04437nam 22006975 450 991029956420332120200702005832.03-319-73183-110.1007/978-3-319-73183-4(CKB)3790000000544694(DE-He213)978-3-319-73183-4(MiAaPQ)EBC5214982(PPN)223955825(EXLCZ)99379000000054469420180103d2018 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierMultibiometric Watermarking with Compressive Sensing Theory Techniques and Applications /by Rohit M. Thanki, Vedvyas J. Dwivedi, Komal R. Borisagar1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XXI, 172 p. 104 illus., 48 illus. in color.) Signals and Communication Technology,1860-48623-319-73182-3 Includes bibliographical references at the end of each chapters and index.Chapter 1. Introduction -- Chapter 2.Related Works and Background Information -- Chapter 3.Issues in Biometric System and Proposed Research Methodology -- Chapter 4.Multibiometric Watermarking Technique using Discrete Wavelet Trans-form (DWT) -- Chapter 5. Multibiometric Watermarking Technique using Discrete Cosine Trans-form (DCT) and Discrete Wavelet Transform (DWT) -- Chapter 6.Multibiometric Watermarking Technique using Discrete Wavelet Trans-form (DWT) and Singular Value Decomposition (SVD) -- Chapter 7.Multibiometric Watermarking Technique using Fast Discrete Curvelet Transform (FDCuT) and Discrete Cosine Transform (DCT) -- Chapter 8.Conclusions and Future Work.This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.Signals and Communication Technology,1860-4862Signal processingImage processingSpeech processing systemsComputational linguisticsNatural language processing (Computer science)Database managementSignal, Image and Speech Processinghttps://scigraph.springernature.com/ontologies/product-market-codes/T24051Computational Linguisticshttps://scigraph.springernature.com/ontologies/product-market-codes/N22000Natural Language Processing (NLP)https://scigraph.springernature.com/ontologies/product-market-codes/I21040Database Managementhttps://scigraph.springernature.com/ontologies/product-market-codes/I18024Signal processing.Image processing.Speech processing systems.Computational linguistics.Natural language processing (Computer science).Database management.Signal, Image and Speech Processing.Computational Linguistics.Natural Language Processing (NLP).Database Management.006.4Thanki Rohit Mauthttp://id.loc.gov/vocabulary/relators/aut864695Dwivedi Vedvyas Jauthttp://id.loc.gov/vocabulary/relators/autBorisagar Komal Rauthttp://id.loc.gov/vocabulary/relators/autMiAaPQMiAaPQMiAaPQBOOK9910299564203321Multibiometric Watermarking with Compressive Sensing Theory2524116UNINA