2014
DOI: 10.1002/sec.1114
|View full text |Cite
|
Sign up to set email alerts
|

Biometric watermarks based on face recognition methods for authentication of digital images

Abstract: Because making digital images secure runs into the substantial challenge of owner authentication, many security schemes based on cryptography, steganography and watermarking technology include biometric recognition methods. To follow on these studies, this paper describes a combination of facial images with watermarking technology to automatically authenticate digital images owners/users. In the proposed methodology, biometric face recognition methods such as principal component analysis and eigenfeature regul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…Multimedia copyright data are protected with this technology; also, the text files and databases are protected with the help of the digital watermarking technique. Two basic components are encompassed in a digital watermarking system, such as; the decoder and the encoder [20,21]. For combining a digital document with a watermark, for instance, in images watermarking, the requirements are an image, which is denoted as Co, a watermarking data contained watermark, which is indicated as 'W', an encoding algorithm, E for producing a watermarked image, indicated as CW and a security key, K. The signature and the cover document is taken by the encoder, and a watermarked image is created.…”
Section: Related Workmentioning
confidence: 99%
“…Multimedia copyright data are protected with this technology; also, the text files and databases are protected with the help of the digital watermarking technique. Two basic components are encompassed in a digital watermarking system, such as; the decoder and the encoder [20,21]. For combining a digital document with a watermark, for instance, in images watermarking, the requirements are an image, which is denoted as Co, a watermarking data contained watermark, which is indicated as 'W', an encoding algorithm, E for producing a watermarked image, indicated as CW and a security key, K. The signature and the cover document is taken by the encoder, and a watermarked image is created.…”
Section: Related Workmentioning
confidence: 99%
“…In the second set, biometric data is embedded into natural images to protect intellectual property rights and copyright. Various biometric data such as speech signal [10,11], fingerprint [12][13][14], face [15,16], iris [17][18][19][20], and signature [21] are used as watermark for this purpose. Authors in [18] and [19] embedded iris code into cover image using Discrete Wavelet Transform (DWT)-Singular Value Decomposition (SVD)-based and Discrete Cosine Transform (DCT)-SVD-based hybrid watermarking schemes, respectively.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, the advancement of this system reached the point of recognizing the actual expressions of the user [88]. To enable facial recognition, it is required to equip the system with at least one output device and a camera [89].…”
Section: Facial Recognitionmentioning
confidence: 99%