2008 First International Conference on Emerging Trends in Engineering and Technology, 2008
This paper describes an image-based system to detect spoof fingerprint attacks in fingerprint bio... more This paper describes an image-based system to detect spoof fingerprint attacks in fingerprint biometric systems. It is based on the observation that, real and spoof fingerprints exhibit different textural characteristics. These are based on structural, orientation, roughness, smoothness and regularity differences of diverse regions in a fingerprint image. Local binary pattern (LBP) histograms are used to capture these textural details.
Perspiration phenomenon is very significant to detect the liveness of a finger. However, it requi... more Perspiration phenomenon is very significant to detect the liveness of a finger. However, it requires two consecutive fingerprints to notice perspiration, and therefore may not be suitable for real time authentications. Some other methods in the literature need extra hardware to detect liveness. To alleviate these problems, in this paper, to detect liveness a new texture-based method using only the first fingerprint is proposed. It is based on the observation that real and spoof fingerprints exhibit different texture characteristics. Textural measures based on gray level co-occurrence matrix (GLCM) are used to characterize fingerprint texture. This is based on structural, orientation, roughness, smoothness and regularity differences of diverse regions in a fingerprint image. Wavelet energy signature is also used to obtain texture details. Dimensionalities of feature sets are reduced by Sequential Forward Floating Selection (SFFS) method. GLCM texture features and wavelet energy signa...
In this paper, face recognition technique using real Dual Tree Discrete Wavelet Transform (DT-DWT... more In this paper, face recognition technique using real Dual Tree Discrete Wavelet Transform (DT-DWT) is proposed. This approach is based on local appearance feature extraction using directional multiresolution decomposition offered by real DT-DWT. It provides a local multiscale description of images with good directional selectivity, effective edge representation and invariance to shifts and in-plane rotations. The real DT-DWT is less redundant and computationally efficient. The fusion of local coefficients of detail subbands are used to extract the facial features using feature variance. The features are used for classification process using Mahalanobis distance. The technique is validated using 9 pose and 2 pose per person of ORL face dataset and 2 pose per person of YALE face dataset. The experimental results outperform traditional methods like PCA, LDA and DCT normalization.
Breaches of multimedia security are increasing day by day as advancement in technologies have tig... more Breaches of multimedia security are increasing day by day as advancement in technologies have tightly coupled the globe and promoted easy sharing of multimedia content in no loss of time. A dual watermarking scheme ascertaining the rightful ownership and integrity of images is proposed here. A gray scale logo used as copyright information of the owner is embedded imperceptibly into the singular values of the cover image in multiple locations. The multiplicity of embedding ensures extraction of embedded information even in worst tampered scenarios and hence, prove the rightful ownership. The proposed scheme also performed pixel wise authentication which fetched the advantage of accurate tamper localization in case of alterations. The visual quality of the watermarked image is maintained high as indicated by the high Peak-Signal-to-Noise-Ratio(PSNR) values. The robustness of the scheme is tested against comprehensive set of attacks and evaluated by various objective evaluation paramet...
2008 First International Conference on Emerging Trends in Engineering and Technology, 2008
This paper describes an image-based system to detect spoof fingerprint attacks in fingerprint bio... more This paper describes an image-based system to detect spoof fingerprint attacks in fingerprint biometric systems. It is based on the observation that, real and spoof fingerprints exhibit different textural characteristics. These are based on structural, orientation, roughness, smoothness and regularity differences of diverse regions in a fingerprint image. Local binary pattern (LBP) histograms are used to capture these textural details.
Perspiration phenomenon is very significant to detect the liveness of a finger. However, it requi... more Perspiration phenomenon is very significant to detect the liveness of a finger. However, it requires two consecutive fingerprints to notice perspiration, and therefore may not be suitable for real time authentications. Some other methods in the literature need extra hardware to detect liveness. To alleviate these problems, in this paper, to detect liveness a new texture-based method using only the first fingerprint is proposed. It is based on the observation that real and spoof fingerprints exhibit different texture characteristics. Textural measures based on gray level co-occurrence matrix (GLCM) are used to characterize fingerprint texture. This is based on structural, orientation, roughness, smoothness and regularity differences of diverse regions in a fingerprint image. Wavelet energy signature is also used to obtain texture details. Dimensionalities of feature sets are reduced by Sequential Forward Floating Selection (SFFS) method. GLCM texture features and wavelet energy signa...
In this paper, face recognition technique using real Dual Tree Discrete Wavelet Transform (DT-DWT... more In this paper, face recognition technique using real Dual Tree Discrete Wavelet Transform (DT-DWT) is proposed. This approach is based on local appearance feature extraction using directional multiresolution decomposition offered by real DT-DWT. It provides a local multiscale description of images with good directional selectivity, effective edge representation and invariance to shifts and in-plane rotations. The real DT-DWT is less redundant and computationally efficient. The fusion of local coefficients of detail subbands are used to extract the facial features using feature variance. The features are used for classification process using Mahalanobis distance. The technique is validated using 9 pose and 2 pose per person of ORL face dataset and 2 pose per person of YALE face dataset. The experimental results outperform traditional methods like PCA, LDA and DCT normalization.
Breaches of multimedia security are increasing day by day as advancement in technologies have tig... more Breaches of multimedia security are increasing day by day as advancement in technologies have tightly coupled the globe and promoted easy sharing of multimedia content in no loss of time. A dual watermarking scheme ascertaining the rightful ownership and integrity of images is proposed here. A gray scale logo used as copyright information of the owner is embedded imperceptibly into the singular values of the cover image in multiple locations. The multiplicity of embedding ensures extraction of embedded information even in worst tampered scenarios and hence, prove the rightful ownership. The proposed scheme also performed pixel wise authentication which fetched the advantage of accurate tamper localization in case of alterations. The visual quality of the watermarked image is maintained high as indicated by the high Peak-Signal-to-Noise-Ratio(PSNR) values. The robustness of the scheme is tested against comprehensive set of attacks and evaluated by various objective evaluation paramet...
Uploads
Papers by Suneeta Agarwal