13.07.2015 Views

A Fingerprint Watermarking Algorithm to Enhance The ... - WSEAS

A Fingerprint Watermarking Algorithm to Enhance The ... - WSEAS

A Fingerprint Watermarking Algorithm to Enhance The ... - WSEAS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>WSEAS</strong> TRANSACTIONS onINFORMATION SCIENCE and APPLICATIONSSandhya Tarar, Ashish Kumar, Ela Kumarimages for copyright protection”, Proceedingsof the international Conference on ImageProcessing and its Applications, Edinburgh,Scotland, pp. 321- 326.[7].http://docs.oracle.com/javase/tu<strong>to</strong>rial/uiswing/components/filechooser.html.[8].http://en.wikipedia.org/wiki/Digital_watermarking.[9].http://en.wikipedia.org/wiki/Digital_watermarking#His<strong>to</strong>ry.[10]. http://www.apl.jhu.edu/~hall/java/Java2D-Tu<strong>to</strong>rial.html#Java2D-Tu<strong>to</strong>rial-Transparency.[11]. http://www.apl.jhu.edu/~hall/java/Java2D-Tu<strong>to</strong>rial.html#Java2D-Tu<strong>to</strong>rial-Introduction.[12].http://www.developer.com/java/other/article.php/3403921/Processing-Image-Pixels-using-Java-Getting-Started.htm.[13].http://www.exampledepot.com/egs/java.awt.image/CreateBuf.html.[14].http://www.watermarkingworld.com/digital_watermarking.[15]. Hui, K., Jing, L., Xiao-dong, Z. and Xiaoxu,Z. (2008). “Study on Implementation of a<strong>Fingerprint</strong> Watermark”, InternationalConference on Computer Science and SoftwareEngineering (CSSE), Vol. 3, pp.725-728.[16]. I. Cox, J. Kilian, F. T. Leigh<strong>to</strong>n, and T.Shamoon, (1997). “Secure spread spectrumwatermarking for multimedia”, IEEETransactions on Image Processing, Vol. 6, no.12, pp. 1673-1687.[17]. I. J. Cox and M. L. Miller, (1997). “Areview of watermarking and the importance ofperceptual modeling”, Proceedings of the SPIEInternational Conference on Human Vision andElectronic Imaging II, Feb. 10-13, San Jose,CA, USA, pp. 92-99.[18]. I. J. Cox, (1999). “Spread-spectrumtechniques for image watermarking”, <strong>to</strong> appearin Proceedings of the IEEE, Special issue onidentification and protection of MultimediaInformation.[19]. J. Brassil, S. Low, N. Maxemchuk, L. O’Gorman,. (1994). “Electronic marking andidentification techniques <strong>to</strong> discourse documentcopying”, Proceeding of INFOCOM.[20]. J.J.K. O Ruanaidh, W.J. Dowling, F.M.Boland., (1996). “<strong>Watermarking</strong> Digital ImageCopyright Protection”, IEE Proc. - Vis. ImageSignal Process, Vol. 143. No. 4.[21]. Jain, A.K., Hong, L. and Bolle, r. (1997).“Online fingerprint verification”, IEEE Trans.Pattern Anal. Machine Intell, Vol. 19, No.4,pp.302-314.[22]. Jain, A.K., Nandakumar, K. and Nagar, A.,(2008). “Biometric Template Security”,EURASIP Journal on Advance in SignalProcessing, Vol. 2008, Article ID 579416.[23]. Jain, S., (2000). “Digital watermarkingtechniques: a case study in fingerprint & faces”,Proceedings ICVGIP, pp. 139-144.[24]. Khalil Zebbiche, Lahouari Ghouti, FouadKhelifi and Ahmed Bouridane, (2006).“Protecting fingerprint data usingwatermarking”, First NASA/ESA Conference onAdaptive Hardware and Systems (AHS), pp.451-456.[25]. Lee, Y., Kang, H.J. and Ki, Y.H (2005).“Copyright Authentication <strong>Enhance</strong>ment ofDigital <strong>Watermarking</strong> Based on IntellingentHuman Visual System Scheme, Knowledge-Based Intelligent Information and EngineeringSystems, Intelligent <strong>Watermarking</strong> <strong>Algorithm</strong>sand Applications”, Vol. 3682/2005, pp. 567-572.E-ISSN: 2224-3402 238 Issue 8, Volume 9, August 2012


<strong>WSEAS</strong> TRANSACTIONS onINFORMATION SCIENCE and APPLICATIONSSandhya Tarar, Ashish Kumar, Ela Kumar[26]. Lin, C., (2000). “<strong>Watermarking</strong> and DigitalSignature Techniques for MultimediaAuthentication and Copyright Protection”, PhD<strong>The</strong>sis, Columbia University.[27]. Low, C.Y., Teoh, A.B. and Tee, C. (2009).“Fusion of LSB and DWT Biometric<strong>Watermarking</strong> Using Offline HandwrittenSignature for Copyright Protection”,Proceedings of the Third InternationalConference on Advances in Biometrics, LectureNotes In Computer Science, Vol. 5558, pp. 786-795.[28]. M. D. Swanson, M. Kobayashi, and A. H.Tewfik, (1998). “Multimedia data embeddingand watermarking technologies”, <strong>to</strong> appear inProceeding of the IEEE, 1998.[29]. M. Kutter and F. Hartung, (1999). “Imagewatermarking techniques”, <strong>to</strong> appear inProceedings of the IEEE, Special Issue onIdentification and Protection on MultimediaInformation.[30]. Maiorana, E., Campisi, P., Neri, A. (2007).“Biometric Signature Authentication UsingRandon Transform- Based <strong>Watermarking</strong>Techniques”, IEEE Biometric Symposium, pp.1-6.[31]. Ms. D. Mathivadhani, Dr. C. Meena.,(2010). “A Comparative Study on <strong>Fingerprint</strong>Protection Using <strong>Watermarking</strong> Techniques”,Global Journal Computer Science andTechnology, Vol. 9, Page 98.[31]. Munesh Chandra, Shikha Pandey, RamaChaudhary, (2010). “Digital <strong>Watermarking</strong>Technique for Protecting Digital Images”, pp12-18.[32]. Noore, A., Singh, R., Vatsa, M. andHouck, M.M. (2009). “Enhancing security offingerprints through contextual biometricwatermarking”, Forensic Science International,Vol. 169, pp. 188-194.[33]. Pankanti, S. and Yeung, M.M. (1999).“Verification watermarks on fingerprintrecognition and retrieval”, Proc. SPIE EI, SanJose, CA, Vol. 3657, pp. 66-78.[34]. R. B. Wolfgang and E. J. Delp, (1997).“Overview of image security techniques withapplications inmultimedia systems”, Proceeding of the SPIEInternational Conference on MultimediaNetworks: Security, Displays, Terminals, andGateways, November 4-5, Dallas Texas, Vol.3228, pp. 297-308.[34]. R. G. van Schyndel, A. Z. Tirkel, N. R. A.Mee, C. F. Osborne., (1994). “A DigitalWatermark”, First IEEE ImageProcessingConference, Hous<strong>to</strong>n TX, Vol. II, pp. 86-90.[35]. Ratha, N.K., Connell, J.H. and Bolle, R.M.(2000). “Secure data hiding in waveletcompressed fingerprint images”, Proc.ACMMultimedia Workshops, Los Angeles, CA, pp.127-130.[36]. Ryoung, K., Jeong, D.S., Kang, .J. andLee, E.C. (2007). “A Study on Iris Feature<strong>Watermarking</strong> on Face Data”, Proceedings ofthe 8 th international conference on Adaptive andNatural Computing <strong>Algorithm</strong>s, Part II, LectureNotes In Computer Science, Vol. 4432, pp. 414-423.[37]. S. Wal<strong>to</strong>n,. (1995). “Image Authenticationfor a Slippery New Age”, Dr. Dobb’s Journal,pp.18-26, 82-87.[38]. Saraju P. Mohanty, K.R. Ramakrishna,Mohan Kankanhalli, (1999) "A DualWatennarking Technique for Images",Proc. 7thACM International Multimedia Conference,ACM-MM'99,Part 2, pp. 49-51.[39]. Schaathun, H.G. (2006). “Onwatermarking fingerprinting for copyrightprotection”, Proceedings of the FirstInternational Conference on InnovativeE-ISSN: 2224-3402 239 Issue 8, Volume 9, August 2012


<strong>WSEAS</strong> TRANSACTIONS onINFORMATION SCIENCE and APPLICATIONSSandhya Tarar, Ashish Kumar, Ela KumarComputing, Information and Control, IEEEComputer Society, Vol. 3, pp. 50-53.[40]. Tzouveli, P. Ntalianis,K.. Kollias, S.(2005). “Human face watermarking based onZernikemoments”, Proceedings of the FifthIEEE International Symposium on SignalProcessing and Information Technology, pp.399-404.[41].Uludag,U.,Gunsel,B.and Ballan,M. (2001).“A spatialmethod for watermarking offingerprint images”, Proceedings of FirstInternational Workshop on Pattern RecognitioninInformation Systems, Setúbal, Portugal, pp.26-33.[42]. Vatsa, M., Singh, R., Noore, A., Houck,M.M. and Morris, K. (2006). “Robust biometricimage watermarking for fingerprint and facetemplate protection”, IEICE ElectronicsExpress, Vol.3,No.2, pp. 23-28.[43]. Zebbiche, K. and Khelifi, F. (2009).“Region-Based <strong>Watermarking</strong> of BiometricImages:Case Study in <strong>Fingerprint</strong> Images”,International Journal of Digital MultimediaBroadcasting, Vol. 2008, Article ID 492942,pp. 1-13.[44]. Yiwei Wang, John F. Doherty, Robert E.Van Dyck, (2001). “A <strong>Watermarking</strong> <strong>Algorithm</strong>for <strong>Fingerprint</strong>ing Intelligence Images”,Conference on Information Sciences andSystem, <strong>The</strong> Johns Hopkins University.[45]. Yusnita Yusof and Othman O. Khalifa,(2007). “Digital watermarking for DigitalImages Using Wavelet Transformation”, appearin proceeding of the IEEE pp. 665-669.[46] http://bias.csr.unibo.it/fvc2004E-ISSN: 2224-3402 240 Issue 8, Volume 9, August 2012

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!