![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Implementation of BTTC Image Compression Algorithm Using Fuzzy Technique
This paper presents a new algorithm for image compression based on fuzzy domain decomposition, which is an improvement of the recently published Binary Tree Triangular Coding (BTTC) algorithm. The algorithm is...
-
Chapter
Intramodal Palmprint Authentication
Palmprint technology is one of the biometric techniques used to identify an individual. Recognition of palmprints is based on the features like palm lines, texture, ridges etc. Several line and texture extract...
-
Chapter and Conference Paper
New Quantization Technique in Semi-fragile Digital Watermarking for Image Authentication
The Internet has been widely used for the distribution, commercialization and transmission of digital files such as images, audio and video. The growth of network multimedia systems has magnified the need for ...
-
Chapter and Conference Paper
Classification of Palmprint Using Principal Line
In this paper, a new classification scheme for palmprint is proposed. Palmprint is one of the reliable physiological characteristics that can be used to authenticate an individual. Palmprint classification pro...
-
Chapter and Conference Paper
Subset Selection Approach for Watermarking Relational Databases
Information on the open medium like Internet is of great source of digital content. This can be copied easily, modified by the unauthorized users and shared among various unknown users of the Internet. This po...
-
Chapter and Conference Paper
Dynamic ROI Extraction Algorithm for Palmprints
Region of Interest (ROI) extraction is an important task for palmprint identification. Earlier reported works used fixed size ROI for the recognition of palmprints. When the fixed size ROI is used the palm are...
-
Chapter and Conference Paper
Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay Triangulation
In biometric identification systems, the identity corresponding to the query image is determined by comparing it against all images in the database. This exhaustive matching process increases the response time...
-
Chapter and Conference Paper
Hand Vein Authentication System Using Dynamic ROI
This paper presents an efficient authentication system based on hand vein pattern. The stages involved in vein pattern authentication system are image acquisition, Region of Interest (ROI) Extraction, image en...
-
Chapter and Conference Paper
Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Features
Palmprint technology is a new branch of biometrics used to identify an individual. Palmprint has rich set of features like palm lines, wrinkles, minutiae points, texture, ridges etc. Several line and texture e...
-
Chapter and Conference Paper
Image and Template Security for Palmprint
The wide spread use of biometrics in real world causes more security and privacy concerns to be raised, because conventional biometric systems store biometric templates as it is in database without any securit...
-
Chapter and Conference Paper
Digital Watermarking Based on Magic Square and Ridgelet Transform Techniques
This paper proposes two algorithms for embedding and extraction of the watermark into the cover image based on magic square and ridgelet transform techniques. Spread-spectrum communication systems use the spre...
-
Chapter and Conference Paper
A New Indexing Method for Biometric Databases Using Match Scores and Decision Level Fusion
This paper proposes a new clustering-based indexing technique for large biometric databases. We compute a fixed length index code for each biometric image in the database by computing its similarity against a ...
-
Chapter and Conference Paper
GLCM Based Texture Features for Palmprint Identification System
In this paper, a new Palmprint recognition technique is introduced based on the gray-level co-occurrence matrix (GLCM). GLCM represents the distributions of the intensities and the information about relative p...
-
Chapter and Conference Paper
Watermarking Techniques in Curvelet Domain
This paper proposes four different methods for embedding and extraction of the watermark into the cover image based on Curvelet Transform Technique. Magic Square Technique was used in the algorithms for spread...
-
Chapter and Conference Paper
Partial Segmentation and Matching Technique for Iris Recognition
One of the main issues in iris segmentation is that the upper and lower region of the iris is occluded by the eyelashes and eyelids. In this paper, an effort has been made to solve the above problem. The pupil...
-
Chapter and Conference Paper
An Efficient Coding Method for Indexing Hand-based Biometric Databases
Biometric identification systems capture biometric (i.e., fingerprint, palm, and iris) images and store them in a central database. During identification, the query biometric image is compared against all imag...
-
Book
-
Chapter
Color Image Watermarking Techniques Based on Magic Square and Ridgelets
Two techniques, namely image watermarking based on magic square (MST) and Image watermarking based on magic square and ridgelet transform (MSRTT), are discussed in this chapter. In the MST the watermark image ...
-
Chapter
Conclusions and Future Scope
Eight different digital watermarking techniques are discussed in this book. These techniques have been tested for their performance against various image compression attacks. The outcome of the work done so fa...
-
Chapter and Conference Paper
Digital Watermarking Using Fractal Coding
This paper presents a watermarking method using fractals. In the method discussed here, the host image is encoded by the proposed fractal coding method. To embed the watermark evenly over the whole host image,...