Posts

Showing posts from April, 2019

Implementation of a New Methodology to Reduce the Effects of Changes of Illumination in Face Recognition-based Authentication Andres

Image
Implementation of a New Methodology to Reduce the Effects of Changes of Illumination in Face Recognition-based Authentication Andres  Alarcon-Ramirez, and Mohamed F. Chouikha  Department of Electrical Engineering, Howard University, Washington DC ABSTRACT   In this paper, the study of the effects of illumination changes in the process of face recognition is discussed. Additionally, a new methodology that integrates Single-Scale Retinex (SSR) and Scale Invariant Feature Transform (SIFT) is presented. The proposed methodology addresses the problem of illumination changes in face recognition-based authentication systems. To do this, the SSR transform eliminates the component of luminance from the face image and recovers the reflectance component which is invariant to illumination changes; then, the SIFT transform detects interest points from the reflectance component of the face image. The interest points are features rich in information and may be used to ...

ECG BASED HUMAN AUTHENTICATION USING WAVELETS AND RANDOM FORESTS

Image
ECG BASED HUMAN AUTHENTICATION USING WAVELETS AND RANDOM FORESTS Noureddine Belgacem 1 , Amine Nait-Ali 2 , Régis Fournier 2 and Fethi Bereksi-Reguig 1  1 Biomedical Engineering Laboratory, Abou Bekr Belkaid University, Tlemcen, Algeria. 2 Images Signals and Intelligent Systems Laboratory, UPEC University, France ABSTRACT  The electrocardiogram (ECG) is an emerging novel biometric for human identification. It can be combined in a multi-modal biometric identification system or used alone for authentication of subjects. His primary application can be in health care systems where the ECG is used for health measurements. It does furthermore, better than any other biometrics measures, deliver the proof of subject’s being alive as extra information which other biometrics cannot deliver as easily. The main purpose of this study is to present a novel personal authentication approach for human authentication based on their ECG signals. We present a methodology f...

SECURE DATA TRANSMISSION USING STEGANOGRAPHY AND ENCRYPTION TECHNIQUE

Image
SECURE DATA TRANSMISSION USING STEGANOGRAPHY AND ENCRYPTION TECHNIQUE  Shamim Ahmed Laskar and Kattamanchi Hemachandran Department of Computer Science Assam University, Silchar, India  ABSTRACT  With the spread of digital data around the world through the internet, the security of the data has raised a concern to the people. Many methods are coming up to protect the data from going into the hands of the unauthorized person. Steganography and cryptography are two different techniques for data security. The main purpose in cryptography is to make message concept unintelligible, while steganography aims to hide secret message. Digital images are excellent carriers of hidden information. We propose a method of combining steganography and cryptography for secret data communication. In this paper, we propose a high-performance JPEG steganography along with a substitution encryption methodology. The approach uses the discrete cosine transform (DCT) technique wh...

PERFORMANCE OF ERROR FILTERS IN HALFTONE VISUAL CRYPTOGRAPHY

Image
PERFORMANCE OF ERROR FILTERS IN HALFTONE VISUAL CRYPTOGRAPHY  Anshul Sharma Department of Electronic & Communication, Chandigarh University, Gharuan (S.A.S Nagar), India   ABSTRACT Visual cryptography encodes a secret binary image (SI) into shares of random binary patterns. In visual cryptography, the decoding process is performed directly by the human eyes; while in general, the shared images need some processing to reconstruct the secret image. The shares are xeroxed onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. Halftone visual cryptography is extended technique in visual cryptography where the random shares are embedded in high quality grayscale images to give them meaning and thus reducing the doubt of eve’s droppers that some secure data is hidden. Improved shares have been developed by ch...