10 research outputs found

    Security of Biometric Data Using Compressed Watermarking Technique

    Get PDF
    This paper has focus on biometric data security over open communication channel of biometric system. Here biometric data is encoded using cs theory and wavelet based embedding technique. The biometric data is convert into encoded sparse measurements which is generating using SVD, random seed and uniform quantization process. Then these encoded sparse measurements are embedding into the host color biometric data using wavelet based watermarking technique. This proposed technique has explored dimension reduction and computational security provided by compressive sensing. This proposed technique has also helps to compressed and to send secret data over noisy communication channel of biometric system against various attacks. The proposed technique provides more security compare to existed technique in literature due to CS theory. The novelty of proposed technique is that, watermark iris image information is compressed and encoded using CS theory and uniform quantization.DOI:http://dx.doi.org/10.11591/ijece.v4i5.664

    Performance analysis of massive multiple input multiple output for high speed railway

    Get PDF
    This paper analytically reviews the performance of massive multiple input multiple output (MIMO) system for communication in highly mobility scenarios like high speed Railways. As popularity of high speed train increasing day by day, high data rate wireless communication system for high speed train is extremely required. 5G wireless communication systems must be designed to meet the requirement of high speed broadband services at speed of around 500 km/h, which is the expected speed achievable by HSR systems, at a data rate of 180 Mbps or higher. Significant challenges of high mobility communications are fast time-varying fading, channel estimation errors, doppler diversity, carrier frequency offset, inter carrier interference, high penetration loss and fast and frequent handovers. Therefore, crucial requirement to design high mobility communication channel models or systems prevails. Recently, massive MIMO techniques have been proposed to significantly improve the performance of wireless networks for upcoming 5G technology. Massive MIMO provide high throughput and high energy efficiency in wireless communication channel. In this paper, key findings, challenges and requirements to provide high speed wireless communication onboard the high speed train is pointed out after thorough literature review. In last, future research scope to bridge the research gap by designing efficient channel model by using massive MIMO and other optimization method is mentioned

    Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    Get PDF
    Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to secure vulnerable point like protection of biometric templates at the communication channel of biometric authentication systems. A compressive sensing theory procedure is used for generation of sparse information on watermark biometric data using detail wavelet coefficients. Then sparse information of watermark biometric data is embedded into DCT coefficients of host biometric data. This proposed scheme is robust to common signal processing and geometric attacks like JPEG compression, adding noise, filtering, and cropping, histogram equalization. This proposed scheme has more advantages and high quality measures compared to existing schemes in the literature

    Advance compression and watermarking technique for speech signals

    No full text

    Robust watermarking technique using different wavelet decomposition levels for signature image protection

    Get PDF
    This paper proposed a non-blind watermarking technique based on different wavelet decomposition levels for biometric image protection.In this technique, a biometric image is used as a watermark instead of a standard image, logo or random noise pattern type watermark.For watermark embedding, the original host image and the watermark biometric image are transformed into various levels of wavelet coefficients.The watermark biometric image is embedded into the host image by modifying the values of the wavelet coefficients of the host image using the values of wavelet coefficients of the watermark biometric image.Experimental results demonstrated that the proposed technique was able to withstand various watermarking attacks. The novelty of the proposed technique is that it is used to transform coefficients of the watermark biometric image instead of the Pseudo Noise sequences or any other feature extraction technique

    ROBUST WATERMARKING TECHNIQUE USING DIFFERENT WAVELET DECOMPOSITION LEVELS FOR SIGNATURE IMAGE PROTECTION

    Get PDF
    This paper proposed a non-blind watermarking technique based on different wavelet decomposition levels for biometric image protection. In this technique, a biometric image is used as a watermark instead of a standard image, logo or random noise pattern type watermark. For watermark embedding, the original host image and the watermark biometric image are transformed into various levels of wavelet coefficients. The watermark biometric image is embedded into the host image by modifying the values of the wavelet coefficients of the host image using the values of wavelet coefficients of the watermark biometric image. Experimental results demonstrated that the proposed technique was able to withstand various watermarking attacks. The novelty of the proposed technique is that it is used to transform coefficients of the watermark biometric image instead of the Pseudo Noise sequences or any other feature extraction technique.

    An efficient medical image watermarking scheme based on FDCuT–DCT

    No full text
    In this paper, a blind medical image watermarking scheme based on Fast Discrete Curvelet Transform (FDCuT) and Discrete Cosine Transform (DCT) is proposed. FDCuT is applied on the medical image to get different frequency coefficients of its curvelet decomposition. On the high frequency curvelet coefficients of the medical image, block wise DCT is applied to get different frequency coefficients. Then mid band frequency coefficients of the medical image are modified by White Gaussian Noise (WGN) sequences according to watermark bit to get watermarked medical image. At extraction end, blind recovery of watermark data is performed by correlation of WGN sequences. The proposed scheme is tested for its effectiveness on various types of medical images such as X-ray, Ultrasound (US), Magnetic Resonant Imaging (MRI) and Computerized Tomography (CT). Result analysis shows that imperceptibility of watermarked medical image is better as PSNR is above 45 dB for all types of the medical images. In addition, the robustness of the scheme is better than an existing scheme for a similar set of medical images in terms of Normalized Correlation (NC). Experimental results show that scheme is robust to geometric attacks, signal processing attacks and JPEG compression attacks. An analysis is also carried out to verify the performance of the proposed scheme to support binary watermarks with different details in it: text and logos. Moreover, the proposed scheme resulted in zero false positive rate when tested on 100 non-watermarked images

    Performance Analysis of Various 5G Mobile Architectures

    No full text
    The field of Telecommunication has progressed and emerged to be a successful field of technology. From communicating via pigeons and cannon balls to video conferencing for a meeting, the communication has improved surpassing every user’s expectation. With the introduction of wireless communication, the field of communication took a different turn. Just when we thought we reached the zenith of wireless communication, an esoteric concept of StandAlone (S.A.) and Non-StandAlone (N.S.A.) opened the gates to a more efficient communication, expanding the horizons of technology. The 5G network has started developing over some regions in the world but the real question remains; which is, whether an efficient communication is worth the economy spent on developing it or certain advantages of this networks should be given up to protect the country’s economy.The 3rd  Generation Partnership Project (3GPP) presents two essential architecture for 5G deployment from LTE: Non-Standalone (NSA) and Standalone (SA). NSA empowers quick 5G benefit arrangement with minimum investment by leveraging the existing LTE infrastructures. SA comprises of a single Radio Access Technology (RAT), meaning it is conceivable to supply full 5G upgrades designed to work only in the 5G New Radio (NR) This analytical paper elaborates the performance of these two architectures for the implementation of 5G cellular technology, where in the first one would be highly technology centric approach with less cost efficiency and the other one would be the economy savvy aspect with little bit negotiation with technology upgrade
    corecore