Authenification scheme based on fingerprint images
Author affiliations
DOI:
https://doi.org/10.15625/1813-9663/27/2/499Abstract
Digital Watermarking is the art of hiding copyright information to protect host signal from illegal activities. The embedded data can be author identification, company logo and authentication information, and so on. In this paper, we proposed a novel scheme in which biometrics watermark, namely fingerprint is used. Because of specific features of fingerprint, to achieve perfect authentication scheme which meets three criteria of watermarking problem, we utilize some techniques like Gabor algorithm, locally adaptive thresholding, Hilditch's thinning method together with heuristic rules, and Hamming measurement. Furthermore, to make our scheme robustness, the lowest frequency of DCT blocks is chosen and embedded information. With proposed scheme, the authentication scheme can achieve high capacity and good quatily. The experimental results show that our algorithm can be robustness against to JPEG compression, brightness and contract modification, Gaussian noise, adding blur, cropping, rotation, scale, translation, edge detection, emboss, bulge image.
Metrics
Downloads
Published
How to Cite
Issue
Section
License
1. We hereby assign copyright of our article (the Work) in all forms of media, whether now known or hereafter developed, to the Journal of Computer Science and Cybernetics. We understand that the Journal of Computer Science and Cybernetics will act on my/our behalf to publish, reproduce, distribute and transmit the Work.2. This assignment of copyright to the Journal of Computer Science and Cybernetics is done so on the understanding that permission from the Journal of Computer Science and Cybernetics is not required for me/us to reproduce, republish or distribute copies of the Work in whole or in part. We will ensure that all such copies carry a notice of copyright ownership and reference to the original journal publication.
3. We warrant that the Work is our results and has not been published before in its current or a substantially similar form and is not under consideration for another publication, does not contain any unlawful statements and does not infringe any existing copyright.
4. We also warrant that We have obtained the necessary permission from the copyright holder/s to reproduce in the article any materials including tables, diagrams or photographs not owned by me/us.