9783319892399-3319892398-Multibiometric Watermarking with Compressive Sensing Theory: Techniques and Applications (Signals and Communication Technology)

Multibiometric Watermarking with Compressive Sensing Theory: Techniques and Applications (Signals and Communication Technology)

ISBN-13: 9783319892399
ISBN-10: 3319892398
Edition: Softcover reprint of the original 1st ed. 2018
Author: Rohit M. Thanki
Publication date: 2019
Publisher: Springer
Format: Paperback 193 pages
FREE US shipping

Book details

ISBN-13: 9783319892399
ISBN-10: 3319892398
Edition: Softcover reprint of the original 1st ed. 2018
Author: Rohit M. Thanki
Publication date: 2019
Publisher: Springer
Format: Paperback 193 pages

Summary

Multibiometric Watermarking with Compressive Sensing Theory: Techniques and Applications (Signals and Communication Technology) (ISBN-13: 9783319892399 and ISBN-10: 3319892398), written by authors Rohit M. Thanki, was published by Springer in 2019. With an overall rating of 3.5 stars, it's a notable title among other books. You can easily purchase or rent Multibiometric Watermarking with Compressive Sensing Theory: Techniques and Applications (Signals and Communication Technology) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book