A modify fingerprint watermarking to improve Security in Wireless Networks

Publish Year: 1394
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,026

This Paper With 16 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ITCC01_179

تاریخ نمایه سازی: 9 فروردین 1395

Abstract:

This paper has aimed to explore a biometric method to secured wireless communications. Briefly, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint. First is the enrolment phase by which the database of watermarked is created and sending it to the server through wireless medium. Later is the verification stage at which claimed users are verified against the database, and it includes of five steps.In order to implement fingerprint watermarking, i.e. incorporating the memorable term as a watermark message into the fingerprint image, an algorithm of five phases has been developed. The first three novel phases having to do with the fingerprint image enhancement have been followed with further two steps for embedding phase, and extracting the watermark into the enhanced fingerprint image utilizing Discrete Wavelet Transform (DWT).

Authors

Alireza Farhang

Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran

Hassan Rashidi Heram Abadi

Department of Mathematics and Computer Science, Allameh Tabataba'i University, Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Intern ational Conference _ Informati _ Technol _ Comnnter _ ...
  • Intern ational Conference _ Informati _ Technol _ Comnnter _ ...
  • new approach to pre-processing digital image for wavelet-based 4Aه [23] ...
  • C. Gabriel and et al, "A Perspective of State -of-the-Art ...
  • D. Miller, B. Fauve, "Mobile e-commerct to drive voice-based authentication ...
  • C. T. Huang, J. M. Chang, "Responding to security issues ...
  • Y. Ding, A .Ross, _ comparison of imputation methods for ...
  • H. M. Sim and et al, "Multimodal biometrics: Weighted Score ...
  • W. J. Wong and et al" Enhanced multi-line code for ...
  • D.S. Guru, H.N. Prakash, "Fingerprint template protection with minutiae -based ...
  • C. Li, C. C. Lee, _ novel user authentication and ...
  • D. Fan and et al, ":A Novel Probabilistic Model Based ...
  • R. Giot, C. Rosenberger, "Genetic programming for multibiometro s", Expert ...
  • M. Heenaye, M. Khan, _ Multimodal Hand Vein Biometric based ...
  • R. Giot and et al, :Fast computation of the performance ...
  • M. Khitrov, "Talking passwords: voice biometrics for data acces and ...
  • K. Zebbiche, F. Khelifi, "Region-Based Watermarking of Biometric Images: Case ...
  • N. Nagamall _ Rao and et al, _ effcient copyright ...
  • M. Khan, T. M. Khan, "Fingerprint image enhancement using data ...
  • S. Prawit, V. Areekul, "Adaptive boosted spectral filtering for progressive ...
  • S. Chikkerur and et al, "Fingerprint enhancement using STFT analysis", ...
  • I. Yadigar and et al, "Biometric cryptosystem based on discretized ...
  • I. Lancu and et al, "Intuitionistic fuzzy system for fingerprints ...
  • O. D. Trier, A.K. Jain, _ doub le-threshold image binarization ...
  • R. F. Moghadam, M. Cheriet, "An Adaptive and Parameterles generalization ...
  • R. F. Moghadam, M. Cheriet, "A multi-scae framework for adaptive ...
  • A. J. Palmer, "Criteria to evaluate Automated Personal Identification Mechanisms", ...
  • نمایش کامل مراجع