Affiliation:
1. University of Delhi, India
Abstract
Presented is an efficient watermarking scheme using Particle Swarm Optimization (PSO) to watermark host fingerprint images with their corresponding facial images in the Discrete Cosine Transform (DCT) domain. PSO is used to find the best DCT coefficients’ locations in the host image where the facial image data can be embedded, so that the distortion produced in the host image is minimum. The objective function for PSO is formulated in terms of the Structural Similarity Index (SSIM) and the Orientation Certainty Level Index (OCL) so as to base it on the simple visual effect of the human visual perception capability and correct minutia prediction ability. The results exhibit better watermarked image quality while retaining the feature set of the original fingerprint. Moreover, the proposed technique is robust so that the extraction of watermark is possible even after the watermarked image is exposed to attacks. As a result, at the receiver’s end, the watermarked fingerprint image and the extracted facial image can be verified for a secure and accurate biometric based personal authentication.
Reference44 articles.
1. Fingerprint image: pre- and post-processing
2. Aslantas, V., Dogan, L., & Ozturk, S. (2008, April). DWT-SVD based image watermarking using particle swarm optimizer. In Proceedings of the International Conference on Multimedia and Expo, Hannover, Germany (pp. 241-244).
3. Aslantas, V., Ozer, S., & Ozturk, S. (2008). A novel fragile watermarking based on particle swarm optimization. In Proceedings of the International Conference on Multimedia and Expo (pp. 268-272).
4. Bajaj, R., Bedi, P., & Pal, S. K. (2010). Best hiding capacity scheme for variable length messages using particle swarm optimization. In B. K. Panigrahi, S. Das, P. N. Suganthan, & S. S. Dash (Eds.), Proceedings of First International Conference on Swarm, Evolutionary, and Memetic Computing (LNCS 6466, pp. 230-237).
5. Effective morphological extraction of true fingerprint minutiae based on the hit or miss transform.;R.Bansal;International Journal of Biometrics and Bioinformatics,2010
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing Biometrics Using Watermarking;Human-Computer Interaction
2. Securing Biometrics Using Watermarking;Research Developments in Biometrics and Video Processing Techniques