimum risk of intrusion made fingerprint is an expansively used personal authentication metrics. Fingerprint technology is a biometric technique used to distinguish persons based on their physical traits. Fingerprint based authentication schemes are becoming increasingly common and usage of these in fingerprint security schemes, made an objective to the attackers. The repute of the fingerprint image controls the sturdiness of a fingerprint authentication system. We intend for an effective method for fingerprint classification with the help of soft computing methods. The proposed classification scheme is classified into three phases. The first phase is preprocessing in which the fingerprint images are enhanced by employing median filters. After noise removal histogram equalization is achieved for augmenting the images. The second stage is the feature Extraction phase in which numerous image features such as Area, SURF, holo entropy, and SIFT features are extracted. The final phase is classification using hybrid Neural for classification of fingerprint as fake or original. The neural network is unified with BAT algorithm for optimizing the weight factor.
Security remains to be an important aspect in the current age that is characterized with heavy internet usage. People as well as organizations are moving away from ancient authentication schemes like passwords to biometric authentication schemes as they provide better confidentiality and integrity of authentication information. Although biometrics are unique to an individual, they are still susceptible to attacks thus the need to secure them. Several techniques such as encryption, steganography, have been proposed with aim of achieving the security need brought about their use. This paper reviewed some proposed models for biometric template security and their limitation as well as provide recommendation to address some of the limitations outlined.
Efficient and secure authentication on remote server using stegno video objec...pradip patel
Due to the present increase in world population, people in this world tend to occupy available locations present in any zone which also include zones falling in the high seismic zone categories. The buildings constructed in such zones must be analysed and designed to withstand these earthquakes, along with the cost economy. Bracing systems is very efficient and unyielding lateral load resisting system. Bracing systems serves as one of the component in buildings for increasing stiffness and strength to guard buildings from incidence caused by natural forces like earthquake. Braced frames widen their resistance to lateral forces by the bracing action of inclined members. The braces stimulate forces in the associated beams and columns so that all works like a truss which results in smaller sizes of beam and column sections that turns out to be economical. In this study, G+14 storey building model has been analysed considering “Inverted V” and “V” type RCC bracing system and steel bracing system under seismic loadings using STADD PRO for analysis. Results are concluded by comparison of storey displacement, storey drift and base shear for fixed base building
In wireless communications sensitive data is frequently changed, requiring remote authentication. Remote authentication involves the submission of encrypted data, along with visual and audio cues (facial images/videos, human voice etc.). Nonetheless, malicious program and different attacks will cause serious issues, particularly in cases of remote examinations or interviewing. This paper proposes a sturdy authentication mechanism supported semantic segmentation, chaotic cryptography and knowledge concealment. Assuming that user X needs to be remotely documented, initially X’s video object (VO) is mechanically segmental, employing a head and-body detector. Next, one amongst X’s biometric signals is encrypted by a chaotic cipher. Subsequently the encrypted signal is inserted to the most vital riffle coefficients of the VO, victimization its Qualified Significant riffle Trees (QSWTs). QSWTs give invisibility and vital resistance against loss transmission and compression, conditions that area unit typical in wireless networks. Finally, the Inverse distinct riffle rework (IDWT) is applied to supply the stegno-object (SO). Experimental results, regarding: (a) security deserves of the planned cryptography theme, (b) strength to stegno-analytic attacks, to numerous transmission losses and JPEG compression ratios and (c) information measure potency measures, indicate the promising performance of the planned biometrics-based authentication theme.
Lsb hiding using random approach for image watermarkingeSAT Journals
Abstract A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide protection for intellectual property from illegal copying. In this paper the method of nested digital image watermarking is used that means a watermark inside another watermark embedded into the cover image that is the main image. Here the Randomized LSB hiding algorithm is used for embedding one image into another as it has lesser complexity and the approach is more robust to the variations in the type of image. The blowfish algorithm is used to encrypt the watermark image before embedding into the cover image. The concept of encryption of watermark image before get embedded into the main image is used here to increase the security of the watermark image. This is because the research work is mainly focus on to get the more secured watermark by improving and enhancing the embedding capacity. Key Words: Digital image Watermarking, Randomized LSB, Blowfish, Copyright Protection
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention since its introduction in 1992. In this study, authentication system contained two parts: registration part and matching part. In both parts, iris image is used for personal identification. Localization of inner boundary only, extracted a region from the iris (without eyelashes problem), a feature vector is deduced from the texture of the image. The feature vector is used for classification of the iris texture, then it's treated by the hash function to produce the hash value (authentic value of a person). In matching part, produced hash value searched in the authorized person's database for taking a decision (success or fail) of the authentication. The method was evaluated on iris images takes from the CASIA iris image database version 1.0 [15]. The experimental results show that the vector extracted by the proposed method has very discriminating values that led to a recognition rate of over 100% on iris database. Also, authentication system is very accurate because it's used a secure method of authentication that iris-biometric and a hash function for avoiding stealing data from database.
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
This paper introduces the idea of hierarchical visual
cryptography. Authentication is the important issue over the
internet. This paper describes a secured authentication
mechanism with the help of visual cryptography. Visual
cryptography simply divides secret information in to number
of parts called shares. These shares are further transmitted
over the network and at the receiving end secrets are revealed
by superimposition. Many layers of visual cryptography exist
in proposed system hence called hierarchical visual
cryptography. Remote voting systems now a day’s widely using
visual cryptography for authentication purpose.
Prevalence of Iron Deficiency Anaemia among Pregnant Women in Calabar, Cross ...IOSR Journals
Iron is a component of a number of proteins including haemoglobin, myoglobin, cytochromes and enzymes involved in redox reactions. Inadequate iron intake can lead to varying degrees of deficiency, from low iron stores to early iron deficiency and iron-deficiency anaemia and this is dangerous to both baby and mother. The objective of this study is to assess the prevalence of iron deficiency and iron deficiency anaemia among pregnant women in Calabar, Cross River State Nigeria. Seventy pregnant women within the age range of 15-45 years from University of Calabar Teaching Hospital were recruited as subjects in this study. The control consisted of fifty age-matched apparently healthy non-pregnant women . The tests that were carried out using standard method include include full blood count (packed cell volume, haemoglobin, mean cell haemoglobin, mean cell haemoglobin concentration and red cell count), serum iron, total iron binding capacity, transferrin saturation,serum ferritin and soluble transferrin recptor. The prevalence of anaemia and iron deficiency anaemia were found to be significantly higher (p<0.05)><0.01)><0.01) increased in pregnant than non-pregnant. It was also shown that pregnant women in their third trimesters and multigravidae had the highest prevalence of iron deficiency and iron deficiency anaemia while pregnant women in their second trimester had the highest prevalence of anaemia. In conclusion the study has shown that the prevalence of anaemia, iron deficiency and iron deficiency anaemia among pregnant women in the studied area were still high and can be considered public health problem.
Vibration Analysis of Cracked Rotor Using Numerical ApproachIOSR Journals
In general rotating machines have wide applications in systems, plants, vehicles, and industries. Every rotating machine uses shaft as power transforming unit. It is very dangerous to operate the machine with the presence of crack in the shaft. The growth of the crack is dangerous to operate and may lead to catastrophic failure. It is to be detected at earlier stages. In this paper relation between vibration amplitude and on the crack depth was developed, this helps in determine the depth of the crack by measuring the vibration amplitudes. To develop the relation equation strain energy density function was used. By observing the generated curves amplitude of vibration increases with respect to the depth of the crack due to reduction in stiffness of the shaft.
Radiation dose to the eyes of readers at the least distance of distinct visio...IOSR Journals
This work reports the measurements of the radionuclide contents in some widely read daily newspapers published in Nigeria, using gamma spectrometry. The radionuclides detected in the newspapers measured consisted of the natural radionuclides belonging to the series headed by 228Ra and 226Ra as well as the singly occurring radionuclide 40K. The mean activity concentrations obtained for 40K, 226Ra and 228Ra respectively in the newspapers were 183.41±135.43, 9.06±3.64 and 6.11±1.36 Bqkg-1, 139.10±90.38, 7.58±1.87 and 5.29±1.33 Bqkg-1 and 152.10±114.32, 9.62±1.40 and 5.76±1.29 Bqkg-1 respectively from P1, P2 and P3. The doses to the eyes due to the measured activity concentrations in the newspaper samples were determined for a distance of 0.25 m (least distance of distinct vision) from the eyes. The annual effective doses to the eye resulting from the activities of the radionuclides identified with observed regularity in all the newspaper samples, obtained in this study are 0.012±0.010, 0.010±0.009, 0.010±0.009 μSv y-1 respectively for the newspapers. These values show that the doses to the lens of the eye from the Nigerian newspapers assessed in this work are very low compared to the annual dose limit of 15 mSv y
The Historical Lack of Capital Accumulation in Iran's Agricultural PartIOSR Journals
The increasing amount of income due to the discovery of oil in Iran has caused a gap between the production and need of agricultural products, causing the increase in the import of agricultural products in Iran's economy. The existing gap caused a drastic increase in the prices, and since the growth of agricultural products needed Infrastructure investment, it has been tried to control the increase in the prices with an increase in the import rate. So capital accumulation has not been done to the required rate and the production in agriculture has not increased to the expected rate. The share of workers in the agricultural sector of Iran has faced a decrease since 1980. This is while in the international level, agriculture for the growth of economy, decrease of poverty, food security, and the stability of environment is of high importance. A general investment can reduce risks in the agriculture and increase efficiency in private sectors, so the motives of farmers for investment will be increased.
Quark Model Three Body Calculations for the Hypertriton Bound StateIOSR Journals
Hyperspherical three body calculations are performed to study and review the various properties of
the hypertriton bound state nucleus
3H in the quark model using -N potentials. In these calculations we study
the different effects of the -N potentials on the hypertriton bound states as well as the separation energy B. A
combination of realistic two body N-N potentials with various - N potentials are considered. Complete
symmetric and mixed symmetric wave functions are introduced. using the renormalized Numerov method. The
agreement between the calculated
3H binding energies and the available experimental data basically depends
on the type of the -N interactions used in the calculations. It was found that the -N potentials are the most
effective part in the hypertriton binding energy as well as the separation energy B where the -N potentials is
very effective to bound or unbound the
3H hyper nucleus
Pacs numbers: 21.30. + y, 21.10.+dr,27.20.+n
Discovery of Self-Sustained 235U Fission Causing Sunlight by Padmanabha Rao E...IOSR Journals
For the first time in solar physics, this paper reports a comprehensive study how 235Uranium fission
causes Sunlight by the atomic phenomenon, Padmanabha Rao Effect against the theory of fusion. The first major
breakthrough lies in identifying as many as 153 solar lines in the Bharat Radiation range from 12.87 to 31 nm
reported by various researchers since 1960s. The Sunlight phenomenon is explained as follows. For example, the
energy equivalence 72.48 eV of the most intense 17.107 nm emission in the middle of solar spectrum is the energy
lost by β, γ, or X-ray energy of a fission product while passing through core-Coulomb space. This energy loss is the
Bharat Radiation energy that cause EUV, UV, visible, and near infrared emissions on valence excitation. From vast
data of emissions and energies of various fission products, 606.31 keV β (Eβmax) energy of 131I was chosen as the
source of 17.107 nm emission. For the first time a typical Bharat Radiation spectrum was observed when plotted
energy loss against β, γ, or X-ray energies of fission products supposedly present in solar flare and atmosphere :
113Xe, 131I, 137Cs, 95Zr, 144Cs, 134I, 140Ba, 133I, 140La, 133In etc that caused solar lines. Consistent presence of a sharp
line for four months in AIA spectral EUV band at 335A exemplifies self-sustained uranium fission from a small site
appeared in SDO/AIA image at 304A. Sun’s dark spot is explained as a large crater formed on Sun’s core surface as
a result of fission reaction that does not show any emission since fission products would be thrown away from the
site during fission. Purely the same Sun’s core material left over at the site after fission reaction devoid of fission
products and any emission seems to be the familiar dark Matter. This could be the first report on the existence of
Sun’s Dark Matter.
Uranium Concentrations measurement for Ground Water and Soil Samples in Al-Na...IOSR Journals
In this work, Uranium concentrations in groundwater and soil samples from some areas of Al-Najaf city, Iraq were measured solid state nuclear track detector (CR-39) detector technique. The uranium concentration in groundwater samples was found to vary from (1.617782869±0.04342) μgl−1 to (5.079235843±0.137827) μgl−1, while in soil samples vary from (0.093558±0.000938) ppm to (0.184325±0.017511) ppm.
This study showed that levels of uranium concentration in groundwater and soil of study area of were compared with safe limit values recommended by WHO and UNSCEAR below the safe limit
The Comparison of theMaterials in Styles of Iranian Architecture and its Effe...IOSR Journals
During the history,different elements have been determined as influential factors affecting the
architecture in different areas. The historical events and political alterations as well as religious and
economical changes can directly lead to the architecture style. One of the historical countries with rich
architectural history that can be increasingly exposed to more alterations is Iran. In general the architecture
styles in Iran can be categorised in six groups. These groups can be divided in two periods before and after
Islam’s emergence in Iran. The “Parsi” and “Parti” architecture styles belong to the former period and
“Razi”, “Khorasani”, “Isfahani” and “Azari” were common in the latter period, after Islam. Such alterations
brought in a variety of architecture styles, in this country, due to theoretical alterations. Furthermore, some
novel architectural styles were resulted from a number of physical conditions which had also effects on the
theoretical architecture. The current research intends to put an emphasize on the alterations in materials used
in two historical periods of Iran, “Achaemenid” Empire (550–330 BCE) and The “Sassanid” Empire (224 CE
to 651 CE) resulting in the changes in Iranian architecture. It also aims to explore the differences and the
reasons of changes in the materials used for constructions and the influence that these changes had on the
architectural style in the above mentioned periods
Improving Sales in SME Using Internet MarketingIOSR Journals
Abstract : In Indonesia, SMEs are the backbone of the Indonesian economy. Number of SMEs until 2011 to
reach around 52 million. SMEs in Indonesia is very important for the economy because it accounts for 60% of
GDP and 97% of the workforce holds. But access is limited to financial institutions only 25% or 13 million
SMEs who have access to financial institutions. Indonesian government, SMEs, through the Department of
Cooperatives and SMEs, in each province or regency / city.
Although Small and Medium Enterprises (SMEs) is driving the nation's economy, but in reality many of
the problems SMEs are still entangled. The main thing to note is the ability of SMEs to access a wider market.
Because of the ability to change and adapt to a changing environment will determine the existence of small
businesses in the nation's economy. In the end, the existence of small businesses that have high competitiveness
will strengthen the nation's economy as a whole. Thus, in this study will use an appropriate technology tools
that can provide assistance in introducing products through internet and increase sales in each SME
This study uses a sample of students at the State University of Malang that can make a significant
contribution in the small and medium businesses that are being initiated by students.
Keywords: Small Medium Enterprise, Internet Marketing, Sales Improvement
An Efficient Approach for Requirement Traceability Integrated With Software R...IOSR Journals
Abstract: Traceability links between requirements of a system and its source code are helpful in reducing
system conception effort. During software updates and maintenance, the traceability links become invalid since
the developers may modify or remove some features of the source code. Hence, to acquire trustable links from a
system source code, a supervised link tracing approach is proposed here. In proposed approach, IR techniques
are applied on source code and requirements document to generate baseline traceability links. Concurrently,
software repositories are also mined to generate validating traceability links i.e. Histrace links which are then
called as experts. Now a trust model named as DynWing is used to rank the different types of experts. DynWing
dynamically assigns weights to different types of experts in ranking process. The top ranked experts are then fed
to the trust model named as Trumo. Trumo validates the baseline links with top ranked experts and finds the
trustable links from baseline links set. While validating the links, Trumo is capable of discarding or re-ranking
the experts and finds most traceable links. The proposed approach is able to improve the precision and recall
values of the traceability links.
Index Terms: Traceability, requirements, features, source code, repositories, experts.
Effect of Antioxidant status on liver following Atrazine exposure and its pro...IOSR Journals
The efficacy of Andrographis paniculata (AP) extract was studied on atrazine induced hepatic damage in rats. Ethanolic extract of AP (150mg/kg body weight) was found to protect the male wistar rats from hepato toxic action of atrazine as evidence by significant reduction in the level of lipid peroxidation and increased the antioxidant defense system activity in the atrazine intoxicated rats. However, AP treatment ameliorated the effects of atrazine suggesting it as potential antioxidant against atrazine induced oxidative stress.
“Comparitive Study of Prevalence of Hyperlactatemia in HIV / AIDS Patients re...IOSR Journals
Hyperlactatemia is one of the important metabolic abnormalities in HIV infected patients. The
prevalence of hyperlactatemia in natural course of HIV disease is approximately about 2%. Aim of this study is
to estimate the prevalence of hyperlactatemia in HIV patients receiving two antiretroviral regimens, advocated
by NACO by monitoring the plasma lactate levels. This study was taken up with 200 patients to compare the
prevalence of hyperlactatemia of two commonly used NACO regimens (zidovudine+ lamivudine+ nevirapine)
Vs (stavudine+ lamivudine+ nevirapine). The plasma lactate levels were estimated between 9th to 18thmonth
after initiation of antiretroviral therapy. The comparision and correlation between plasma lactate levels, CD4
counts and haemoglobin percentage in both regimens was done. There was statistically significant rise in the
plasma lactate levels (p<0.05) in both regimens. The increase in plasma lactate levels is more in stavudine
group compared to zidovudine group. There was low degree of positive correlation between plasma lactate and
haemoglobin in Stavudine group but negative correlation between Plasma lactate and CD4 counts in both
groups. More focus is needed on Pharmacovigilance of NRTIs induced hyperlactatemia especially Stavudine.
Electrophoretic Patterns of Esterases in Eri silkworm Samia Cynthia riciniIOSR Journals
The present study was carried out to investigate the patterns of esterase isozymes extracted from the silk gland, haemolymph and mid gut of Eri silkworm (Samia Cynthia ricini). The qualitative analysis of esterases was carried out by 7.5% of native Polyacrylamide Gel Electrophoresis (PAGE). The inhibitor sensitivity of the enzymes towards paraxon, eserine and pCMB was used to classify the individual zones of esterases. Three zones of esterases were observed in different tissues of Eri silkworm. Silk gland esterases were classified as CHsp (Cholinesterase like enzymes) esterases. The haemolymph and mid gut esterases were classified into Esdp (Enzyme inhibited by paraxon and pCMB).
Analytical Determination of Antihestamine drugs Pure and its pharmaceutical P...IOSR Journals
A quick and convenient method has been developed for the micro estimation of antihistamine drugs. 1-5 mg of sample is allowed to react with 10 ml of 0.02 M, N-bromosaccharin solution. Unconsumed reagent can be accurately titrated with 5 ml of 15% KI and 0.02N sodium thiosulphate solution using starch as indica-tor. SD and CV was calculated for reproducible and accurate result. The accuracy of the method is within + 1 % and possible course of reaction was suggested on the basis of stoichiometry as well as find reaction product.
The influence of Rolling process on the porosity and wear behavior of Spray-f...IOSR Journals
Spray forming, also called spray casting or spray deposition, is the inert gas atomization of a liquid metal stream into variously sized droplets. These droplets are interrupted by a substrate which collects and solidifies the droplets into coherent, near fully dense perform. The present work concerns with this techniques. This technology was applied to produce Al-6%Si-20%Pb alloys. The spray droplets were deposited over a copper substrate to achieve a disc shape perform. After spray deposition samples were rolled at room temperature on two high rolling mills and total porosity and wear characteristic of spray deposits were studies. The total porosity decreases with the increase in the percentage of reduction in thickness of the samples. Thickness of the samples in both middle and peripheral region. Wear testing of spray formed and rolled Al-Si-Pb alloy were investigated on a pin on disc type wear machine. Wear rate behavior with applied load and increase in percentage of reduction in thickness of samples was observed. Wear rate increased with increasing the load and decreased with increase in percentage of reduction in thickness of the sample.
Effective Leadership-Employee Retention-Work Life Balance: A Cyclical ContinuumIOSR Journals
It is an interactive paper which has been made to explain the association between leadership and its impact on employee’s work-life and employee retention. Both the expressions have gained a lot of magnitude in these day’s Organizations. Leadership has been taken up as a foundation in the study as it builds up the essence of our Organizations; Work-life balance has also been addressed as a basic issue for the employees as well the employers. The study undertaken tries to explain in a theoretical and a very interactive way how effective leadership can help balancing the work-life of employees and consecutively leads to help the Organization identify its quality employees and tap their efficiencies for a long-term through employee retention
QSAR studies of some anilinoquinolines for their antitumor activity as EGFR i...IOSR Journals
Quantitative Structure-Activity Relationship studies has been performed on some anilinoquinolines . A variety of parameters including 2D- autocorelation, RDF, 3D- MoRSE, WHIM and GETAWAY parameters have been chosen for modeling the antitumor activity of these compounds. The multiple regression analysis reveals that the seven –parametric model is the best for modeling the activity of the compounds under present study. This model has been tested by using cross validated parameters. The results are also discussed on the basis of ridge regression.
Analysis Of Lpg Cylinder Using Composite MaterialsIOSR Journals
This paper aims is innovation of alternative materials of Liquid petroleum gas (LPG). So, the finite
element analysis of Liquefied Petroleum Gas (LPG) cylinders made of Steel and Fiber Reinforced Plastic (FRP)
composites has been carried out. Finite element analysis of composite cylinder subjected to internal pressure is
performed. Layered shell element of a versatile FE analysis package ANSYS (version 11.0) has been used to
model the shell with FRP composites.
A number of cases are considered to study the stresses and deformations due to pressure loading inside the
cylinder. First, the results of stresses and deformation for steel cylinders are compared with the analytical
solution available in literature in order to validate the model and the software. The weight savings are also
presented for steel, Glass Fiber Reinforced Plastic (GFRP) composites LPG cylinders. Variations of stresses
and deformations throughout the cylinder made of steel and GFRP are studied.
Synthesis, Structure Investigation and Dyeing Assessment of Novel Bisazo Disp...IOSR Journals
Novel bisazo-disperse dyes were prepared by the coupling of diazotized solutions of various aromatic diamines with 2,4-dihydroxybenzophenone. The resultant bisazo disperse dyes were characterized by elemental analysis, IR and 1H NMR spectral studies. The UV Visible absorption spectral data were investigated in dimethylformamide. and are discussed in terms of structural property relationship. Their dyeing assessment of bisazo disperse dyes has been made on polyester fabrics. The results show that a better hue was obtained on polyester fabrics and have mild to moderate fastness properties.
This paper proposes an encryption-based image watermarking scheme for medical images using a
customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of
Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra
security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the
watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding,
an R-level discrete wavelet transform was applied to the host image.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. But thisadvantage is also accompanied with the disadvantage of modifying and misusing the valuable information through intercepting or hacking.So In order to transfer the data/image to the intended user at destination without anyalterations or modifications, there are many approaches like Cryptography, Watermarking and Steganography. This paper presents the general overview of image watermarking and different security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the message/logo into the image. This work has been implemented through MATLAB.
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. But thisadvantage is also accompanied with the disadvantage of modifying and misusing the valuable information through intercepting or hacking.So In order to transfer the data/image to the intended user at destination without anyalterations or modifications, there are many approaches like Cryptography, Watermarking and Steganography. This paper presents the general overview of image watermarking and different security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the message/logo into the image. This work has been implemented through MATLAB.
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
Digital Watermarking is the process of embedding data called watermark or signature or label or tag into a multimedia object (image or audio or video) so that the watermark can be extracted for ownership verification or authentication. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modification made to the pixel value is perceptually not noticed and it can be recovered only with an appropriate decoding mechanism. Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party.
Confidentiality of Electronic Health Record (EHR) and privacy are two important security requirements
for healthcare systems. Many devices on the EHR network utilize little or no encryption, which makes data
in transit vulnerable to exploitative attacks, such as Man-in-the-Middle and other filtration methods.
Recently, watermarking algorithms as an efficient response to these requirements is in the underline. In
this paper, we present a robust watermarking method conceived as part of an Electronic Health Record
platform. In this method a chaotic encryption and blind medical image watermarking technique was
incorporated into the system as an authorization mechanism to ensure confidentiality and integrity
of electronic health information. We present a hybrid watermarking method based on a combination of
discrete wavelet transform (DWT), hessenberg Decomposition (HD), Singular value decomposition (SVD)
and an original chaos crypto system based on the Arnold Transform (AT) of Singular Value
Decomposition. In order to spread the robustness of our algorithm and provide additional security, an
improved SVD-AT embedding and extraction procedure has been used to scramble the EHR data in the
preprocessing step of the proposed method.
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ijcsit
Confidentiality of Electronic Health Record (EHR) and privacy are two important security requirements
for healthcare systems. Many devices on the EHR network utilize little or no encryption, which makes data
in transit vulnerable to exploitative attacks, such as Man-in-the-Middle and other filtration methods.
Recently, watermarking algorithms as an efficient response to these requirements is in the underline. In
this paper, we present a robust watermarking method conceived as part of an Electronic Health Record
platform. In this method a chaotic encryption and blind medical image watermarking technique was
incorporated into the system as an authorization mechanism to ensure confidentiality and integrity
of electronic health information. We present a hybrid watermarking method based on a combination of
discrete wavelet transform (DWT), hessenberg Decomposition (HD), Singular value decomposition (SVD)
and an original chaos crypto system based on the Arnold Transform (AT) of Singular Value
Decomposition. In order to spread the robustness of our algorithm and provide additional security, an
improved SVD-AT embedding and extraction procedure has been used to scramble the EHR data in the
preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete
wavelet transform was applied to the host image. The low frequency wavelet coefficients are selected to
carry this scrambled-watermark. In extraction process, the stored used plain image is obtained from the
trusted authority server to complete the verification process. The receiver should compare the unsigned
watermark with the extracted watermark again. The verification can be done before clinical procedures
and diagnosis. The proposed watermarking method endures entirety attacks and rightly extracts the hidden
watermark without significant degradation in the image quality, thus, when the Peak Signal to Noise Ratio
(PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is performed.
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
Digital communication has seen exponential growth in the past decade.
Consequently, the security of digital data has become a field of extensive research since
piracy and unauthorized use of such data is prevalent because of the ease with which data
can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic
technique where decryption is done by an authorized user by simply overlaying the shares.
Thus, there is no requirement for complex computations unlike normal cryptography.
Though simple for an authorized user, it is equally difficult for an unauthorized user to
attack since the secret message can be deciphered if and only if all the shares are available
to the attacker. The probability of this is negligibly small since one of the shares usually
needs to be registered with a Certified Authority (CA). The procedure is non- intrusive and
does not alter the contents of the host image or video. For this reason, VC has been applied
to image watermarking widely. In case of video watermarking applications, robustness
against different types of attacks like frame attacks, spatial and temporal desynchronization
attacks, statistical analysis and collusion attacks need to be considered. Also creation of
shares for videos requires feature extraction techniques which are different from that of
images. Moreover, as size of video is more, a large secret payload can be used to construct a
share. In this survey paper, the research being carried out globally on VC techniques for
videos, along with their pros and cons have been highlighted. The paper also discusses
challenges in applying VC for video watermarking. Further, a performance comparison
amongst the mentioned schemes is also provided.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
Abstract :The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are unknown. One of the more interesting applications of BSS is in field of image data security/authentication where digital watermarking is proposed. Watermarking is a promising technique to help protect data security and intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here with their features and limitations. Thus literature survey is presented in two major categories-Digital image watermarking methods and BSS based techniques in digital image watermarking and extraction. Keywords – BSP, BSS, Mixing Coefficient, Digital Image Watermarking, Watermark Extraction.
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
Designing low cost and high speed authentication
solution for digital images is always an attractive area of
research in image processing. In past few years because of
widespread use of internet and network technology, concept
of information distribution has been become habit rather than
exception in daily life. In same aspects challenges involved
with distribution of authenticate information has been
increased manifolds. In this paper a generalize image
authentication method has proposed by hybridization of color
histogram and associated first four statistical moments to
achieve the objectives of low cost and high speed. Proposed
method can apply for both gray and color images having any
size and any format. Solution generates a very small
authentication code with an ease means which is use to analyze
the characteristics of received image from tampering
perspective.
Information security by biometric waterkingeSAT Journals
Abstract In the recent digital world information security, person identification and authentication, and network security are the prime implications and off course requirements. To fulfill the above requirement watermarking is used widely with biometric information i.e. face image, iris, fingerprint, signature, hand geometry, voice and key stroke pattern. We propose a method for securing and protecting the biometric information of any person with the help of watermarking. The security can also be improved with the help of secrete key. Now a day’s multimodal biometric watermarking is the most advanced technology for information security where more than one biometric information’s are combined for enhancing security and privacy of information and system. In this paper we used face image as the biometric information to be secured, iris image with specific size with key is used for security improvement. Index Terms: Watermarking, Biometric, Biometric watermarking
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
block diagram and signal flow graph representation
Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking Utilizing DWT and DCT
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 06-11
www.iosrjournals.org
www.iosrjournals.org 6 | Page
Enhancing Security of Multimodal Biometric Authentication
System by Implementing Watermarking Utilizing DWT and DCT
Dr. N. Chaudhary1
, Dr. D. Singh2
, D.Hussain3
1
(Professor, Computer Science and Engineering, College of Technology and Engineering, India)
2
(Assistant Professor, Computer Science and Engineering, College of Technology and Engineering, India)
3
(Computer Science and Engineering, College of Technology and Engineering, India)
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
I. INTRODUCTION
In this era of Information technology and electronic revolution, automatic access of individuals to
services is becoming vital. Authenticating the identity of an individual is a prerequisite for completion of all
commercial or personal transactions. Forgery and fraud can be prevented only if one establishes its identity with
certainty which is unattainable in case of traditional authentication methods that are either token based such as
ID Card ( that are likely to be lost, forged or stolen), or knowledge based such as passwords (which can be
forgotten). This has led in the emergence and formulation of a new technological area known as biometric
recognition, or simply stated as biometrics [1]. Biometrics is the science of asserting the identity of an individual
through physical assessment for example fingerprints, iris, hand geometry, face recognition etc. or behavioral
characteristic that include voice, gait recognition, keystroke scanning, signature-scan. The association of
biometric traits with the user is permanent and also these traits are unique for an individual and cannot be easily
modified and forged. Thus biometrics is believed to be a more reliable technology. Biometric authentication
systems have inherent advantages over traditional personal identification techniques [2]. However, the security
of biometrics data is preeminent and must be shielded from external invasion and tampering as they are not
endowed with security themselves [1]. It is therefore necessary to provide security to the biometric templates of
individuals at all times.
One way of addressing this issue is Encryption [3, 4]. Encryption does not contribute to the much
needed mutually integrated security and is ineffective once the data is decrypted after it is being transmitted over
the network. Cryptography uses methods of encryption to construct secure information. As cryptography and
encryption are not fully capable of providing security throughout the entire life of the work [4], digital
watermarking has emerged to fulfill this requirement. In biometric watermarking, a piece of information termed
as watermark, is embedded into the host image using a secret key, in such a way that the contents of the host
image are not modified to the extent that are perceptible to the Human Visual System (HVS).Further biometric
authentication systems based upon only one of the biometric modalities may not fulfill the requirements of
demanding applications in terms of universality, uniqueness, performance, acceptability, permanence,
collectability and circumvention. These factors paved a way for the development of multimodal biometric
authentication system. Multimodal biometric systems use more than one biometric trait in order to identify an
individual. These systems provide superior recognition rate in contrast to unimodal systems [5]. The biometric
modalities, such as fingerprint, face and iris are one of the most conventional and effective modalities [6].
2. Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking
www.iosrjournals.org 7 | Page
To enhance the security and performance of multimodal biometrics authentication system this paper targets
on watermarking face image with fingerprint image by using a robust watermarking scheme. Then comparing
the watermarked image and extracted image with the original images in order to prove that the watermarking
and extraction procedure does not affect the recognition capacity of the overall system.
This paper is formulated in the following manner: the background details related to the technique are
stated in Section II. The proposed robust watermarking algorithm for biometric images is described in Section
III. In Section IV the results are outlined to assess the significance of the proposed technique on the overall
performance of the system. And, conclusions of the scheme are drawn in Section V.
II. BACKGROUND
1. Watermarking
Watermarking [7,8,9] is the technique of embedding data into elements such as an image, video or
audio file for authentication purpose. The data which is embedded can later be detected and extracted from, the
elements for security reasons. A watermarking algorithm comprises of a watermark structure, an embedding
algorithm, and a detection or extraction algorithm. In most of the applications where security is necessary,
embedded watermark is required to be robust, invisible and should have a high capacity. Essentially watermarks
are used for the purpose of copyright protection i.e. identifying from where the content originated, tracing illegal
distribution of copies and undermining unauthorized access to content. The requirements for watermarks in
varied scenarios differ. Embedding a single watermark into the content at the source of distribution is sufficient
for identification of the origin of content [11]. To trace illegal copies, based on the identity or location of the
recipient in the network a unique watermark is required. Non-blind schemes are suitable for both these
application as watermark extraction or detection is required only when there is a dispute in context of the
ownership of content. Access control, is performed through semi-blind or blind schemes where the watermark
should be checked in all authorized consumer devices.
Recently, many watermarking schemes have been developed using the two most popular transforms
that are Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT). The generic model of
watermark embedding and extraction is shown in Fig. 1.
Fig.1: Model for Watermark embedding and extraction
In embedding module the host image is watermarked with the message image using a secret key and
embedding function. The watermarked image is stored in the database or transmitted over the network where
there is a possibility that it may be attacked. In the extraction module the watermarked image which might have
been attacked is fed to the extraction function along with the secret key and the watermark or message image is
extracted from it.
Discrete Wavelet Transform
The primary concept of DWT is that a one dimensional signal is divided into two parts one is high
frequency band and another is low frequency band. Then the low frequency band is further split into two parts
and the same process continues until the desired level is reached. For M*N 2-D images, applying DWT
corresponds to processing the image by 2-D filters in each dimension and results in the generation of four
M/2*N/2 coefficients. The filters divide the input image into four non-overlapping multi-resolution coefficient
sets, (LL1) a lower resolution approximation image as well as (HL1) horizontal high frequency band, (LH1)
vertical high frequency band and (HH1) diagonal high frequency band. The information of low frequency band
is an image close to the original image. In DWT decomposition, input signal must be a multiple of 2n
. Where, n
is equivalent to the number of levels. DWT provides sufficient information to analyze and synthesize the actual
signal and also requires less computation time. Fig. 2 shows the two-level DWT decomposition of an image.
3. Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking
www.iosrjournals.org 8 | Page
Fig.2: Two level DWT decomposition
Discrete Cosine Transform
In digital signal processing one of the most prevalent linear transformation functions is DCT. It
converts spatial or time domain signal to frequency domain and the image is transformed into a form of an even
function. In comparison to spatial domain techniques DCT techniques are more robust. Algorithms based on
DCT are robust against common image processing operations like adjustment, blurring, brightness, low pass
filtering, and contrast and so on. One-dimensional signals like speech waveforms can be processed with one
dimensional DCT. For analysis of 2D signals like images, we require 2-D DCT. The two-dimensional DCT of
any given matrix gives the frequency coefficients in form of another matrix. The lowest frequency coefficients
are represented at the Left topmost corner of the matrix while the highest frequency coefficients are represented
at the right bottom most corner of the matrix.
Formula for 2-D DCT:
F(m,n) =
Formula for 2-D inverse DCT:
F(i,j) =
Where,
Singular Value Decomposition
Singular Value Decomposition is an effective tool for image transformation and it is based on a
theorem from linear algebra which states that a rectangular matrix A can be divided into the product of three
matrices; U - an orthogonal matrix, S- a diagonal matrix, and V - the transpose of an orthogonal matrix. The
theorem is represented as:
A m*n= Um*m Sm*n VT
n*n
Where;
UT
U = I; VT
V = I;
The columns of U are orthonormal eigenvectors of AAT
,
The columns of V are orthonormal eigenvectors of AT
A, and
S is a diagonal matrix that contains the square roots of eigenvalues from U or V in descending order.
III. THE PROPOSED SCHEME
In the proposed scheme one biometric data is watermarked with another biometric data using SVD
based hybrid watermarking scheme. In the proposed scheme face image is used as the cover image or host
image which is watermarked using the fingerprint image. This hybrid watermarking technique is depicted
schematically as well as algorithmically.
1. Watermark Embedding Algorithm
Initially weinput the Cover image I and DWT is applied on the Cover image I which decomposes
image into four sub-bands LL, HL, LH and HH further DCT is applied to all the high frequency bands and SVD
is applied to all the high frequency bands to get the matrices SH1_I, SH2_I and SH3_I. Watermark image W is
given as input. DWT is applied on the Watermark image W which decomposes into four sub-bands LL1, HL1,
LH1 and HH1.DCT is applied to all high frequency bands further SVD is applied to all the higher frequency
bands and get the respective matrices.Utilizing the singular values of Watermark image the singular values of
4. Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking
www.iosrjournals.org 9 | Page
the cover image are modified.Modified SVD matrix is constructed. Inverse DCT is applied to all high frequency
bands then inverse DWT is applied to get the final watermarked image.
Fig. 3 shows the watermarking procedure schematically
Fig.3: Watermark embedding procedure
2. Watermark Extraction Algorithm
Input Watermarked image W_I.DWT is applied on the Watermarked image W_I; it decomposes image
into four sub-bands LL_W, HL_W, LH_W and HH_W. All high frequency bands are selected and DCT is
applied to all those bands. Then SVD is applied to all the high frequency bands to get the matrices SH1_WI,
SH2_WI and SH3_WI.SH1_WI, SH2_WI and SH3_WI are modified. Modified SVD matrix is
constructed.Inverse DCT is applied to all high frequency bands.Inverse DWT is applied to get the final extracted
watermark image.
Fig. 4 shows the watermark extraction procedure schematically
Fig. 4: Watermark extraction procedure
IV. IMPLEMENTATION AND RESULTS
Broadly, a watermarking algorithm can be assessed based on two parameters: imperceptibility and
robustness. The similarity or correlation between the original watermark and the Extracted watermark is
quantitatively measured by utilizing Normalized Cross-Correlation (NCC) [12].
The formula for Normalized Cross-Correlation (NCC) is
5. Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking
www.iosrjournals.org 10 | Page
NCC =
The value of Normalized Cross-Correlation lies between [-1, 1]. And greater NCC value means the
watermark is more robust [13,14]. Peak Signal to Noise Ratio (PSNR) is used in quantitatively analyzing the
concealing capacity of the algorithm. Peak Signal to Noise Ratio (PSNR) is defined as:
PSNR =
The unit is decibels (dB). The larger the value of PSNR is, the better the imperceptibility of
watermark.Performance of the algorithm is tested by simulating the experiment on MATLAB 2012a. 256x256
pixels of gray-level host image and watermark image are chosen for the purpose of simulation of the algorithm.
The original cover image, watermarked image and the extracted watermark images are shown in Fig.5.
Fig. 5: [A] Original cover and Watermark image [B] Watermarked image and Extracted watermark
The watermarked image resembles the original image in vision impression to a large extent. To the Human
Visual System there is no clearly visible difference between the two images. Thus, this algorithm hides
watermark very well. The PSNR of the original cover image and watermarked image is 46.041 dB, which is
considered a quite good value. Along with that, the NCC of the original watermark image and extracted
watermark is 0.9727, which shows that the two images are strongly correlated.
In order to test the robustness of the algorithm, it is tested under different types of attacks. The images on
which attacks have been applied are shown in Fig.7. The Extracted Watermark images along with their NCC
values are shown in Fig.6
Fig. 6: [A] watermarked images that are attacked [B] Extracted watermark with normalized cross
correlation
The simulation results show that the watermark image can be extracted well even after the watermarked
image is attacked. Simulation results indicate that this watermarking algorithm is robust against many common
attacks like adding salt noise, filter, image compression, sharp enhancing, image cutting and rotation.
V. CONCLUSION
This paper proposed a discrete wavelet transform (DWT) and discrete cosine transform (DCT) based
watermarking algorithm for biometric data. By using Singular Value Decomposition, watermarking signals are
embedded in the high frequency bands of wavelet transformation domain. And before the embedding procedure
is followed the watermark image is also transformed using both DWT and DCT. The simulation results prove
that this watermarking algorithm not only keeps the image quality well, but is also robust against many image
processing operations. This algorithm is very efficient in embedding signals and also anti-attack.
6. Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking
www.iosrjournals.org 11 | Page
REFERENCES
[1] A. K. Jain, U. Uludag, Hiding Biometric Data,IEEE Trans. Pattern Analysis and Machine Intelligence, 25(11), Nov. 2003, 1494 –
1498.
[2] A. K. Jain, A. Ross, and S. Prabhakar, An introduction to biometric recognition,IEEE Transactions on Circuits and Systems for Video
Technology,14(1),200,4-20.
[3] U. Uludag, S. Pankanti, S. Prabhakar, and A.K. Jain, Biometric cryptosystems: issues and challenges, Proceedings of IEEE, 92(
6),2004, 948-960.
[4] Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data,
Eurocrypt2004, 523-540.
[5] A.Nagar, K.Nandakumar, A. K.Jain, Multibiometric Cryptosystems Based on Feature-Level Fusion, IEEETrans. Inf. Forensics
Security, 7( 1), Feb. 2012, 255 – 268
[6] Z. huiming, Z.Huile, A technology of hiding fingerprint minutiae in image,Research & progress of solid state electronics, 26(2),2006,
197-200.
[7] C. I. Podilchuk and E. J. Delp, Digital Watermarking: Algorithms and Applications, IEEE Signal Processing Magazine, July 2001,
33-46.
[8] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking (Morgan Kaufmann Publishers, 2002).
[9] E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp, Advances in Digital Video Content Protection, Proceedings of the IEEE,
Special Issue on Advances in Video Coding and Delivery, 2004.
[10] G.C. Langelaar, I. Setyawan, R.I. Lagendijik, Watermarking digital image and video data, IEEE Signal Processing Magazine 17 (5)
2000, 20–46.
[11] N.F. Johnson, Z. Duric and S. Jajodia, Information Hiding, Steganography and Watermarking-Attacks and Counter Measures,
Kluwer academic publisher, 2003, 15-29.
[12] M. Nageshkumar , P.K. Mahesh , M. N. ShanmukhaSwamy, An Efficient Secure Multimodal Biometric Fusion Using Palmprint and
Face Image,IJCSI International Journal of Computer Science Issues, 2, Aug. 2009,49-53.
[13] J Jiang, A. Armstrong, Data hiding approach for efficient image indexing, Electronics letters. 7th, 38(23),2002, 1424- 1425.
[14] I.J .Cox, J.G. Linnartz, Some general methods for tampering with watermarks, IEEE Journal on Selected Areas in
Communications,16(4),1998, 587-593.