Spiking neural network and wavelets for hiding iris data in digital images

被引:13
|
作者
Hassanien, Aboul Ella [1 ,2 ]
Abraham, Ajith [3 ]
Grosan, Crina [4 ]
机构
[1] Cairo Univ, Dept Informat Technol, FCI, Giza, Egypt
[2] Kuwait Univ, Coll Business Adm, Dept Quantitat Methods & Informat Syst, Safat, Kuwait
[3] Norwegian Univ Sci & Technol, Ctr Quantifiable Qual Serv Commun Syst, N-7491 Trondheim, Norway
[4] Univ Babes Bolyai, Fac Math & Comp Sci, Dept Comp Sci, R-3400 Cluj Napoca, Romania
关键词
FEATURE LINKING; VISUAL-CORTEX; WATERMARKING; AUTHENTICATION; SCHEME;
D O I
10.1007/s00500-008-0324-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper introduces an efficient approach to protect the ownership by hiding the iris data into a digital image for authentication purposes. The idea is to secretly embed an iris code data into the content of the image, which identifies the owner. Algorithms based on Biologically inspired Spiking Neural Networks, called Pulse Coupled Neural Network (PCNN) are first applied to increase the contrast of the human iris image and adjust the intensity with the median filter. It is followed by the PCNN segmentation algorithm to determine the boundaries of the human iris image by locating the pupillary boundary and limbus boundary of the human iris for further processing. A texture segmentation algorithm for isolating the iris from the human eye in a more accurate and efficient manner is presented. A quad tree wavelet transform is first constructed to extract the texture feature. Then, the Fuzzy c-Means (FCM) algorithm is applied to the quad tree in the coarse-to-fine manner by locating the pupillary boundary (inner) and outer (limbus) boundary for further processing. Then, iris codes (watermark) are extracted that characterizes the underlying texture of the human iris by using wavelet theory. Then, embedding and extracting watermarking methods based on Discrete Wavelet Transform (DWT) to insert and extract the generated iris code are presented. The final process deals with the authentication process. In the authentication process, Hamming distance metric that measure the variation between the recorded iris code and the corresponding extracted one from the watermarked image (Stego image) to test weather the Stego image has been modified or not is presented. Simulation results show the effectiveness and efficiency of the proposed approach.
引用
收藏
页码:401 / 416
页数:16
相关论文
共 50 条
  • [31] Spiking neural network classification of X-ray chest images
    Gatti, Marco
    Barbato, Jessica Amianto
    Zandron, Claudio
    KNOWLEDGE-BASED SYSTEMS, 2025, 314
  • [32] A neural network approach to digital data hiding based on the perceptual masking model of the human vision system
    Najafi, Hossein L.
    INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2010, 3 (03) : 391 - 409
  • [33] Edge detection of leucocythemia marrow images based on spiking neural network
    Lin, Xuan
    Li, Hui
    Cai, Jianyong
    Wu, Qingxiang
    Zhongguo Jiguang/Chinese Journal of Lasers, 2009, 36 (SUPPL. 2): : 346 - 349
  • [34] Efficient classification method for hyperspectral images based on spiking neural network
    Qu, Haicheng
    Mu, Minjia
    Shan, Yimeng
    JOURNAL OF APPLIED REMOTE SENSING, 2024, 18 (03)
  • [35] Enlargement of digital images by using neural network
    Ren DeXin
    Zhao JiuFen
    Zhao JiuLing
    Wang ShunHong
    ISDA 2006: SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 1, 2006, : 68 - 71
  • [36] Genetic algorithms based data hiding scheme for digital images with LSBMR
    Siva Raja, P.M.
    Baburaj, E.
    International Journal of Information and Computer Security, 2014, 6 (01) : 51 - 62
  • [37] DATA HIDING FOR QUALITY ACCESS CONTROL AND ERROR CONCEALMENT IN DIGITAL IMAGES
    Phadikar, Amit
    Maity, Santi P.
    Delpha, Claude
    2011 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2011,
  • [38] RNS-BASED EMBEDDING SCHEME FOR DATA HIDING IN DIGITAL IMAGES
    Yao, Yi
    Zhou, Jun
    Yan, Bo
    Li, Yuqian
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1480 - 1483
  • [39] A New Data Hiding Algorithm Based on Direction Vector for Digital Images
    Tuncer, Turker
    Aver, Engin
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 1753 - 1756
  • [40] Hessenberg factorization and firework algorithms for optimized data hiding in digital images
    Gaata, Methaq Talib
    Younis, Muhanad Tahrir
    Hasoon, Jamal N.
    Mostafa, Salama A.
    JOURNAL OF INTELLIGENT SYSTEMS, 2022, 31 (01) : 440 - 453