Enabling WiFi in Open Access Networks

Author(s):  
Shamik Sarkar ◽  
Christopher Becker ◽  
Josh Kunz ◽  
Aarushi Sarbhai ◽  
Gurupragaash Annasamymani ◽  
...  
Keyword(s):  
2005 ◽  
Vol 10 (3) ◽  
pp. 275-287 ◽  
Author(s):  
Roberto Battiti ◽  
Renato Lo Cigno ◽  
Mikalai Sabel ◽  
Fredrik Orava ◽  
Björn Pehrson

2009 ◽  
Vol 5 (1) ◽  
pp. 1-12
Author(s):  
Don Flournoy ◽  
Rolland LeBrasseur ◽  
Sylvie Albert
Keyword(s):  

Author(s):  
Rasha Thabit ◽  
Jaffer Ali ◽  
Doaa Subhi

Nowadays, many biometric based security systems depend on the iris images for authentication because of their features and ease of use. However, storing and sharing these sensitive images through open access networks will expose them to tampering. In order to ensure the safety of the iris images, this paper presents a new tampering reveal technique based on watermarking in the transform domain. In the proposed technique, the iris region is selected and isolated using interactive segmentation process (ISA). The authentication bits have been generated from the iris region (IR) and embedded in the Slantlet transform coefficients of the remaining part of the iris image which has been named as non-iris region (NIR). The use of ISA ensures the intactness of IR because it has been excluded from the embedding process. Several experiments have been conducted to test the visual quality, capacity, payload, and the tampering reveal performance. The experiments proved the ability of the proposed technique to reveal and localize any tampering in IR, in addition, the difference between the original iris image and the watermarked iris image is imperceptible


Author(s):  
Einar Edvardsen ◽  
Thor Gunnar Eskedal ◽  
André Årnes
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document