In this paper we propose a watermarking based two-stage authentication framework to enhance biometric system security. The face feature of one individual is embedded into his/her fingerprint image as credibility token...
详细信息
ISBN:
(纸本)9781467322164
In this paper we propose a watermarking based two-stage authentication framework to enhance biometric system security. The face feature of one individual is embedded into his/her fingerprint image as credibility token. During authentication, the watermark is first extracted to establish data authenticity. If legitimate, the face pattern can further serve as supplemental trait in biometric authentication progress. A wavelet quantization based watermarking method is proposed to robustly embed information in fingerprints while preserving their discriminating features. Meanwhile, a sparse representation based classifier is adopted to efficiently exploit the identity information within face watermarks. Experimental results which evaluate both watermarking and biometric authentication performance demonstrate the effectiveness of this work.
Efficient video transmission over unreliable channels may encounter huge challenge due to unavoidable bit error or packets loss. Error concealment (EC) techniques at the decoder side have been developed to recover the...
详细信息
The H∞ approach is used for the clearance of flight control laws when some parameters in the flight control system vary in a certain range. The proposed H∞ approach is developed from general H∞ theory and is applie...
详细信息
The H∞ approach is used for the clearance of flight control laws when some parameters in the flight control system vary in a certain range. The proposed H∞ approach is developed from general H∞ theory and is applied to the clearance of a flight control law for a missile. Based on bounded real lemma, two theorems about clearance are deduced, and the clearance problem is transformed to a general linear matrix inequality problem. A BTT missile is chosen as an example to test the proposed method. The simulation result shows that the proposed method is convenient and efficient.
Super-resolution (SR) reconstruction technique is mainly a task of reconstructing high resolution images from a sequence of low resolution images. The super-resolution technique for H.264 compressed video has been foc...
详细信息
FEC-based multiple description coding (MDC) is an effective method for the transmission of scalable video stream over noisy network. However, given the transmission bandwith, it's time-consuming to find the optima...
详细信息
Virtual view rendering has great importance in 3-D display. In order to get high-quality image of an arbitrary view from 2-D source image, improvement on depth-image based rendering (DIBR) is studied in this paper. By...
详细信息
This paper proposes an improved image interpolation method based on the soft-decision adaptive interpolation (SAI) algorithm. Natural images often contain repeatable patterns and structures throughout the image, which...
详细信息
Paper uses symbolic dynamics to study heartbeat time series from the normal subjects, patients with congestive heart failure and cardiac arrest patients. The results show that entropy value of normal people's hear...
详细信息
The poor grammatical output of Machine Translation (MT) systems appeals syntax-based approaches within language modeling. However, previous studies showed that syntax-based language modeling using (Context- Free) Tree...
详细信息
Treebanks are valuable resources for syntactic parsing. For some languages such as Chinese, we can obtain multiple constituency treebanks which are developed by different organizations. However, due to discrepancies o...
详细信息
暂无评论