Spiking neural network and wavelets for hiding iris data in digital images

被引:13
作者
Hassanien, Aboul Ella [1 ,2 ]
Abraham, Ajith [3 ]
Grosan, Crina [4 ]
机构
[1] Cairo Univ, Dept Informat Technol, FCI, Giza, Egypt
[2] Kuwait Univ, Coll Business Adm, Dept Quantitat Methods & Informat Syst, Safat, Kuwait
[3] Norwegian Univ Sci & Technol, Ctr Quantifiable Qual Serv Commun Syst, N-7491 Trondheim, Norway
[4] Univ Babes Bolyai, Fac Math & Comp Sci, Dept Comp Sci, R-3400 Cluj Napoca, Romania
关键词
FEATURE LINKING; VISUAL-CORTEX; WATERMARKING; AUTHENTICATION; SCHEME;
D O I
10.1007/s00500-008-0324-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper introduces an efficient approach to protect the ownership by hiding the iris data into a digital image for authentication purposes. The idea is to secretly embed an iris code data into the content of the image, which identifies the owner. Algorithms based on Biologically inspired Spiking Neural Networks, called Pulse Coupled Neural Network (PCNN) are first applied to increase the contrast of the human iris image and adjust the intensity with the median filter. It is followed by the PCNN segmentation algorithm to determine the boundaries of the human iris image by locating the pupillary boundary and limbus boundary of the human iris for further processing. A texture segmentation algorithm for isolating the iris from the human eye in a more accurate and efficient manner is presented. A quad tree wavelet transform is first constructed to extract the texture feature. Then, the Fuzzy c-Means (FCM) algorithm is applied to the quad tree in the coarse-to-fine manner by locating the pupillary boundary (inner) and outer (limbus) boundary for further processing. Then, iris codes (watermark) are extracted that characterizes the underlying texture of the human iris by using wavelet theory. Then, embedding and extracting watermarking methods based on Discrete Wavelet Transform (DWT) to insert and extract the generated iris code are presented. The final process deals with the authentication process. In the authentication process, Hamming distance metric that measure the variation between the recorded iris code and the corresponding extracted one from the watermarked image (Stego image) to test weather the Stego image has been modified or not is presented. Simulation results show the effectiveness and efficiency of the proposed approach.
引用
收藏
页码:401 / 416
页数:16
相关论文
共 48 条
[1]  
Ali JMH, 2006, NEURAL NETW WORLD, V16, P129
[2]  
[Anonymous], 1993, Wavelets: algorithms & applications
[3]   A singular-value decomposition-based image watermarking using genetic algorithm [J].
Aslantas, Veysel .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2008, 62 (05) :386-394
[4]   Copyright protection for the electronic distribution of text documents [J].
Brassil, JT ;
Low, S ;
Maxemchuk, NF .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1181-1196
[5]   Lossless watermarking for image authentication: A new framework and an implementation [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (04) :1042-1049
[6]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[7]   Robust authentication scheme for protecting copyrights of images and graphics [J].
Chang, CC ;
Hwang, KF ;
Hwang, MS .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (01) :43-50
[8]  
Chen P.Y., 2006, INT J APPL SCI ENG, V4, P275, DOI DOI 10.6703/IJASE/2006.4(3).275
[9]  
Coifman RR., 1990, Signal processing and compression with wavelets packets, Technical report
[10]  
Cox I., 2001, Digital Watermarking