LEADER 04437nam 22006975 450 001 9910299564203321 005 20200702005832.0 010 $a3-319-73183-1 024 7 $a10.1007/978-3-319-73183-4 035 $a(CKB)3790000000544694 035 $a(DE-He213)978-3-319-73183-4 035 $a(MiAaPQ)EBC5214982 035 $a(PPN)223955825 035 $a(EXLCZ)993790000000544694 100 $a20180103d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMultibiometric Watermarking with Compressive Sensing Theory $eTechniques and Applications /$fby Rohit M. Thanki, Vedvyas J. Dwivedi, Komal R. Borisagar 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XXI, 172 p. 104 illus., 48 illus. in color.) 225 1 $aSignals and Communication Technology,$x1860-4862 311 $a3-319-73182-3 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aChapter 1. Introduction -- Chapter 2.Related Works and Background Information -- Chapter 3.Issues in Biometric System and Proposed Research Methodology -- Chapter 4.Multibiometric Watermarking Technique using Discrete Wavelet Trans-form (DWT) -- Chapter 5. Multibiometric Watermarking Technique using Discrete Cosine Trans-form (DCT) and Discrete Wavelet Transform (DWT) -- Chapter 6.Multibiometric Watermarking Technique using Discrete Wavelet Trans-form (DWT) and Singular Value Decomposition (SVD) -- Chapter 7.Multibiometric Watermarking Technique using Fast Discrete Curvelet Transform (FDCuT) and Discrete Cosine Transform (DCT) -- Chapter 8.Conclusions and Future Work. 330 $aThis book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports. 410 0$aSignals and Communication Technology,$x1860-4862 606 $aSignal processing 606 $aImage processing 606 $aSpeech processing systems 606 $aComputational linguistics 606 $aNatural language processing (Computer science) 606 $aDatabase management 606 $aSignal, Image and Speech Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/T24051 606 $aComputational Linguistics$3https://scigraph.springernature.com/ontologies/product-market-codes/N22000 606 $aNatural Language Processing (NLP)$3https://scigraph.springernature.com/ontologies/product-market-codes/I21040 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 615 0$aSignal processing. 615 0$aImage processing. 615 0$aSpeech processing systems. 615 0$aComputational linguistics. 615 0$aNatural language processing (Computer science). 615 0$aDatabase management. 615 14$aSignal, Image and Speech Processing. 615 24$aComputational Linguistics. 615 24$aNatural Language Processing (NLP). 615 24$aDatabase Management. 676 $a006.4 700 $aThanki$b Rohit M$4aut$4http://id.loc.gov/vocabulary/relators/aut$0864695 702 $aDwivedi$b Vedvyas J$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aBorisagar$b Komal R$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299564203321 996 $aMultibiometric Watermarking with Compressive Sensing Theory$92524116 997 $aUNINA