Iris Data Hiding, Encoding By Using Huffman Coding DWT, SVD Scheme Authenticated By Multi SVM
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
As the technology advances in day to day life, the process of illegal data copies are producing by miscreants with ease. Various techniques are introducing to protect the copy right data from the miscreants. One such technique is digital watermarking, where the data is kept secret using invisible watermarking. In this study, method of watermarking on digital images used to kept copy right data of iris for authentication. The iris biometric system is constructing on the following basis, the iris template is generated through normalisation process or converting the iris image into polar form from spatial form and converted to binary image using xor bit process. Then the watermarking process using SVD and DWT combination to protect the data that is copy right one which is a binary image from various attacks. The extracted iris binary template will under goes MULTI SVM process with RBF kernel function with an accuracy of 98.75%.
Authors and Affiliations
A Rajarajeswari, B Ravi
(NCECD) A Novel Data Distribution Scheme for VoD Services in P2P Networks
Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks However has been limited b...
Recent Issues and Its Quick Fixes for Various Data Repositories
The aim of this study was to assess the issues and their quick fixes of databases. But the database accuracy has a trickle down effect in most implementations. This paper proposes the overall guidance about the techni...
Evaluation of A Prototype ATPG System Using Rulesets From The Stanford And Internet2 Backbones
The most important sources of transparency for ATPG (Automatic Test Packet Generation) are polling the network periodically for forwarding state and performing all pair’s reachability. First we have freshly speeded u...
Inter Transactional Association Rule Mining using Boolean Matrix
One of the extensions of the data mining is Temporal data mining, which mines or discovers knowledge and patterns from temporal information which includes time attribute analysis. From the various types of temporal...
Proposed mobility hub at Trivandrum
Based on the goal of reducing the usage of private vehicles thus reducing the vehicular trips, congestion, pollution etc. we proposed a Mobility Hub, is a principal focal point that links all public transportation servi...