scholarly journals Tampering Reveal Technique for Iris Images

Author(s):  
Rasha Thabit ◽  
Jaffer Ali ◽  
Doaa Subhi

Nowadays, many biometric based security systems depend on the iris images for authentication because of their features and ease of use. However, storing and sharing these sensitive images through open access networks will expose them to tampering. In order to ensure the safety of the iris images, this paper presents a new tampering reveal technique based on watermarking in the transform domain. In the proposed technique, the iris region is selected and isolated using interactive segmentation process (ISA). The authentication bits have been generated from the iris region (IR) and embedded in the Slantlet transform coefficients of the remaining part of the iris image which has been named as non-iris region (NIR). The use of ISA ensures the intactness of IR because it has been excluded from the embedding process. Several experiments have been conducted to test the visual quality, capacity, payload, and the tampering reveal performance. The experiments proved the ability of the proposed technique to reveal and localize any tampering in IR, in addition, the difference between the original iris image and the watermarked iris image is imperceptible

2019 ◽  
Vol 63 (4) ◽  
pp. 263-273 ◽  
Author(s):  
Rasha Thabit

Iris-based security systems are highly recommended because of their security and ease of use. Different watermarking techniques have been presented to provide security while exchanging or storing iris images. The previous iris image watermarking techniques have successfully reached their aims, however, they suffer from some limitations such as the distortions that are presented in the iris region because of the watermark embedding process, the limited embedding capacity, and the lack of robustness against unintentional attacks. On the other hand, nowadays, the biometric-based security systems have directed their interest towards multi-biometric techniques in order to improve the performance of the individual’s recognition process. This paper presents a new multi-biometric watermarking (MBW) scheme in which the features of the fingerprint image and some personal information are embedded in the iris image. To avoid the abovementioned limitations, the proposed scheme presents an interactive segmentation algorithm (ISA) and a Slantlet transform based watermark embedding method. The proposed ISA prevents any distortion in the iris region which is a beneficial feature for the iris image recognition process. The experimental results proved the efficiency of the proposed ISA in comparison with the Hough transform based methods in terms of accuracy, embedding capacity, and execution time. The proposed MBW scheme performs better in comparison with the state-of-the-art methods in terms of the intactness of the iris region, the robustness against unintentional attacks, and the watermark embedding capacity.


1996 ◽  
Vol 06 (01) ◽  
pp. 41-57 ◽  
Author(s):  
ARUN RAMASWAMY ◽  
WASFY B. MIKHAEL

Constrained image representation employing multi-transforms has been recently developed. First, the image is divided into smaller non-overlapping subimages. Each subimage is resolved appropriately into 2-D subsignals, each of which is compactly represented in a specific transform domain. The subimage is efficiently represented by superimposing the dominant components corresponding to the subsignals. The residual error, which is the difference between the original subimage and the reconstructed subimage is minimized by adaptive algorithms. An optimization strategy selects the dominant coefficients from the various domains for adaptation. An efficient coding technique is presented to code the multi-transform coefficients. An image representation example is presented employing the DCT-Haar combination. Objective evaluations are made where it is shown that images represented using the multi-transform technique are more accurate than using the DCT for the same number of retained transform coefficients. Test subimages with a high amount of detail represented using the proposed technique show an SNR improvement of about 3 to 4 dB over using DCT alone. Finally, images, coded at bit rates of 0.44 bits/pixel and 1.23 bits/pixel employing the proposed technique verify the good quality of reconstruction.


2018 ◽  
Vol 1 (1) ◽  
pp. 6-21 ◽  
Author(s):  
I. K. Razumova ◽  
N. N. Litvinova ◽  
M. E. Shvartsman ◽  
A. Yu. Kuznetsov

Introduction. The paper presents survey results on the awareness towards and practice of Open Access scholarly publishing among Russian academics.Materials and Methods. We employed methods of statistical analysis of survey results. Materials comprise results of data processing of Russian survey conducted in 2018 and published results of the latest international surveys. The survey comprised 1383 respondents from 182 organizations. We performed comparative studies of the responses from academics and research institutions as well as different research areas. The study compares results obtained in Russia with the recently published results of surveys conducted in the United Kingdom and Europe.Results. Our findings show that 95% of Russian respondents support open access, 94% agree to post their publications in open repositories and 75% have experience in open access publishing. We did not find any difference in the awareness and attitude towards open access among seven reference groups. Our analysis revealed the difference in the structure of open access publications of the authors from universities and research institutes. Discussion andConclusions. Results reveal a high level of awareness and support to open access and succeful practice in the open access publications in the Russian scholarly community. The results for Russia demonstrate close similarity with the results of the UK academics. The governmental open access policies and programs would foster the practical realization of the open access in Russia.


2015 ◽  
Vol 39 (5) ◽  
pp. 637-648 ◽  
Author(s):  
Robin Osborne

Purpose – The purpose of this paper is to explore the difference between Open Access and accessibility, to argue that accessibility is the most crucial feature, and to suggest some ways in which Open Access militates against accessibility. Design/methodology/approach – Analysis of best practice by journals and monograph publishers is used to highlight the degree to which accessibility is enhanced by input from readers and editors. The expense of this, both real and hidden, is shown to be compatible only with difficulty with publishing methods where keeping costs low is essential, and Open Access alternatives that make available manuscripts “as submitted” are shown to make available less accessible scholarship. Findings – Scholarship is markedly improved by referees and editors; the emphasis needs to be put on making available the most accessible scholarship, not on making more scholarship available. Practical implications – Journals and publishers should concentrate on, and research councils and similar bodies insist upon, ensuring high quality critical review and editing, not cost-free access. Originality/value – The debate on Open Access has put its emphasis in the wrong place. Rather than easier access to more scholarship, increased resource devoted to pre-publication review, revision and editing is the most important development to ensure the greatest advances in research and scholarship.


2014 ◽  
Vol 35 (4/5) ◽  
pp. 364-374 ◽  
Author(s):  
Tereza Stoyanova Trencheva ◽  
Tania Yordanova Todorova

Purpose – The purpose of the paper is to provide a comparative retrospective analysis of Bulgarian, Turkish and Croatian Open Access (OA) journals added in Directory of Open Access journals (DOAJ) in the period 2002-2013. Design/methodology/approach – First of all, the study is focussed on brief review of definitions and descriptions of the OA as a global movement. In the study were analyzed the three main OA initiatives and was shown the difference between Golden Road and Green Road. Second of all, the authors used the comparative approach and made a comparative study of the OA journals in Bulgaria, Turkey and Croatia and present the evaluation results and findings. Findings – Qualitative and quantitative data for the study are collected by the DOAJ. The data are analyzed in terms of quantity and period, and the results are presented graphically and tabular and finally there are made major specific conclusions and recommendations. Originality/value – The paper shows that OA in the digital space has an important position in scientific research. There are many discussion issues related to the problems of OA, but overall study of OA to scientific information, and in particular comparative study of Bulgarian, Turkish and Croatian journals in the DOAJ does not exist at the moment.


2013 ◽  
Vol 217 ◽  
pp. 129-146
Author(s):  
THẢO HOÀNG THỊ PHƯƠNG

This research aims to identify the importance of factors that influence customer intention of purchasing electronic air ticket (e-ticket). The research compares the difference in purchasing intentions based on e-ticketing between demographic groups of age, income, educational level, and online shopping experience. With the sample size of 295 travelers, the regression models and ANOVA tests are used to process and explain data. The research detects four components, namely, perceived system usefulness, perceived ease of use, perceived behavioral control, and security of transaction that influence the consumer intention to buy e-ticket. The paper then recommends managerial solutions to the development of an electronic ticketing system in particular and e-commerce in general.


Author(s):  
Shamik Sarkar ◽  
Christopher Becker ◽  
Josh Kunz ◽  
Aarushi Sarbhai ◽  
Gurupragaash Annasamymani ◽  
...  
Keyword(s):  

2012 ◽  
Vol 226-228 ◽  
pp. 765-771
Author(s):  
Yang Yang ◽  
Jian Yu Zhang ◽  
Sui Zheng Zhang

Compound fault feature separation is a difficult problem in diagnosis field of mechanical system. For the rolling bearing with compound fault on outer and inner race, feature separation technology based on complex wavelet transform and energy operator demodulation is introduced. Through continuous wavelet transform, coefficients of mixed fault signal can be achieved in different wavelet transform domain (i.e. real, imaginary, modulus and phase domain). Furthermore, wavelet power spectrum contours and time average wavelet energy spectrum are applied to extract the scales which hold rich fault information, and the wavelet coefficient slice of specific scale is also drawn. For wavelet coefficients in different domain, spectrum analysis and energy operator demodulation can be used successfully to separate mixed fault. The comparison of feature extraction effect between complex wavelet and real wavelet transform shows that complex wavelet transform is obviously better than the latter.


2005 ◽  
Vol 10 (3) ◽  
pp. 275-287 ◽  
Author(s):  
Roberto Battiti ◽  
Renato Lo Cigno ◽  
Mikalai Sabel ◽  
Fredrik Orava ◽  
Björn Pehrson

Sign in / Sign up

Export Citation Format

Share Document