A modify fingerprint watermarking to improve Security in Wireless Networks

سال انتشار: 1394
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,024

فایل این مقاله در 16 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ITCC01_179

تاریخ نمایه سازی: 9 فروردین 1395

چکیده مقاله:

This paper has aimed to explore a biometric method to secured wireless communications. Briefly, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint. First is the enrolment phase by which the database of watermarked is created and sending it to the server through wireless medium. Later is the verification stage at which claimed users are verified against the database, and it includes of five steps.In order to implement fingerprint watermarking, i.e. incorporating the memorable term as a watermark message into the fingerprint image, an algorithm of five phases has been developed. The first three novel phases having to do with the fingerprint image enhancement have been followed with further two steps for embedding phase, and extracting the watermark into the enhanced fingerprint image utilizing Discrete Wavelet Transform (DWT).

نویسندگان

Alireza Farhang

Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran

Hassan Rashidi Heram Abadi

Department of Mathematics and Computer Science, Allameh Tabataba'i University, Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Intern ational Conference _ Informati _ Technol _ Comnnter _ ...
  • Intern ational Conference _ Informati _ Technol _ Comnnter _ ...
  • new approach to pre-processing digital image for wavelet-based 4Aه [23] ...
  • C. Gabriel and et al, "A Perspective of State -of-the-Art ...
  • D. Miller, B. Fauve, "Mobile e-commerct to drive voice-based authentication ...
  • C. T. Huang, J. M. Chang, "Responding to security issues ...
  • Y. Ding, A .Ross, _ comparison of imputation methods for ...
  • H. M. Sim and et al, "Multimodal biometrics: Weighted Score ...
  • W. J. Wong and et al" Enhanced multi-line code for ...
  • D.S. Guru, H.N. Prakash, "Fingerprint template protection with minutiae -based ...
  • C. Li, C. C. Lee, _ novel user authentication and ...
  • D. Fan and et al, ":A Novel Probabilistic Model Based ...
  • R. Giot, C. Rosenberger, "Genetic programming for multibiometro s", Expert ...
  • M. Heenaye, M. Khan, _ Multimodal Hand Vein Biometric based ...
  • R. Giot and et al, :Fast computation of the performance ...
  • M. Khitrov, "Talking passwords: voice biometrics for data acces and ...
  • K. Zebbiche, F. Khelifi, "Region-Based Watermarking of Biometric Images: Case ...
  • N. Nagamall _ Rao and et al, _ effcient copyright ...
  • M. Khan, T. M. Khan, "Fingerprint image enhancement using data ...
  • S. Prawit, V. Areekul, "Adaptive boosted spectral filtering for progressive ...
  • S. Chikkerur and et al, "Fingerprint enhancement using STFT analysis", ...
  • I. Yadigar and et al, "Biometric cryptosystem based on discretized ...
  • I. Lancu and et al, "Intuitionistic fuzzy system for fingerprints ...
  • O. D. Trier, A.K. Jain, _ doub le-threshold image binarization ...
  • R. F. Moghadam, M. Cheriet, "An Adaptive and Parameterles generalization ...
  • R. F. Moghadam, M. Cheriet, "A multi-scae framework for adaptive ...
  • A. J. Palmer, "Criteria to evaluate Automated Personal Identification Mechanisms", ...
  • نمایش کامل مراجع