Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/3948
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ntalianis, Klimis S. | - |
dc.contributor.author | Tsapatsoulis, Nicolas | - |
dc.contributor.author | Drigas, Athanasios | - |
dc.date.accessioned | 2013-02-05T17:08:15Z | en |
dc.date.accessioned | 2013-05-17T09:55:50Z | - |
dc.date.accessioned | 2015-12-09T10:25:30Z | - |
dc.date.available | 2013-02-05T17:08:15Z | en |
dc.date.available | 2013-05-17T09:55:50Z | - |
dc.date.available | 2015-12-09T10:25:30Z | - |
dc.date.issued | 2011 | - |
dc.identifier.citation | Eurasip journal on information security, 2011, vol. 2011 | en_US |
dc.identifier.issn | 2510523X | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14279/3948 | - |
dc.description.abstract | An automatic video-object oriented steganographic system is proposed for biometrics authentication over error-prone networks. Initially, the host video object is automatically extracted through analysis of videoconference sequences. Next, the biometric pattern corresponding to the segmented video object is encrypted by a chaotic cipher module. Afterwards, the encrypted biometric signal is inserted to the most significant wavelet coefficients of the video object, using its qualified significant wavelet trees (QSWTs). QSWTs provide both invisibility and significant resistance against lossy transmission and compression, conditions that are typical in error prone networks. Finally, the inverse discrete wavelet transform (IDWT) is applied to provide the stego-object. Experimental results under various losses and JPEG compression ratios indicate the security, robustness, and efficiency of the proposed biometrics hiding system | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.relation.ispartof | Eurasip journal on information security | en_US |
dc.rights | © Klimis Ntalianis et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited | en_US |
dc.subject | Biometrics | en_US |
dc.subject | Authentication | en_US |
dc.subject | Biometric cryptosystems | en_US |
dc.title | Video-object oriented biometrics hiding for user authentication under error-prone transmissions | en_US |
dc.type | Article | en_US |
dc.collaboration | NCSR Demokritos | en_US |
dc.collaboration | Cyprus University of Technology | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.journals | Open Access | en_US |
dc.review | Peer Reviewed | - |
dc.country | Cyprus | en_US |
dc.country | Greece | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.identifier.doi | 10.1155/2011/174945 | en_US |
dc.dept.handle | 123456789/126 | en |
dc.relation.volume | 2011 | en_US |
cut.common.academicyear | 2010-2011 | en_US |
item.grantfulltext | open | - |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
item.openairetype | article | - |
crisitem.author.dept | Department of Communication and Marketing | - |
crisitem.author.faculty | Faculty of Communication and Media Studies | - |
crisitem.author.orcid | 0000-0002-6739-8602 | - |
crisitem.author.parentorg | Faculty of Communication and Media Studies | - |
Appears in Collections: | Άρθρα/Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Tsapatsoulis.pdf | 5.85 MB | Adobe PDF | View/Open |
CORE Recommender
SCOPUSTM
Citations
9
checked on Nov 9, 2023
Page view(s) 20
472
Last Week
1
1
Last month
3
3
checked on Dec 22, 2024
Download(s)
345
checked on Dec 22, 2024
Google ScholarTM
Check
Altmetric
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.