Multibiometric Watermarking with Compressive Sensing Theory

Multibiometric Watermarking with Compressive Sensing Theory PDF Author: Rohit M. Thanki
Publisher: Springer
ISBN: 3319731831
Category : Technology & Engineering
Languages : en
Pages : 189

Book Description
This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.

Multibiometric Watermarking with Compressive Sensing Theory

Multibiometric Watermarking with Compressive Sensing Theory PDF Author: Rohit M. Thanki
Publisher: Springer
ISBN: 9783319731827
Category : Technology & Engineering
Languages : en
Pages : 172

Book Description
This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.

Digital Image Watermarking

Digital Image Watermarking PDF Author: Surekha Borra
Publisher: CRC Press
ISBN: 0429751575
Category : Computers
Languages : en
Pages : 175

Book Description
The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware implementation of watermarking Discusses optimization problems and solutions in watermarking with a special focus on bio-inspired algorithms Includes a case study along with its MATLAB code and simulation results

Computing Science, Communication and Security

Computing Science, Communication and Security PDF Author: Nirbhay Chaubey
Publisher: Springer Nature
ISBN: 9811566488
Category : Computers
Languages : en
Pages : 354

Book Description
This book constitutes revised selected papers of the First International Conference on Computing Science, Communication and Security, COMS2 2020, held in March 2020. Due to the COVID-19 pandemic the conference was held virtually. The 26 full papers and 1 short paper were thoroughly reveiwed and selected from 79 submissions. Papers are organised according to the topical sections on artificial intelligence and machine learning; network, communication and security; computing science.

Hybrid and Advanced Compression Techniques for Medical Images

Hybrid and Advanced Compression Techniques for Medical Images PDF Author: Rohit M. Thanki
Publisher: Springer
ISBN: 3030125750
Category : Technology & Engineering
Languages : en
Pages : 107

Book Description
This book introduces advanced and hybrid compression techniques specifically used for medical images. The book discusses conventional compression and compressive sensing (CS) theory based approaches that are designed and implemented using various image transforms, such as: Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), and Singular Value Decomposition (SVD) and greedy based recovery algorithm. The authors show how these techniques provide simulation results of various compression techniques for different types of medical images, such as MRI, CT, US, and x-ray images. Future research directions are provided for medical imaging science. The book will be a welcomed reference for engineers, clinicians, and research students working with medical image compression in the biomedical imaging field. Covers various algorithms for data compression and medical image compression; Provides simulation results of compression algorithms for different types of medical images; Provides study of compressive sensing theory for compression of medical images.

Handbook of Multimedia Information Security: Techniques and Applications

Handbook of Multimedia Information Security: Techniques and Applications PDF Author: Amit Kumar Singh
Publisher: Springer
ISBN: 303015887X
Category : Computers
Languages : en
Pages : 798

Book Description
This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.

Artificial Intelligence for Sustainable Energy

Artificial Intelligence for Sustainable Energy PDF Author: Jimson Mathew
Publisher: Springer Nature
ISBN: 9819998336
Category :
Languages : en
Pages : 413

Book Description


Advances in Signal Processing and Intelligent Recognition Systems

Advances in Signal Processing and Intelligent Recognition Systems PDF Author: Sabu M. Thampi
Publisher: Springer
ISBN: 3319286587
Category : Technology & Engineering
Languages : en
Pages : 711

Book Description
This Edited Volume contains a selection of refereed and revised papers originally presented at the second International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS-2015), December 16-19, 2015, Trivandrum, India. The program committee received 175 submissions. Each paper was peer reviewed by at least three or more independent referees of the program committee and the 59 papers were finally selected. The papers offer stimulating insights into biometrics, digital watermarking, recognition systems, image and video processing, signal and speech processing, pattern recognition, machine learning and knowledge-based systems. The book is directed to the researchers and scientists engaged in various field of signal processing and related areas.

Advanced Techniques for Audio Watermarking

Advanced Techniques for Audio Watermarking PDF Author: Rohit M. Thanki
Publisher: Springer
ISBN: 3030241866
Category : Technology & Engineering
Languages : en
Pages : 113

Book Description
This book provides information on digital audio watermarking, its applications, and its evaluation for copyright protection of audio signals – both basic and advanced. The author covers various advanced digital audio watermarking algorithms that can be used for copyright protection of audio signals. These algorithms are implemented using hybridization of advanced signal processing transforms such as fast discrete curvelet transform (FDCuT), redundant discrete wavelet transform (RDWT), and another signal processing transform such as discrete cosine transform (DCT). In these algorithms, Arnold scrambling is used to enhance the security of the watermark logo. This book is divided in to three portions: basic audio watermarking and its classification, audio watermarking algorithms, and audio watermarking algorithms using advance signal transforms. The book also covers optimization based audio watermarking. Describes basic of digital audio watermarking and its applications, including evaluation parameters for digital audio watermarking algorithms; Provides audio watermarking algorithms using advanced signal transformations; Provides optimization based audio watermarking algorithms.

Intelligent Data Security Solutions for e-Health Applications

Intelligent Data Security Solutions for e-Health Applications PDF Author: Amit Kumar Singh
Publisher: Academic Press
ISBN: 012819538X
Category : Computers
Languages : en
Pages : 342

Book Description
E-health applications such as tele-medicine, tele-radiology, tele-ophthalmology, and tele-diagnosis are very promising and have immense potential to improve global healthcare. They can improve access, equity, and quality through the connection of healthcare facilities and healthcare professionals, diminishing geographical and physical barriers. One critical issue, however, is related to the security of data transmission and access to the technologies of medical information. Currently, medical-related identity theft costs billions of dollars each year and altered medical information can put a person’s health at risk through misdiagnosis, delayed treatment or incorrect prescriptions. Yet, the use of hand-held devices for storing, accessing, and transmitting medical information is outpacing the privacy and security protections on those devices. Researchers are starting to develop some imperceptible marks to ensure the tamper-proofing, cost effective, and guaranteed originality of the medical records. However, the robustness, security and efficient image archiving and retrieval of medical data information against these cyberattacks is a challenging area for researchers in the field of e-health applications. Intelligent Data Security Solutions for e-Health Applications focuses on cutting-edge academic and industry-related research in this field, with particular emphasis on interdisciplinary approaches and novel techniques to provide security solutions for smart applications. The book provides an overview of cutting-edge security techniques and ideas to help graduate students, researchers, as well as IT professionals who want to understand the opportunities and challenges of using emerging techniques and algorithms for designing and developing more secure systems and methods for e-health applications. Investigates new security and privacy requirements related to eHealth technologies and large sets of applications Reviews how the abundance of digital information on system behavior is now being captured, processed, and used to improve and strengthen security and privacy Provides an overview of innovative security techniques which are being developed to ensure the guaranteed authenticity of transmitted, shared or stored data/information