Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking Utilizing DWT and DCT
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 1
Abstract
Conventional personal identification techniques for instance passwords, tokens, ID card and PIN codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal biometric recognition is not able to meet the performance requirements of the applications. According to recent trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the directions of improving the performance of biometric identification system by going multimodal and, increasing the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction and presented outcomes justifies the effectiveness of the scheme.
Authors and Affiliations
Dr. N. Chaudhary
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Mobile Ad-hoc Networks (MANETs) are special kind of wireless networks with no centralized control. They are ideal candidate for several real world applications where network need to be established on the fl...
Classifying Product Quality Depending on Online Aspect Reviews
Abstract:According to any individual living in today’s world what is the most important thing that one does before buying any product? Blindly we say that it’s checking out the number of online reviews about the product...
A Survey on Balancing the Network Load Using GeographicHash Tables
Abstract: The load Balancing in the network is a severe problem in network. The data created in wirelessnetwork is kept on node. It accessed over geographic hash table. The geographic hash table is used to recoverd...
An Integrated approach for color Image Segmentation using edge and color information
Image segmentation is a fundamental and complex task in many image processing applications. In this paper, we propose a hybrid method for color image segmentation by integrating color edge information and seede...
Passive Image Forensic Method to detect Copy Move Forgery in Digital Images
Abstract: Tampering in digital images has become very easy due to the availability of advanced image editing softwares to the users. Images are being tampered in a very efficient manner without leaving any visual c...