메뉴 건너뛰기




Volumn 20, Issue 1, 2010, Pages 179-190

Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals

Author keywords

Audio signal; Biometrics; Fingerprint; Security; Template

Indexed keywords

ACCESS CONTROL; AUDITION; BIOMETRICS; CRYPTOGRAPHY; DISCRETE FOURIER TRANSFORMS; EXTRACTION; SIGNAL PROCESSING; SPECTROSCOPY;

EID: 71649104928     PISSN: 10512004     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dsp.2009.05.004     Document Type: Article
Times cited : (43)

References (34)
  • 3
    • 33846419477 scopus 로고    scopus 로고
    • Chaotic secure content-based hidden transmission of biometrics temples
    • Khan M.K., Jiashu Z., and Lei T. Chaotic secure content-based hidden transmission of biometrics temples. Chaos Solitons Fractals 32 5 (2007) 1749-1759
    • (2007) Chaos Solitons Fractals , vol.32 , Issue.5 , pp. 1749-1759
    • Khan, M.K.1    Jiashu, Z.2    Lei, T.3
  • 5
    • 0027700869 scopus 로고    scopus 로고
    • High confidence visual recognition of persons by a test of statistical independence
    • Daugman J. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell. 15 (1999) 1148-1161
    • (1999) IEEE Trans. Pattern Anal. Mach. Intell. , vol.15 , pp. 1148-1161
    • Daugman, J.1
  • 7
    • 0036887598 scopus 로고    scopus 로고
    • Robust watermarking of fingerprint images
    • Gunsel B., Umut U., and Tekalp A.M. Robust watermarking of fingerprint images. Pattern Recogn. 35 (2002) 2739-2747
    • (2002) Pattern Recogn. , vol.35 , pp. 2739-2747
    • Gunsel, B.1    Umut, U.2    Tekalp, A.M.3
  • 8
    • 27144539209 scopus 로고    scopus 로고
    • Protecting biometric data for personal identification
    • Sinobiometrics'04, Springer-Verlag
    • Khan M.K., Jiashu Z., and Lei T. Protecting biometric data for personal identification. Sinobiometrics'04. Lecture Notes in Computer Science vol. 3383 (2004), Springer-Verlag 629-638
    • (2004) Lecture Notes in Computer Science , vol.3383 , pp. 629-638
    • Khan, M.K.1    Jiashu, Z.2    Lei, T.3
  • 9
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • Ratha N., Connell J., and Bolle R. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40 (2001) 614-634
    • (2001) IBM Syst. J. , vol.40 , pp. 614-634
    • Ratha, N.1    Connell, J.2    Bolle, R.3
  • 10
    • 0036030112 scopus 로고    scopus 로고
    • Impact of artificial gummy fingers on fingerprint systems, Optical Security and Counterfeit Deterrence Techniques IV
    • T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, Impact of artificial gummy fingers on fingerprint systems, Optical Security and Counterfeit Deterrence Techniques IV, Proc. SPIE, vol. 4677, 2002, pp. 275-289
    • (2002) Proc. SPIE , vol.4677 , pp. 275-289
    • Matsumoto, T.1    Matsumoto, H.2    Yamada, K.3    Hoshino, S.4
  • 12
    • 0031651014 scopus 로고    scopus 로고
    • On enabling secure applications through online biometric identification
    • Davida G.I., Frankel Y., and Matt B.J. On enabling secure applications through online biometric identification. IEEE Symp. Secur. Priv. (1998) 148-157
    • (1998) IEEE Symp. Secur. Priv. , pp. 148-157
    • Davida, G.I.1    Frankel, Y.2    Matt, B.J.3
  • 13
    • 8844234621 scopus 로고    scopus 로고
    • On the relation of error correction and cryptography to an offline biometric based identification scheme
    • G.I. Davida, Y. Frankel, B.J. Matt, R. Peralta, On the relation of error correction and cryptography to an offline biometric based identification scheme, in: Proc. Workshop Coding and Cryptography, 1999, pp. 129-138
    • (1999) Proc. Workshop Coding and Cryptography , pp. 129-138
    • Davida, G.I.1    Frankel, Y.2    Matt, B.J.3    Peralta, R.4
  • 14
    • 0032224440 scopus 로고    scopus 로고
    • Biometric encryption using image processing
    • Optical Security and Counterfeit Deterrence Techniques II, SPIE
    • Soutar C., Roberge D., Stojanov S.A., Gilroy R., and Vijaya Kumar B.V.K. Biometric encryption using image processing. Optical Security and Counterfeit Deterrence Techniques II. Proc. SPIE vol. 3314 (1998), SPIE 178-188
    • (1998) Proc. SPIE , vol.3314 , pp. 178-188
    • Soutar, C.1    Roberge, D.2    Stojanov, S.A.3    Gilroy, R.4    Vijaya Kumar, B.V.K.5
  • 16
    • 26444554928 scopus 로고    scopus 로고
    • Vulnerabilities in biometric encryption systems
    • AVBPA'05, Springer-Verlag
    • Andy A. Vulnerabilities in biometric encryption systems. AVBPA'05. Lecture Notes in Computer Science vol. 3546 (2005), Springer-Verlag 1100-1109
    • (2005) Lecture Notes in Computer Science , vol.3546 , pp. 1100-1109
    • Andy, A.1
  • 19
    • 33845435077 scopus 로고    scopus 로고
    • Capacity and examples of template-protecting biometric authentication systems
    • ECCV Intl. Workshop, BioAW
    • P. Tuyls, J. Gosling, Capacity and examples of template-protecting biometric authentication systems, in: ECCV Intl. Workshop, BioAW, Lecture Notes Computer Science, 2004, pp. 158-170
    • (2004) Lecture Notes Computer Science , pp. 158-170
    • Tuyls, P.1    Gosling, J.2
  • 20
  • 21
    • 0003437939 scopus 로고    scopus 로고
    • Verification watermarks on fingerprint recognition and retrieval
    • Yeung M.M., and Pankanti S. Verification watermarks on fingerprint recognition and retrieval. J. Electron. Imaging 9 (2000) 468-476
    • (2000) J. Electron. Imaging , vol.9 , pp. 468-476
    • Yeung, M.M.1    Pankanti, S.2
  • 23
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images
    • Andrew D.K. Steganalysis of LSB matching in grayscale images. IEEE Signal Process. Lett. 12 (2005) 441-444
    • (2005) IEEE Signal Process. Lett. , vol.12 , pp. 441-444
    • Andrew, D.K.1
  • 24
    • 56449089063 scopus 로고    scopus 로고
    • Multimodal face and fingerprint biometrics authentication on space-limited tokens
    • Khan M.K., and Zhang J. Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 71 (2008) 3026-3031
    • (2008) Neurocomputing , vol.71 , pp. 3026-3031
    • Khan, M.K.1    Zhang, J.2
  • 27
    • 1442273672 scopus 로고    scopus 로고
    • Chaos communications-principles, schemes, and system analysis
    • Abeland A., and Schwarz W. Chaos communications-principles, schemes, and system analysis. Proc. IEEE 90 (2002) 691-710
    • (2002) Proc. IEEE , vol.90 , pp. 691-710
    • Abeland, A.1    Schwarz, W.2
  • 28
    • 27744517664 scopus 로고    scopus 로고
    • Ergodic chaotic parameter modulation with application to digital image watermarking
    • Chen S., and Leung H. Ergodic chaotic parameter modulation with application to digital image watermarking. IEEE Trans. Image Process. 14 (2005) 1590-1602
    • (2005) IEEE Trans. Image Process. , vol.14 , pp. 1590-1602
    • Chen, S.1    Leung, H.2
  • 29
    • 0004082154 scopus 로고    scopus 로고
    • Prentice Hall, Upper Saddle River, NJ
    • Sklar B. Digital Communications (2001), Prentice Hall, Upper Saddle River, NJ
    • (2001) Digital Communications
    • Sklar, B.1
  • 32
    • 71649089822 scopus 로고    scopus 로고
    • A novel robust audio watermarking scheme based on nonuniform discrete Fourier transform
    • Ling X., Jiashu Z., and Hong J.H. A novel robust audio watermarking scheme based on nonuniform discrete Fourier transform. Chinese J. Comput. 9 (2006) 1709-1719
    • (2006) Chinese J. Comput. , vol.9 , pp. 1709-1719
    • Ling, X.1    Jiashu, Z.2    Hong, J.H.3
  • 33
    • 34548620637 scopus 로고    scopus 로고
    • Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
    • Khan J.M., and Zhang K. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 35 (2008) 519-524
    • (2008) Chaos Solitons Fractals , vol.35 , pp. 519-524
    • Khan, J.M.1    Zhang, K.2
  • 34
    • 1842528982 scopus 로고    scopus 로고
    • A chaos-based robust wavelet-domain watermarking algorithm
    • Zhao D., Guanrong C., and Wenbo L. A chaos-based robust wavelet-domain watermarking algorithm. Chaos Solitons Fractals 22 (2004) 47-54
    • (2004) Chaos Solitons Fractals , vol.22 , pp. 47-54
    • Zhao, D.1    Guanrong, C.2    Wenbo, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.