2013
DOI: 10.1007/s00138-013-0533-x
|View full text |Cite
|
Sign up to set email alerts
|

Biometric template protection with DCT-based watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0
1

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(14 citation statements)
references
References 19 publications
0
12
0
1
Order By: Relevance
“…The watermarking technique hides an image into another cover image. The technique proposed in [3] divides a cover image into two blocks and each block is transformed with a two-dimensional discrete cosine transform (DCT) to classify as smooth block or edge block. Then biometric features are embedded in the low frequency coefficients of the 8×8 DCT blocks while the edge blocks are eliminated.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The watermarking technique hides an image into another cover image. The technique proposed in [3] divides a cover image into two blocks and each block is transformed with a two-dimensional discrete cosine transform (DCT) to classify as smooth block or edge block. Then biometric features are embedded in the low frequency coefficients of the 8×8 DCT blocks while the edge blocks are eliminated.…”
Section: Related Workmentioning
confidence: 99%
“…are examples of some well-known message encryption techniques. To encrypt an image, techniques like visual cryptography (VC) [1], steganography [2], watermarking [3], deep learning based ones [23,24], chaotic system and symmetric/ asymmetric cryptosystem based ones [16,17] etc. have been developed.…”
Section: Introductionmentioning
confidence: 99%
“…The embedding method causes the smallest possible anomaly in the refinement of the fingerprint template without affecting the recognition performance of the fingerprint authentication system. A template protection and fusion strategy are proposed in [13]. Fingerprint feature vectors and iris features are used as watermarks.…”
Section: Related Workmentioning
confidence: 99%
“…Data hiding [4,5] is one of the main techniques for privacy protection. The aim of biometric data hiding [6][7][8][9][10][11][12][13] is to embed sufficient personal data into cover biometric templates and to maintain the performance of recognition. Existing biometric data hiding methods usually perform the data embedding on the region that does not contain key features of the biometrics.…”
Section: Introductionmentioning
confidence: 99%
“…A disadvantage of this approach is the inability to change the algorithm used for extracting iris features. Paunwala and Patnaik [22] embedded fingerprint and iris features into a cover image that is divided into blocks. Each block is transformed into a two-dimensional DCT and classified into blocks with or without edges.…”
Section: Related Workmentioning
confidence: 99%