Multibiometric Watermarking with Compressive Sensing Theory Techniques and Applications /

This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sen...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Thanki, Rohit M. (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Dwivedi, Vedvyas J. (http://id.loc.gov/vocabulary/relators/aut), Borisagar, Komal R. (http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Σειρά:Signals and Communication Technology,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04227nam a2200601 4500
001 978-3-319-73183-4
003 DE-He213
005 20200215003535.0
007 cr nn 008mamaa
008 180103s2018 gw | s |||| 0|eng d
020 |a 9783319731834  |9 978-3-319-73183-4 
024 7 |a 10.1007/978-3-319-73183-4  |2 doi 
040 |d GrThAP 
050 4 |a TK5102.9 
050 4 |a TA1637-1638 
072 7 |a TTBM  |2 bicssc 
072 7 |a TEC008000  |2 bisacsh 
072 7 |a TTBM  |2 thema 
072 7 |a UYS  |2 thema 
082 0 4 |a 621.382  |2 23 
100 1 |a Thanki, Rohit M.  |e author.  |0 (orcid)0000-0002-0645-6266  |1 https://orcid.org/0000-0002-0645-6266  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Multibiometric Watermarking with Compressive Sensing Theory  |h [electronic resource] :  |b Techniques and Applications /  |c by Rohit M. Thanki, Vedvyas J. Dwivedi, Komal R. Borisagar. 
250 |a 1st ed. 2018. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2018. 
300 |a XXI, 172 p. 104 illus., 48 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Signals and Communication Technology,  |x 1860-4862 
505 0 |a Chapter 1. Introduction -- Chapter 2.Related Works and Background Information -- Chapter 3.Issues in Biometric System and Proposed Research Methodology -- Chapter 4.Multibiometric Watermarking Technique using Discrete Wavelet Trans-form (DWT) -- Chapter 5. Multibiometric Watermarking Technique using Discrete Cosine Trans-form (DCT) and Discrete Wavelet Transform (DWT) -- Chapter 6.Multibiometric Watermarking Technique using Discrete Wavelet Trans-form (DWT) and Singular Value Decomposition (SVD) -- Chapter 7.Multibiometric Watermarking Technique using Fast Discrete Curvelet Transform (FDCuT) and Discrete Cosine Transform (DCT) -- Chapter 8.Conclusions and Future Work. 
520 |a This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports. 
650 0 |a Signal processing. 
650 0 |a Image processing. 
650 0 |a Speech processing systems. 
650 0 |a Computational linguistics. 
650 0 |a Natural language processing (Computer science). 
650 0 |a Database management. 
650 1 4 |a Signal, Image and Speech Processing.  |0 http://scigraph.springernature.com/things/product-market-codes/T24051 
650 2 4 |a Computational Linguistics.  |0 http://scigraph.springernature.com/things/product-market-codes/N22000 
650 2 4 |a Natural Language Processing (NLP).  |0 http://scigraph.springernature.com/things/product-market-codes/I21040 
650 2 4 |a Database Management.  |0 http://scigraph.springernature.com/things/product-market-codes/I18024 
700 1 |a Dwivedi, Vedvyas J.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Borisagar, Komal R.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319731827 
776 0 8 |i Printed edition:  |z 9783319731841 
776 0 8 |i Printed edition:  |z 9783319892399 
830 0 |a Signals and Communication Technology,  |x 1860-4862 
856 4 0 |u https://doi.org/10.1007/978-3-319-73183-4  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647)