Spiking neural network and wavelets for hiding iris data in digital images

被引:13
|
作者
Hassanien, Aboul Ella [1 ,2 ]
Abraham, Ajith [3 ]
Grosan, Crina [4 ]
机构
[1] Cairo Univ, Dept Informat Technol, FCI, Giza, Egypt
[2] Kuwait Univ, Coll Business Adm, Dept Quantitat Methods & Informat Syst, Safat, Kuwait
[3] Norwegian Univ Sci & Technol, Ctr Quantifiable Qual Serv Commun Syst, N-7491 Trondheim, Norway
[4] Univ Babes Bolyai, Fac Math & Comp Sci, Dept Comp Sci, R-3400 Cluj Napoca, Romania
关键词
FEATURE LINKING; VISUAL-CORTEX; WATERMARKING; AUTHENTICATION; SCHEME;
D O I
10.1007/s00500-008-0324-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper introduces an efficient approach to protect the ownership by hiding the iris data into a digital image for authentication purposes. The idea is to secretly embed an iris code data into the content of the image, which identifies the owner. Algorithms based on Biologically inspired Spiking Neural Networks, called Pulse Coupled Neural Network (PCNN) are first applied to increase the contrast of the human iris image and adjust the intensity with the median filter. It is followed by the PCNN segmentation algorithm to determine the boundaries of the human iris image by locating the pupillary boundary and limbus boundary of the human iris for further processing. A texture segmentation algorithm for isolating the iris from the human eye in a more accurate and efficient manner is presented. A quad tree wavelet transform is first constructed to extract the texture feature. Then, the Fuzzy c-Means (FCM) algorithm is applied to the quad tree in the coarse-to-fine manner by locating the pupillary boundary (inner) and outer (limbus) boundary for further processing. Then, iris codes (watermark) are extracted that characterizes the underlying texture of the human iris by using wavelet theory. Then, embedding and extracting watermarking methods based on Discrete Wavelet Transform (DWT) to insert and extract the generated iris code are presented. The final process deals with the authentication process. In the authentication process, Hamming distance metric that measure the variation between the recorded iris code and the corresponding extracted one from the watermarked image (Stego image) to test weather the Stego image has been modified or not is presented. Simulation results show the effectiveness and efficiency of the proposed approach.
引用
收藏
页码:401 / 416
页数:16
相关论文
共 50 条
  • [21] Reserve Room Based Reversible Data Hiding in Digital Images
    Shripriyadharshini, T. S. K.
    Yohalakshmi, S.
    Deepa, S.
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [22] A novel approach to a high capacity data hiding in digital images
    Charkari, Nasrollah Moghaddam
    Chahooki, Mohammad Ali Zare
    Radmanesh, Mehrdad
    2007 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, VOLS 1-3, 2007, : 550 - 553
  • [23] Digital Implementation of a Spiking Convolutional Neural Network for Tumor Detection
    Adineh-vand, Ayoub
    Karimi, Gholamreza
    Khazaei, Mozafar
    INFORMACIJE MIDEM-JOURNAL OF MICROELECTRONICS ELECTRONIC COMPONENTS AND MATERIALS, 2019, 49 (04): : 193 - 201
  • [24] Digital Implementation of the Spiking Neural Network and Its Digit Recognition
    Kuang, Zaibo
    Wang, Jiang
    Yang, Shuangming
    Yi, Guosheng
    Deng, Bin
    Wei, Xile
    PROCEEDINGS OF THE 2019 31ST CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2019), 2019, : 3621 - 3625
  • [25] Hardware implementation of the simplified digital spiking neural network on FPGA
    Lee K.
    Kim Y.
    IEIE Transactions on Smart Processing and Computing, 2019, 8 (05): : 405 - 414
  • [26] Studying on Improved Spiking Neural Network in Handwritten Digital Recognition
    Jia, Lan
    Miao, Hongxia
    Qi, Bensheng
    2018 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION, 2019, 252
  • [27] A Reconfigurable Spiking Neural Network Digital ASIC Simulation and Implementation
    Van Sickle, Kevin
    Abdel-Aty-Zohdy, Hoda
    NAECON: PROCEEDINGS OF THE IEEE 2009 NATIONAL AEROSPACE & ELECTRONICS CONFERENCE, 2009, : 275 - 280
  • [28] A Spiking Neural Network Chip for Odor Data Classification
    Hsieh, Hung-Yi
    Tang, Kea-Tiong
    2012 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS), 2012, : 88 - 91
  • [29] An Implementation of a Spiking Neural Network Using Digital Spiking Silicon Neuron Model on a SIMD Processor
    Hori, Sansei
    Zapata, Mireya
    Madrenas, Jordi
    Morie, Takashi
    Tamukoh, Hakaru
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2017, PT I, 2017, 10613 : 437 - 438
  • [30] Spiking Neural Network Performs Discrete Cosine Transform for Visual Images
    Wu, Qingxiang
    McGinnity, T. M.
    Maguire, Liam
    Ghani, Arfan
    Condell, Joan
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2009, 5755 : 21 - 29