scholarly journals BACKWARDS COMPATIBLE, MULTI-LEVEL REGIONS-OF-INTEREST (ROI) IMAGE ENCRYPTION ARCHITECTURE WITH BIOMETRIC AUTHENTICATION

2020 ◽  
pp. 189-217
Author(s):  
Sakshi Dhall ◽  
Saibal K. Pal ◽  
Kapil Sharma

2019 ◽  
Author(s):  
Marcelo Vilela Vizoni ◽  
Aparecido Nilceu Marana

This paper presents a new method for person authentication that relies on the fusion of two biometric authentication methods based, respectively, on ocular deep features and facial deep features. In our work, the deep features are extracted from the regions of interest by using a very deep CNN (Convolutional Neural Network). Another interesting aspect of our work is that, instead of using directly the deep features as input for the authentication methods, we use the difference between the probe and gallery deep features. So, our method adopts a pairwise strategy. Support Vector Machine classifiers are trained separately for each approach. The fusion of the ocular and the facial based methods are carried out in the score level. The proposed method was assessed with a facial database taken under uncontrolled environment and reached good results. Besides, the fusion strategy proposed in this work showed better results than the results obtained by each individual method.


2007 ◽  
Author(s):  
Emanuele Maiorana ◽  
Patrizio Campisi ◽  
Alessandro Neri

Author(s):  
Shalini Stalin ◽  
Priti Maheshwary ◽  
Piyush Kumar Shukla ◽  
Akhilesh Tiwari ◽  
Ankur Khare

In last few decades, a lot of work has been done in the field of cryptography; it is being considered one of the safe methods to protect data. It was first used to protect communication by individuals, armies, and organizational companies. With the help encryption method, anyone can protect their data from a third-party attack. Images are used in various areas like biometric authentication, medical science, military, etc., where they are being stored or transferred over the network and the safety of such images are very important. The newest movement in encryption is chaos-based, which is a better encryption technique than AES, DES, RSA, etc. It consists of different property such as sensitive independence on original situation, non-periodicity, non-convergence, etc. In recent times, many chaos-based image encryption algorithms have been proposed, but most of them are not sufficient to provide full protection to data. In this chapter, a survey of different chaos-based image encryption techniques is discussed.


Author(s):  
Shalini Stalin ◽  
Priti Maheshwary ◽  
Piyush Kumar Shukla ◽  
Akhilesh Tiwari ◽  
Ankur Khare

In last few decades, a lot of work has been done in the field of cryptography; it is being considered one of the safe methods to protect data. It was first used to protect communication by individuals, armies, and organizational companies. With the help encryption method, anyone can protect their data from a third-party attack. Images are used in various areas like biometric authentication, medical science, military, etc., where they are being stored or transferred over the network and the safety of such images are very important. The newest movement in encryption is chaos-based, which is a better encryption technique than AES, DES, RSA, etc. It consists of different property such as sensitive independence on original situation, non-periodicity, non-convergence, etc. In recent times, many chaos-based image encryption algorithms have been proposed, but most of them are not sufficient to provide full protection to data. In this chapter, a survey of different chaos-based image encryption techniques is discussed.


Sign in / Sign up

Export Citation Format

Share Document