Spiking neural network and wavelets for hiding iris data in digital images

被引:13
|
作者
Hassanien, Aboul Ella [1 ,2 ]
Abraham, Ajith [3 ]
Grosan, Crina [4 ]
机构
[1] Cairo Univ, Dept Informat Technol, FCI, Giza, Egypt
[2] Kuwait Univ, Coll Business Adm, Dept Quantitat Methods & Informat Syst, Safat, Kuwait
[3] Norwegian Univ Sci & Technol, Ctr Quantifiable Qual Serv Commun Syst, N-7491 Trondheim, Norway
[4] Univ Babes Bolyai, Fac Math & Comp Sci, Dept Comp Sci, R-3400 Cluj Napoca, Romania
关键词
FEATURE LINKING; VISUAL-CORTEX; WATERMARKING; AUTHENTICATION; SCHEME;
D O I
10.1007/s00500-008-0324-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper introduces an efficient approach to protect the ownership by hiding the iris data into a digital image for authentication purposes. The idea is to secretly embed an iris code data into the content of the image, which identifies the owner. Algorithms based on Biologically inspired Spiking Neural Networks, called Pulse Coupled Neural Network (PCNN) are first applied to increase the contrast of the human iris image and adjust the intensity with the median filter. It is followed by the PCNN segmentation algorithm to determine the boundaries of the human iris image by locating the pupillary boundary and limbus boundary of the human iris for further processing. A texture segmentation algorithm for isolating the iris from the human eye in a more accurate and efficient manner is presented. A quad tree wavelet transform is first constructed to extract the texture feature. Then, the Fuzzy c-Means (FCM) algorithm is applied to the quad tree in the coarse-to-fine manner by locating the pupillary boundary (inner) and outer (limbus) boundary for further processing. Then, iris codes (watermark) are extracted that characterizes the underlying texture of the human iris by using wavelet theory. Then, embedding and extracting watermarking methods based on Discrete Wavelet Transform (DWT) to insert and extract the generated iris code are presented. The final process deals with the authentication process. In the authentication process, Hamming distance metric that measure the variation between the recorded iris code and the corresponding extracted one from the watermarked image (Stego image) to test weather the Stego image has been modified or not is presented. Simulation results show the effectiveness and efficiency of the proposed approach.
引用
收藏
页码:401 / 416
页数:16
相关论文
共 50 条
  • [1] Spiking neural network and wavelets for hiding iris data in digital images
    Aboul Ella Hassanien
    Ajith Abraham
    Crina Grosan
    Soft Computing, 2009, 13 : 401 - 416
  • [2] Hiding iris data for authentication of digital images using wavelet theory
    Hassanien A.E.
    Pattern Recognition and Image Analysis, 2006, 16 (4) : 637 - 643
  • [3] Robust data hiding for JPEG images with invertible neural network
    Shang, Fei
    Lan, Yuhang
    Yang, Jianhua
    Li, Enping
    Kang, Xiangui
    NEURAL NETWORKS, 2023, 163 : 219 - 232
  • [4] Neural networks-based data hiding in digital images: Overview
    Dzhanashia, Kristina
    Evsutin, Oleg
    NEUROCOMPUTING, 2024, 581
  • [5] Adversarial Data Hiding in Digital Images
    Wang, Dan
    Li, Ming
    Zhang, Yushu
    ENTROPY, 2022, 24 (06)
  • [6] Multisource Data Hiding in Digital Images
    Wang, Zichi
    SYMMETRY-BASEL, 2022, 14 (05):
  • [7] Spiking neural network based scrambled watermark hiding in low-frequency region of digital image
    Malik, Sunesh
    Kishore, R. Rama
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2020, 41 (02): : 437 - 459
  • [8] Data hiding for digital halftoned color images
    Long, Lu
    Nishihara, Akinori
    TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 1762 - +
  • [9] A Digital Neuromorphic Hardware for Spiking Neural Network
    Fan, Yuanning
    Zou, Chenglong
    Liu, Kefei
    Kuang, Yisong
    Cui, Xiaoxin
    2019 IEEE INTERNATIONAL CONFERENCE ON ELECTRON DEVICES AND SOLID-STATE CIRCUITS (EDSSC), 2019,
  • [10] Study on Reversible Data Hiding Scheme for Digital Images
    Jing, Yu
    Wei, Song
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 3, 2010, : 357 - 360