The document summarizes a research paper that proposes using fragile watermarking techniques to hide additional information in fingerprint images. This helps address vulnerabilities in biometric identification systems by allowing authentication of fingerprint image integrity. The proposed framework embeds watermarks in fingerprint templates during enrollment. During verification, watermarks are extracted to authenticate templates before matching. Experimental results show watermarks can be embedded with little quality impact and no effect on matching performance. The technique helps detect if templates are tampered with by unauthorized parties.
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...ijcisjournal
Securing data storage using biometrics is the current trend. Different physiological as well as behavioral biometrics like face, fingerprint, iris, Gait, voice etc.. is used in providing security to the data. The proposed work explains about the biometric encryption technology which will securely generate a digital key using two biometric modalities. Iris is encrypted using Fingerprint ID of 32-bit as the key in this work.
For encryption Blowfish algorithm is used and the encrypted template is stored in the database and one is given to the user. During the authentication time user input the template and the fingerprint. This template is then decrypted and verified with the original template taken from the database to check whether the user is genuine or an imposter. Hamming distance is used to measure the matching of the templates. CASIA Iris
database is used for experimentation and fingerprint images read through the R303 - fingerprint reader.
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...ijcisjournal
Securing data storage using biometrics is the current trend. Different physiological as well as behavioral biometrics like face, fingerprint, iris, Gait, voice etc.. is used in providing security to the data. The proposed work explains about the biometric encryption technology which will securely generate a digital key using two biometric modalities. Iris is encrypted using Fingerprint ID of 32-bit as the key in this work.
For encryption Blowfish algorithm is used and the encrypted template is stored in the database and one is given to the user. During the authentication time user input the template and the fingerprint. This template is then decrypted and verified with the original template taken from the database to check whether the user is genuine or an imposter. Hamming distance is used to measure the matching of the templates. CASIA Iris
database is used for experimentation and fingerprint images read through the R303 - fingerprint reader.
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
As data represent a key asset for today's organizations. The problem is that how to protect this data from
attackers, theft and misuse is at the forefront of any organization’s mind. Even though today several data
security techniques are available to protect database and computing infrastructure, many such as network
security and firewalls tools are unable to prevent attacks from insider. Insider is a person working in
organization who can try to access the sensitive data. This paper proposes a two-way authentication method
which fuses knowledge-based secret and personal trait information.
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention since its introduction in 1992. In this study, authentication system contained two parts: registration part and matching part. In both parts, iris image is used for personal identification. Localization of inner boundary only, extracted a region from the iris (without eyelashes problem), a feature vector is deduced from the texture of the image. The feature vector is used for classification of the iris texture, then it's treated by the hash function to produce the hash value (authentic value of a person). In matching part, produced hash value searched in the authorized person's database for taking a decision (success or fail) of the authentication. The method was evaluated on iris images takes from the CASIA iris image database version 1.0 [15]. The experimental results show that the vector extracted by the proposed method has very discriminating values that led to a recognition rate of over 100% on iris database. Also, authentication system is very accurate because it's used a secure method of authentication that iris-biometric and a hash function for avoiding stealing data from database.
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSIJNSA Journal
Current password authentication system was proven not secure enough to protect the information from intruders. However, various research has been done and the results show the value of FRR still low and the value of FAR still high. Thus, one of the methods suggests, is enhancing the current system using keystroke dynamics. Keystroke dynamics is a type of biometric authentication that does not require any special hardware, easy to use as the same routine as normal password authentication. Therefore, this research proposed an authentication system using keystroke dynamics to prevent the system from intruders. A system is developed that consist of two parts which are enrolment and verification. Then, a prototype is developed for testing process that consists of 3 main modules, namely Enrolment, Client/Server Connection
and, Verification and Retraining. Based on the testing, the system proved that the keystroke dynamic authentication system was able to implement in client/server environment and shows the value of EER is low that indicates it provide a better system authentication. In future, the system can be improved by enhancing the security, performance, and user interface.
An emerging approach to the problem of identity theft is represented by
the adoption of biometric authentication systems. Such systems however present
several challenges, related to privacy, reliability and security of the biometric data.
Inter-operability is also required among the devices used for authentication. Moreover,
very often biometric authentication in itself is not sufficient as a conclusive
proof of identity and has to be complemented with multiple other proofs of identity
such as passwords, SSN, or other user identifiers. Multi-factor authentication mechanisms
are thus required to enforce strong authentication based on the biometric
and identifiers of other nature.
In this paper we propose a two-phase authentication mechanism for federated
identity management systems. The first phase consists of a two-factor biometric
authentication based on zero knowledge proofs. We employ techniques from the
vector-space model to generate cryptographic biometric keys. These keys are kept
secret, thus preserving the confidentiality of the biometric data, and at the same
time exploit the advantages of biometric authentication. The second phase combines
several authentication factors in conjunction with the biometric to provide a
strong authentication. A key advantage of our approach is that any unanticipated
combination of factors can be used. Such authentication system leverages the information
of the user that are available from the federated identity management
system.
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
Protection has become one of the biggest fields of study for several years, however the demand for this is growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from any workstation to cloud, and though protection must be incredibly important all over. Throughout the past two decades, sufficient focus has been given to substantiation along with validation in the technology model. Identifying a legal person is increasingly become the difficult activity with the progression of time. Some attempts are introduced in that same respect, in particular by utilizing human movements such as fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech checker, and so on. A number of methods for effective iris detection have indeed been suggested and researched. A general overview of current and state-of-the-art approaches to iris recognition is presented in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and methodologies for the extraction of features are also discussed.
A novel multifactor authentication system ensuring usability and securityijsptm
User authentication is one of the most important part of information security. Computer security most
commonly depends on passwords to authenticate human users. Password authentication systems will be
either been usable but not secure, or secure but not usable. While there are different types of authentication
systems available alphanumeric password is the most commonly used authentication mechanism. But this
method has significant drawbacks. An alternative solution to the text based authentication is Graphical
User Authentication based on the fact that humans tends to remember images better than text. Graphical
password authentication systems provide passwords which are easy to be created and remembered by the
user. However, the main issues of simple graphical password techniques are shoulder surfing attack and
image gallery attack. Studies reveals that most of the graphical passwords are either secure but not usable
or usable but not secure. . In this paper, a new technique that uses cued click point graphical password
method along with the use of one-time session key is proposed. The goal is to propose a new authentication
mechanism using graphical password to achieve higher security and better usability levels. The result of
the system testing is evaluated and it reveals that the proposed system ensures security and usability to a
great extent.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
Detail information about the real time errors in the biometrics devices and also how to secure encryption keys. To make authentication systems more secure. In this seminar report describe about the combination of the biometrics with the cryptography. and also describe the methods that are used to handle the real time error like fault accept and fault reject and also describe their their rates.i,e FRR and FAR by the biometrics systems.
In most networks and distributed systems, security
has always been of a major concern and authentication is the core
issue as it provides protection from unauthorized use and ensures
proper functioning of the system. This paper investigates and
proposes DS-NIZKP, an approach for authenticating users by
three factors, (namely password, smart-card and biometrics)
based on the concept of Zero Knowledge Proof (ZKP), so that no
sensitive information can be revealed during a communication.
The proposal employs the concept of digital signature (DS) to
authenticate the identity of the sender or the signer within a
single communication. Given that DS employs asymmetric
encryption, a one-way hash of the user’s identity is created then
signed using the private key. Hashing prevents from revealing
information about the user while signing provides authentication,
non-repudiation and integrity. This approach not only saves time
since just a single message between the prover and the verifier is
necessary but also defends privacy of the user in distributed
systems.
Information security plays an important role in
governments. Its realm has been increased nowadays, especially
with resent viruses’ attacks in different governmental
organizations. The authentication is aspect of information
security, its current scheme used nowadays in the systems is
depend on the login by user name and password in addition to
one-time password or traditional secret questions, which in turn
is usually easy to predicate. This paper proposes enhanced
knowledge based authentication solution which ensures and
provides more security and usability levels for governmental
organizations.
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
As data represent a key asset for today's organizations. The problem is that how to protect this data from
attackers, theft and misuse is at the forefront of any organization’s mind. Even though today several data
security techniques are available to protect database and computing infrastructure, many such as network
security and firewalls tools are unable to prevent attacks from insider. Insider is a person working in
organization who can try to access the sensitive data. This paper proposes a two-way authentication method
which fuses knowledge-based secret and personal trait information.
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention since its introduction in 1992. In this study, authentication system contained two parts: registration part and matching part. In both parts, iris image is used for personal identification. Localization of inner boundary only, extracted a region from the iris (without eyelashes problem), a feature vector is deduced from the texture of the image. The feature vector is used for classification of the iris texture, then it's treated by the hash function to produce the hash value (authentic value of a person). In matching part, produced hash value searched in the authorized person's database for taking a decision (success or fail) of the authentication. The method was evaluated on iris images takes from the CASIA iris image database version 1.0 [15]. The experimental results show that the vector extracted by the proposed method has very discriminating values that led to a recognition rate of over 100% on iris database. Also, authentication system is very accurate because it's used a secure method of authentication that iris-biometric and a hash function for avoiding stealing data from database.
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSIJNSA Journal
Current password authentication system was proven not secure enough to protect the information from intruders. However, various research has been done and the results show the value of FRR still low and the value of FAR still high. Thus, one of the methods suggests, is enhancing the current system using keystroke dynamics. Keystroke dynamics is a type of biometric authentication that does not require any special hardware, easy to use as the same routine as normal password authentication. Therefore, this research proposed an authentication system using keystroke dynamics to prevent the system from intruders. A system is developed that consist of two parts which are enrolment and verification. Then, a prototype is developed for testing process that consists of 3 main modules, namely Enrolment, Client/Server Connection
and, Verification and Retraining. Based on the testing, the system proved that the keystroke dynamic authentication system was able to implement in client/server environment and shows the value of EER is low that indicates it provide a better system authentication. In future, the system can be improved by enhancing the security, performance, and user interface.
An emerging approach to the problem of identity theft is represented by
the adoption of biometric authentication systems. Such systems however present
several challenges, related to privacy, reliability and security of the biometric data.
Inter-operability is also required among the devices used for authentication. Moreover,
very often biometric authentication in itself is not sufficient as a conclusive
proof of identity and has to be complemented with multiple other proofs of identity
such as passwords, SSN, or other user identifiers. Multi-factor authentication mechanisms
are thus required to enforce strong authentication based on the biometric
and identifiers of other nature.
In this paper we propose a two-phase authentication mechanism for federated
identity management systems. The first phase consists of a two-factor biometric
authentication based on zero knowledge proofs. We employ techniques from the
vector-space model to generate cryptographic biometric keys. These keys are kept
secret, thus preserving the confidentiality of the biometric data, and at the same
time exploit the advantages of biometric authentication. The second phase combines
several authentication factors in conjunction with the biometric to provide a
strong authentication. A key advantage of our approach is that any unanticipated
combination of factors can be used. Such authentication system leverages the information
of the user that are available from the federated identity management
system.
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
Protection has become one of the biggest fields of study for several years, however the demand for this is growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from any workstation to cloud, and though protection must be incredibly important all over. Throughout the past two decades, sufficient focus has been given to substantiation along with validation in the technology model. Identifying a legal person is increasingly become the difficult activity with the progression of time. Some attempts are introduced in that same respect, in particular by utilizing human movements such as fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech checker, and so on. A number of methods for effective iris detection have indeed been suggested and researched. A general overview of current and state-of-the-art approaches to iris recognition is presented in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and methodologies for the extraction of features are also discussed.
A novel multifactor authentication system ensuring usability and securityijsptm
User authentication is one of the most important part of information security. Computer security most
commonly depends on passwords to authenticate human users. Password authentication systems will be
either been usable but not secure, or secure but not usable. While there are different types of authentication
systems available alphanumeric password is the most commonly used authentication mechanism. But this
method has significant drawbacks. An alternative solution to the text based authentication is Graphical
User Authentication based on the fact that humans tends to remember images better than text. Graphical
password authentication systems provide passwords which are easy to be created and remembered by the
user. However, the main issues of simple graphical password techniques are shoulder surfing attack and
image gallery attack. Studies reveals that most of the graphical passwords are either secure but not usable
or usable but not secure. . In this paper, a new technique that uses cued click point graphical password
method along with the use of one-time session key is proposed. The goal is to propose a new authentication
mechanism using graphical password to achieve higher security and better usability levels. The result of
the system testing is evaluated and it reveals that the proposed system ensures security and usability to a
great extent.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
Detail information about the real time errors in the biometrics devices and also how to secure encryption keys. To make authentication systems more secure. In this seminar report describe about the combination of the biometrics with the cryptography. and also describe the methods that are used to handle the real time error like fault accept and fault reject and also describe their their rates.i,e FRR and FAR by the biometrics systems.
In most networks and distributed systems, security
has always been of a major concern and authentication is the core
issue as it provides protection from unauthorized use and ensures
proper functioning of the system. This paper investigates and
proposes DS-NIZKP, an approach for authenticating users by
three factors, (namely password, smart-card and biometrics)
based on the concept of Zero Knowledge Proof (ZKP), so that no
sensitive information can be revealed during a communication.
The proposal employs the concept of digital signature (DS) to
authenticate the identity of the sender or the signer within a
single communication. Given that DS employs asymmetric
encryption, a one-way hash of the user’s identity is created then
signed using the private key. Hashing prevents from revealing
information about the user while signing provides authentication,
non-repudiation and integrity. This approach not only saves time
since just a single message between the prover and the verifier is
necessary but also defends privacy of the user in distributed
systems.
Information security plays an important role in
governments. Its realm has been increased nowadays, especially
with resent viruses’ attacks in different governmental
organizations. The authentication is aspect of information
security, its current scheme used nowadays in the systems is
depend on the login by user name and password in addition to
one-time password or traditional secret questions, which in turn
is usually easy to predicate. This paper proposes enhanced
knowledge based authentication solution which ensures and
provides more security and usability levels for governmental
organizations.
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
ABSTRACT: Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers
are focusing on how to provide security to the system, the template which was generated from the biometric need to be
protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to
the biometric template by generating a secure sketch by making use of multibiometric cryptosystem and which is stored in a
database. Once the biometric template is stolen it becomes a serious issue for the security of the system and also for user
privacy. In the existing approach, feature level fusion is used to combine the features securely with well-known biometric
cryptosystems namely fuzzy vault and fuzzy commitment. The drawbacks of existing system include accuracy of the biometric
need to be improved and the noises in the biometrics also need to be reduced. The proposed work is to enhance the security
using multibiometric cryptosystem in distributed system applications like e-commerce transactions, e-banking and ATM.
Keywords: Biometric Cryptosystem, Error correcting code, Fingerprint, Iris, Multibiometrics, Unimodal biometrics.
Antispoofing in face biometrics: A comprehensive study on software-based tech...CSITiaesprime
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric community's interest, motivating them to develop anti-spoofing techniques to secure it. Photo, video, or mask attacks can compromise face biometric systems (types of presentation attacks). Spoofing attacks are detected using liveness detection techniques, which determine whether the facial image presented at a biometric system is a live face or a fake version of it. We discuss the classification of face anti-spoofing techniques in this paper. Anti-spoofing techniques are divided into two categories: hardware and software methods. Hardware-based techniques are summarized briefly. A comprehensive study on software-based countermeasures for presentation attacks is discussed, which are further divided into static and dynamic methods. We cited a few publicly available presentation attack datasets and calculated a few metrics to demonstrate the value of anti-spoofing techniques.
Medical image encryption techniques: a technical survey and potential challen...IJECEIAES
Among the most sensitive and important data in telemedicine systems are medical images. It is necessary to use a robust encryption method that is resistant to cryptographic assaults while transferring medical images over the internet. Confidentiality is the most crucial of the three security goals for protecting information systems, along with availability, integrity, and compliance. Encryption and watermarking of medical images address problems with confidentiality and integrity in telemedicine applications. The need to prioritize security issues in telemedicine applications makes the choice of a trustworthy and efficient strategy or framework all the more crucial. The paper examines various security issues and cutting-edge methods to secure medical images for use with telemedicine systems.
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
IJERD (www.ijerd.com) International Journal of Engineering Research and Development
1. International Journal of Engineering Research and Development
e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 2, Issue 7 (August 2012), PP. 52-61
Hiding Additional Information in Fingerprint Images using Fragile
Watermarking Technique
Jitendra Kumar Gothwal1, Dr. Ram Singh2
1
Research Scholar, Department of Computer Sci. & Engg.,NIMS University,Jaipur,Rajasthan,India
2
Professor, Department of Computer Sci. & Engg. , Jaipur, Rajasthan, India
Abstract—One of the most emerging technologies for automatic people recognition is biometrics. The wide use of digital
media in these recent days has led to an increase of digital piracy and tampering especially for biometric identification system.
This work presents the concept of information hiding and one of its sub areas is called fragile image watermarking.
While the biometrics techniques offer a reliable method for personal identification, the problem of security and integrity
of the biometrics data is studied. This research work had proposed an architectural framework that will apply
information hiding method into biometric identification system. A fingerprint watermarking method has been used to
hide additional information into fingerprint images by changing the least significant bit value of a random chosen pixel
of the image. The embedded information can be extracted without referencing to the original image. The results show that
the fingerprint images are not being affected when the watermarking method is implemented. The performance of the
fingerprint authentication system is also not affected when the watermarked fingerprint images are used in the system. This
study can be use for image authentication especially to detect whether the image has been tampered by image processing such
as noise addition and blurring
Keywords— Biometrics, Information hiding, Fragile watermarking, Authentication system, Fingerprint
I. INTRODUCTION
Biometric methods for verifying, i.e. authenticating, someone’s identity are increasingly being used. Today’s
commercially available biometric systems show good reliability. The rapid development of digital information has also
generated several new opportunities for innovation and has enabled the consumer to create, manipulate and enjoy
multimedia data without any restriction. Despite the rapid growth of the digital information domain, the security and fair use
of the multimedia data, as well as fast delivery of the multimedia content to a variety of end users or devices are important
and yet challenging topics. Digital images had been widely used in various fields and areas. The worries of threats and
attacks that could be performed to digital images could decrease the integrity and reliability of the digital data.
A critical problem in a biometric system itself is to ensure the security of the unique biometric data, because once
the biometric templates are compromised, the whole authentication system is compromised. Therefore, how to protect the
biometric templates in the database and to secure transmission of the biometric templates through the open network is a vital
security issue in biometrics. Numerous efforts have been made in developing effective methods in these areas in order to
achieve an enhanced level of information security. There are two paramount issues in information security enhancement.
One is to protect the user possession and control the access to information by authenticating an individual’s identity. The
other is to ensure the privacy and integrity of information and to secure information communication. Biometrics,
cryptography and data hiding provide solutions to the above two issues from different perspectives [2].
Digital images had been widely used in various fields and areas in their applications such as medical, law
enforcement, business and government agencies. Despite the obvious progress and various uses of digital multimedia, these
developments carry with them a number of risks such as copyright violation, secret communication and data tampering.
The worries of threats and attacks that could be performed to the digital images could decrease the integrity and
reliability of the digital data. Realizing the ease of editing and reproduction in digital domain, the protection of ownership
and the prevention of unauthorized tampering of multimedia data such as digital images, digital audio and text document
have become important concerns.
Data hiding is aiming at private information protection, securing information transmission and digital rights
authentication. Besides using some encryption algorithms to encode the biometric data for protection, one of the major
reasons to take advantages of data hiding for biometric template protection is because data hiding complements
cryptography in secret information communication and integrity authentication. The most general scenario for the
information hiding is shown as the following figure 1.
Biometric-based Identification system, which use behavioural or physiological characteristics, are becoming
increasingly popular compared to traditional knowledge-based or token-based system such as identification card, passwords,
etc. One of the main reasons for this popularity is the ability of the biometric technology to differentiate between an
authorized person and an imposter who fraudulently acquires the access privileges of an authorized person. Biometric
identification system can be more convenient for the users since there is no password to be forgotten or key to be lost and
single biometric trait(e.g. fingerprint)an be used to access several accounts without the burden of remembering passwords.
But while biometric techniques are offer reliable method for personal identification, the problern of security and integrity of
52
2. Hiding Additional Information in Fingerprint Images using Fragile Watermarking Technique
the biometrics data poses the new issues. For example, one personal biometric data (fingerprint template, or fingerprint
features) is stolen, it is not possible to replace it as compared to a stolen identification card (ID), credit card or password [7].
Fig. 1: Scenario of Information hiding
Biometrics systems are vulnerable to attacks, which can decrease their security. The attacks had been analysed and
can be group into eight classes [11] [15]. One of them is attack on the template database (attack number 6 on Figure 2). The
unwanted user may modify or remove the existing template and also may add the new fingerprint image templates if they
manage to infiltrate the database.
In order to promote the wide spread utilization of biometric techniques, an increased security of biometric data,
especially fingerprint images, seems to be necessary. One possible solution to gratify this problem is by using fragile image
watermarking techniques which is one of the sub disciplines of watermarking techniques is information Hiding domain.
Watermarks have long been used for authentication and to prevent fraud and forgery. This technique will detect whether the
Biometric data had been altered or not and also can detect the originality of the data by retrieving back the watermark data
from the Biometric data.
For Biometric applications many researchers are not as interested in visible watermarks as invisible watermarks.
Invisible watermarks, as the name indicates, do not appear visually affect the data that they are embedded in .This method is
desired if one does not want to perceptually alter the image.
In this paper, we had proposed one of the information hiding techniques which is called fragile watermarking
techniques that will embed a secondary data into the fingerprint images to cater the vulnerability of the images. In this way,
the authenticity of the fingerprint images can be established.
Fig. 2 Vulnerabilities in a Biometric System (Adapted from [8])
II. PROPOSED METHOD
This research has proposed an architectural framework that will help to counter the vulnerability of the fingerprint
images in the database of fingerprint verification system from attack such as image tampering by unauthorized individual.
This architectural framework is the modification of the existed model of fingerprint verification system (Figure 3).
The typical system is proposed to be combined with an information hiding technique in order to enhance the security of the
fingerprint images.
53
3. Hiding Additional Information in Fingerprint Images using Fragile Watermarking Technique
Fig. 3 General Model of Fingerprint Verification System
It can be seen in figure 3, the safety of the fingerprint image stored in the database can be are vulnerable to some
attacks such as image tampering or image replacement. One of the main targets that attract the unwanted user to attack is the
insecure fingerprint image templates stored in the database (Katha, K. N. et al., 2001; Uludag, U, and Anil, K J., 2004). In
order to cater this problem, applying information hiding techniques into the system is necessary in order to authenticate the
originality of the fingerprint image in the system database. One of the possible methods to enhance the security of the
fingerprint template is by applying fragile image watermarking technique. This technique will work as a tamper proofing
medium to detect whether the fingerprint template is genuine or it has been modified by unwanted user
As can be seen in Figure 4, this research is proposing to apply a fragile image watermarking technique into the
general model of fingerprint verification system in order to enhance the security of the fingerprint templates in the database.
The whole process of the proposed framework can be seen in Figure 4.
Fig. 4 Proposed Framework of Applying Information Hiding into Fingerprint
Verification System
As shown in figure 4, this proposed architecture framework t will help to counter the vulnerability of the
fingerprint images in the database of fingerprint verification system from attack such as image tampering by unauthorized
individual. This architectural framework is the modification of the existed model of fingerprint verification system.
The below part of figure 4, is proposing to apply a fragile image watermarking technique into the general model of
fingerprint verification system in order to enhance the security of the fingerprint templates in the database. This framework
has been divided into four main phases which are fingerprint enrolment process, watermark encoding process, watermark
decoding process and fingerprint verification process.The framework of embedding and detecting fragile image watermark is
similar as the other watermarking system
54
4. Hiding Additional Information in Fingerprint Images using Fragile Watermarking Technique
FINGERPRINT ENROLLMENT PROCESS
The first phase of this framework is the fingerprint enrollment process. The enrollment process is shown in Figure
5 below.
Fig. 5 Fingerprint Enrollment Process
First, the fingerprint image of an individual is captured by the input device sensor and for this case a fingerprint
scanner had been used. The captured fingerprint will be the digital representation of the claimed individual. The data
captured during the enrollment process may or may not be supervised by the human depending on the application. The
further process will be the feature extraction process where a compact, but expressive representation template will be
generated. The template then will be stored into the database of the system and this database may be updated over time
WATERMARK ENCODING & DECODING PROCESS
For the second phase, the fingerprint image template is embedded with the additional information (watermark) to
protect the template from being tampered. In order to do this, a fragile image watermarking technique has been used. Figure
6 below shows the process of embedding the watermark data.
Fig. 6 The Watermark Encoding Process
First, the fingerprint template is taken out from the database where it will be embedded with a watermark data.
Before the embedding process, the watermark data is converted into a bit stream. Then a random number generator is
initialized with a secret key that will generate the pixel locations in the host image (fingerprint template) to watermark the
additional information. The additional information will be hidden in the fingerprint template and it will be imperceptible to
human visual system. After the embedding process, the watermarked fingerprint template will be stored back into the
database.
The watermark decoding process will be occurred in the third phase. This phase is done just before the fingerprint
matching process to authenticate the stored fingerprint template first before it will be used. This process will enhance the
security of the fingerprint verification system. Figure 7 shows the watermark decoding process.
55
5. Hiding Additional Information in Fingerprint Images using Fragile Watermarking Technique
Fig. 7 Watermark Decoding Process
The watermark decoding process will extract the watermark that is hidden in the fingerprint template. The secret
key is used to identify the pixel locations in the fingerprint template that has been used to embed the watermark data. The
presence of the watermark data will authenticate the genuineness of the fingerprint template. If the watermark data cannot be
extracted, this means that the fingerprint template may be tampered or added into the database by the unauthorized
individual. The recovered watermark data also can be used as the second source of authenticity either automatically or by
human in a supervised biometric application.
FINGERPRINT VERIFICATION PROCESS
The fourth phase of this framework will be the fingerprint verification process (Figure 8).
Fig. 8 The Fingerprint Verification Process
In this phase, the input device (fingerprint sensor) will capture the features of the fingerprint image whether
directly from the finger of the user or from the smart card and it is compared with the stored watermarked fingerprint
template to generate matching scores. The number of matching fingerprint minutiae between the input feature and the
fingerprint template image is determined and the matching score is reported either to accept or reject the individual.
III. EXPERIMENTAL RESULTS
There are two types of testing that have been done throughout the research process. The first test is the image
quality testing. The second test is the watermarked fingerprint performance tested in the verification system. The last testing
is watermark embedding capacity limit.
The first testing that has been done is the testing to evaluate the fingerprint image quality after the images were
embedded with watermark data. This testing is needed to be done because the quality of the fingerprint images is crucial
since the images will be used in the fingerprint verification system to compare the fingerprint minutiae for authentication
process.
56
6. Hiding Additional Information in Fingerprint Images using Fragile Watermarking Technique
12 digits if ID number in text format is used as the watermark data. Figure 9 shows the tested image and the ID
number of the owner used. Figure 10 shows the watermarked image and the extracted correct ID number. This testing was
able to embed 12 digits of ID number into the fingerprint image with capacity of around 14 to 16 kilobits of data. The
embedding process will change the pixels value of the fingerprint data and because of this, an image quality testing has to be
done to show the effects.
Fig. 9 Original fingerprint image and the Fig.10 Watermarked image and the extracted
watermarked data watermark data
In conducting an image quality test, the mathematical software (MATLAB r2OO6a) has been used to compare the
image quality between the original and the watermarked fingerprint templates by referring to the Mean Squared Error (MSE)
and Peak to Signal Noise Ratio (PSNR) of both images.
When computing MSE, the difference of the pixels is squared and the average is taken over the pixels in the image.
This parameter is essentially capturing the changes that have been done to the image due to the watermark embedding
process into the fingerprint template. The image that is perfectly produced from the original image will give the MSE
reading of zero, while the image that is greatly differ from the original image will have the large MSE.
PSNR is closely related to MSE as can be seen in the equation below. The MSE reading is needed in order to
produce the PSNR reading. PSNR is used to measure the invisibility of the embedded attributes (watermarked data) by
referring to the perceptual degradation of the image quality. A PSNR is expressed in decibels (dB). PSNR is related to the
mathematical equations of similarity between two images. The PSNR of an image will expectedly decreases as the
modification of the pixels increase due to the watermark embedding. The PSNR metric that corresponds to be acceptable
images for use in digital media has been estimated of range between 40dB to 50dB (P. M. George, A. H. Albert, S. G. Laszlo,
2003).
Their formulas are listed below:
Where F [i, j] and G [i, j] are the pixel values of the original and watermarked images at position (i, j) respectively;
(W, H) and (w, h) specify the widths and the heights of the tested image and the watermarked data, respectively (C. K. Yang,
2004),
This formula has been translated into MATLAB coding as below:
D is the difference of pixel value between the original and watermarked images (F & G). The reading outputs of
the process were taken and will be presented in the results and analysis topic. The MSE and PSNR reading outputs will be
presented in the table form.
The performance of watermarked fingerprint images also have been tested on biometric verification system
(Verifinger 4.2 Evaluation).The image similarity reading and total process time for verification process are taken and been
57
7. Hiding Additional Information in Fingerprint Images using Fragile Watermarking Technique
compared with the performance of the biometric identification system when using fingerprint images without watermarking
data.
Two tables that show the results will be produced as the output of the testing that will show the difference of the
performance in the fingerprint verification process.The results of the fingerprint image quality testing were presented as
shown in Table-I. The result is the output of the Peak to Signal Noise Ratio calculation done by using Matlab software.
TABLE – I: The MSE and PSNR of watermarked images compared to original images.
Images Embedded RGB Mean Squared Error Peak To Signal Noise
(BMP Format) Data Plane (MSE) Ratio
(ID Number) (PSNR)
R 2.1821 42.78
11101 510989675612 G 2.2135 42.99
B 1.8267 41.67
R 2.0091 41.72
11111 524578675721 G 2.3158 42.56
B 1.9813 41.28
R 2.0127 41.77
11121 531672883447 G 2.2753 42.46
B 1.8362 41.63
R 1.8785 41.88
11131 541216775125 G 2.0813 42.30
B 1.8782 41.89
R 2.1229 42.43
11141 554321754989 G 2.2991 42.57
B 1.9811 41.68
R 2.0273 42.18
11151 557123812711 G 2.3453 42.79
B 1.8792 41.87
R 2.1680 42.67
11161 561310457841 G 2.3273 42.96
B 1.8982 41.87
R 2.0293 42.11
11171 571115297124 G 1.8117 41.87
B 2.1803 42.23
R 1.9519 41.68
11181 585612881297 G 2.1898 42.49
B 1.9692 41.87
R 1.8819 41.98
11191 639125697701 G 2.0013 42.77
B 2.1372 42.99
R 1.9112 41.63
11211 641177687012 G 1.9533 41.78
B 1.9112 41.63
R 1.9347 41.78
11221 652475900142 G 2.0972 42.13
B 1.9002 41.24
R 1.8978 41.67
11231 656775513751 G 2.2659 42.89
B 1.9513 41.91
R 2.0578 42.43
11241 658114329811 G 2.0596 42.51
B 1.9761 41.97
R 1.8911 41.88
11251 661432768842 G 2.3547 42.59
B 1.8109 41.67
R 2.2660 42.54
11261 674457713265 G 2.2817 42.77
B 1.8956 41.76
R 2.0991 42.47
11271 680120013481 G 2.1890 42.59
B 2.0113 42.11
R 1.9112 41.89
11281 691375524092
G 2.1901 42.36
58
8. Hiding Additional Information in Fingerprint Images using Fragile Watermarking Technique
B 2.0723 42.17
R 1.8448 41.37
11291 718792464317 G 2.3892 42.79
B 1.9112 41.77
R 2.2576 42.41
11301 719245687144 G 2.0803 42.13
B 1.8796 41.62
R 1.9517 41.98
11311 721475342101 G 2.2649 42.87
B 2.2891 42.53
R 2.0923 42.78
11321 722577478904 G 2.2179 42.89
B 1.7986 41.52
R 2.2441 42.41
11331 725517650988 G 1.9764 41.86
B 1.8988 41.35
R 2.0917 42.57
11341 731427568814 G 1.9118 41.72
B 1.9002 41.51
R 2.1548 42.57
11351 741197724131 G 2.1787 42.89
B 1.8781 41.57
Table-I shows all the fingerprint templates that have been used for the testing. An ID number consist of 12 digits
has been embedded in the fingerprint images and will be used as the watermark data. By using the Mean Squared Error
(MSE) and Peak Signal to Noise Ratio (PSNR) equation, the MSE and PSNR results of each of the images have been
produced.
From table-I, we can see that all the PSNR values of the watermarked images are higher than 40dB with the
average reading of 42.14 dB red channel, 42.50 dB for green channel and 41.81 dB for blue channel. This means that all the
fingerprint images are still almost identical to the original one perceptually and only a small amount of pixels modification
has been done to embed the watermark data. In conclusions, the embedded watermark data will not obviously change the
pixel value of the fingerprint templates.
The results of the performance testing were presented in table-II and III shown below. These performance results
were taken by the Verification output and the result of the process were done by the Verifmger 4.2 software.
TABLE-II : Fingerprint verification output process between original and watermarked images
Images
(BMP Verification Process Image Similarity Total Process Time
Format)
11101 Successful 1267 1s 417ms
11111 Successful 1265 1s 571ms
11121 Successful 1266 1s 405ms
11131 Successful 1257 1s 271ms
11141 Successful 1272 1s 403ms
11151 Successful 1278 1s 329ms
11161 Successful 1278 1s 330ms
11171 Successful 1276 1s 356ms
11181 Successful 1223 1s 317ms
11191 Successful 1213 1s 352ms
11211 Successful 1213 1s 399ms
11221 Successful 1155 1s 387ms
11231 Successful 927 1s 393ms
11241 Successful 1278 1s 399ms
11251 Successful 1276 1s 405ms
11261 Successful 1262 1s 417ms
11271 Successful 1182 1s 403ms
11281 Successful 1274 1s 356ms
11291 Successful 1278 1s 355ms
11301 Successful 1271 1s 423ms
11311 Successful 1276 1s 327ms
11321 Successful 1277 1s 399ms
11331 Successful 1277 1s 399ms
59
9. Hiding Additional Information in Fingerprint Images using Fragile Watermarking Technique
11341 Successful 1276 1s 397ms
11351 Successful 1271 1s 401ms
Table-III: Fingerprint Verification output process between two original images
Images
(BMP Verification Process Image Similarity Total Process Time
Format)
11101 Successful 1267 1s 390ms
11111 Successful 1268 1s257ms
11121 Successful 1262 1s 307ms
11131 Successful 1257 1s 327ms
11141 Successful 1272 1s 383ms
11151 Successful 1278 1s 345ms
11161 Successful 1278 1s 302ms
11171 Successful 1276 1s 368ms
11181 Successful 1223 1s 227ms
11191 Successful 1213 1s 336ms
11211 Successful 1213 1s 323ms
11221 Successful 1155 1s 256ms
11231 Successful 927 1s 271ms
11241 Successful 1278 1s 306ms
11251 Successful 1276 1s 317ms
11261 Successful 1262 1s 302ms
11271 Successful 1179 1s 299ms
11281 Successful 1274 1s 278ms
11291 Successful 1278 1s 321ms
11301 Successful 1271 1s 298ms
11311 Successful 1273 1s 213ms
11321 Successful 1277 1s 217ms
11331 Successful 1277 1s 253ms
11341 Successful 1276 1s 279ms
11351 Successful 1271 1s 307ms
From table-II and table-III, we can see that the time taken for the identification process is not more than 2 seconds
and this concludes that when the watermarked fingerprint images are used, it will not affect the standard time for verification
process of the biometric identification system.
The comparison of image similarity reading is also presented in figure 11. From the bar chart, we can see that the
image similarity readings are the same on almost images. Only three fingerprint images (11111 .bmp, 11121 .bmp and
11271 .bmp) shows a slightly differences of less than 4 units of similarity. These show that the similarity reading
performance of the biometric identification system will not be affected when using the watermarked fingerprint images
comparing to the fingerprint images that didn't use the watermarking method.
Fig. 11 Comparison of image similarity between original and watermarked fingerprint Images
60
10. Hiding Additional Information in Fingerprint Images using Fragile Watermarking Technique
IV. CONCLUSION
A fragile image watermarking method for fingerprint images, in which we entered additional information into fingerprints, is
described. The watermark data, which consist of the identification number, can be used in authenticating the host fingerprint
image. The results show that the image quality if the fingerprint images are not being affected when proposed watermarking
method is implemented. The performance on the recognition or retrieval accuracy of a personal identification system is also
not affected when watermarked fingerprint images are used in the system. This proposed method hopefully can be used for
image authentication to identify whether the image has been tampered by various image processing attacks such as noise
addition and cropping.
REFERENCES
[1]. Pfitzmann, “Information Hiding Terminology,” Proc. First Int’l Workshop Information Hiding, Lecture Notes in Computer
Science No. 1,174, Springer-Versa, Berlin, 1996, pp. 347-356.
[2]. Geruta, K. Rene.,”Information Hiding on Wavelet Based Schemes under Consideration of Jpeg2000”, University of Rostock,
Department of Computer Science, Institute of Computer Graphics, 2001.
[3]. George P. M , Albert A. H. , Laszlo S. G. (2003). “Peak Signal to Noise Ratio Performance Comparison of JPEG and JPEG2OOO for
Various Medical Image Modalities.” Symposium on Computer Applications.
[4]. Katha K. N., Jonathan H. C., & Ruud M. B. (2001). An Analysis of Minutiae Matching Strength. Proceedings of Third
International Conference on Audio- and Video-Based Biometric Person Authentication, pp. 223-228.
[5]. C. K Yang, C. S. Huang (2004) "A Novel Watermarking Techniques For Tampering Detection in Digital images" Electronic Letters on
Computer Vision and Image Analysis 3, (pp. I-'12).
[6]. Uludag U., & Anil K. J. (2004). Attacks on Biometrics System: A Case Study in Fingerprints. Proc. SPIE-El 2004, Security,
Steganography and Watermarking of Multimedia contents VI, pp. 622-633.
[7]. Bounkong, S., Toch, B., Saad, D. and Lowe, D. (2003) “ICA for Watermarking Digital Images”, Journal of Machine Learning
Research, Pp. 1471-1498.
[8]. A. K. Jain and U. Uludag, “Hiding biometric data”, EEE Trans. Pattern Anal. Machine. Intelligence, 25, No. 11, pp. 1493-1498,
2003.
[9]. M.A. Suhail and M.S. Obaidat, “Digital Watermarking-based DCT and JPEG model”, IEEE Trans. On Instrumentation and
Measurement, Vol 52, No. 5, October 2003
[10]. Jain A.K, Ross Arun and Uludag.U. “Biometrics Template security: Challenges and solutions” in Proc. of European Signal
Processing Conference September 2005.
[11]. N. Johnson and S. Jajodia “Exploring Steganography: Seeing the Unseen", IEEE Computer, 1998, pp. 26-34.
[12]. M. Yeung and S. Pankanti, “Verification watermarks on fingerprint recognition and retrieval,” in Proc. SPIE, Security and
Watermarking of Multimedia Contents, vol. 3657, pp. 66–78, (San Jose, USA), January 1999.
[13]. Elliott, S.J.; Massie, S.A.; Sutton, M.J. “The Perception of Biometric Technology: A Survey” Automatic Identification Advanced
Technologies, 2007 IEEE Workshop on Volume, Issue, 7-8 June 2007 Page(s): 259 – 264.
[14]. N. K. Ratha, J. Connell, R. M. Bolle, and S. Chikkerur: Cancelable Biometrics: A Case Study in Fingerprints. Proceedings of the
18th International Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, Hong Kong, China. ICPR (4) 2006: 370-
373
[15]. U. Uludag, B. Gunsel, and M Dalian "Aspatial method for watermarking of fingerprint images" Proc. First Inti. Workshop on
Pattern Recognition in Information Systems, Setubal, Portugal, 2001, pp. 26-33.
61