2007 IEEE Workshop on Automatic Identification Advanced Technologies 2007
DOI: 10.1109/autoid.2007.380618
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Iris Images through Asymmetric Digital Watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…This idea may also be applied to biometric databases where e.g. Bartlow et al [1] propose a framework that encodes voice feature descriptors in raw iris images stored in a database.…”
Section: Watermarking In Biometric Systemsmentioning
confidence: 98%
“…This idea may also be applied to biometric databases where e.g. Bartlow et al [1] propose a framework that encodes voice feature descriptors in raw iris images stored in a database.…”
Section: Watermarking In Biometric Systemsmentioning
confidence: 98%
“…the image) to the sensor, it can detect the WM, will deduce non-liveness and will refuse to process the data further (see e.g. [1] embedding voice templates into iris sample data).…”
Section: Watermarking In Biometric Systemsmentioning
confidence: 99%
“…In literature [3], a multimodal biometrics system using watermarking method with two level of security for verifying an individual and protecting the biometric template has been presented. A combined DWT and LSB based biometric watermarking algorithm which securely embedded a face template in a fingerprint image was proposed for multimodal identification [4]. Literature [5] encoded voice feature descriptors in raw iris images offering a secure biometric system.…”
Section: Introductionmentioning
confidence: 99%
“…Researchers have proposed some methods to protect the security and integrity of biometric images by encryption [1][2] and data hiding [3][4][5][6][7]. However, encryption can not provide enough security once the data is decrypted.…”
Section: Introductionmentioning
confidence: 99%