25 research outputs found

    A Novel DWT-CT approach in Digital Watermarking using PSO

    Get PDF
    The importance of watermarking is dramatically enhanced due to the promising technologies like Internet of Things (IoT), Data analysis, and automation of identification in many sectors. Due to these reasons, systems are inter-connected through networking and internet and huge amounts of information is generated, distributed and transmitted over the World Wide Web. Thus authentication of the information is a challenging task. The algorithm developed for the watermarking needs to be robust against various attack such as salt & peppers, filtering, compression and cropping etc. This paper focuses on the robustness of the algorithm by using a hybrid approach of two transforms such as Contourlet, Discrete Wavelet Transform (DWT). Also, the Particle Swarm Optimization (PSO) is used to optimize the embedding strength factor. The proposed digital watermarking algorithm has been tested against common types of image attacks. Experiment results for the proposed algorithm gives better performance by using similarity metrics such as NCC (Normalized Cross Correlation value) and PSNR (Peak Signal to Noise Ratio)

    Optimization of Three-dimensional Face Recognition Algorithms in Financial Identity Authentication

    Get PDF
    Identity authentication is one of the most basic components in the computer network world. It is the key technology of information security. It plays an important role in the protection of system and data security. Biometric recognition technology provides a reliable and convenient way for identity authentication. Compared with other biometric recognition technologies, face recognition has become a hot research topic because of its convenience, friendliness and easy acceptance. With the maturity and progress of face recognition technology, its commercial application has become more and more widespread. Internet finance, e-commerce and other asset-related areas have begun to try to use face recognition technology as a means of authentication, so people’s security needs for face recognition systems are also increasing. However, as a biometric recognition system, face recognition system still has inherent security vulnerabilities and faces security threats such as template attack and counterfeit attack. In view of this, this paper studies the application of threedimensional face recognition algorithm in the field of financial identity authentication. On the basis of feature extraction of face information using neural network algorithm, K-L transform is applied to image high-dimensional vector mapping to make face recognition clearer. Thus, the image loss can be reduced
    corecore