FINGERPRINT BASED IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 1
Abstract
A motivation for the use of Steganography techniques in biometric systems has been the need to provide increased security to the biometrics data themselves. Fingerprints are unique biometrics mainly used for the establishment of direct personal identity but they are at risk to accidental attacks. Protection of biometric data is one of the most important concerns these days and therefore it is gaining interest among researchers. Many security concerns are raised through the storing and transferring of biometric data, which is sensitive and may be impossible to recover if lost, counterfeited, or hacked.There are two possible domain for fingerprint based stgenography,Spatial domain and Transform domain.Transform based steganography provide more capacity, robustness and security. In transform Domain use discrete wavelet transform,it provide more robustness and capacity. In this Review paper describe about the Fingerprint based Steganography in transform domain.
Home Energy Management System Using Cloud Computing
[sup][/sup] Nothing runs without electricity at home or in industry. So providing a reliable supply of electrical power on demand is the important task of power generation plant. Growing populations are using incre...
DAB System Fine Time Synchronization for Rayleigh Channel
Synchronization is the key part of OFDM receivers. A method to estimate Fine Time Synchronization in DAB receiver in Rayleigh channel is based on analysis of phase reference symbol is given.
A Review on Dynamic Voltage Restorer (DVR) to Improve Power Quality
In distribution system the most common phenomena is voltage sag, in which will be effected on the different load mostly sensitive. Generally the custom power devices is An effective solution to mitigate The DVR is...
Optimization of Badarawa/Malali Water Distribution Network Using Genetics Algorithm
In this study EPANET, a widely used water distribution package was linked to OptiGa, a Visual Basic ActiveX control for implementation of genetic algorithm, through Visual Basic programming technique, to modify t...
Defending Online Password Hunch Attacks Using Persuasive Cued Click Points
Usable security has unique usability challenges because the need for security often means that standard humancomputer-interaction approaches cannot be directly applied. An important usability goal for authenticati...