Professional Documents
Culture Documents
Project phase-II
Project Review-2 [LDNP43] on:
Remote Authentication using Biometrics
Presented By:
Chaitra.P (1DA17LDN01)
Guide :
Sudha.H.Thimmaiah
Assoc.Prof
COMPANY /
GUIDES JOB TITLE INSTITUTION
Guide Dr. Ambedkar Institute of
Sudha.H.Thimmaiah Assoc. Professor
Technology
• The proposed scheme is a Positive Authentication System and for security reasons
elements from at least two, and preferably all three, factors like (Ownership,
Knowledge, Inherence ) should be verified.
• The Lossless image compression is mostly used in DWT Lossless image compression give the good
quality of the image and also the compression ratio of the image also good. The PSNR (Peak Signal
to Noise Ratio) ratio of the image is also good in the Lossless compression.
• In the DWT transformation, the image is taking into HL, LH, HH, LL Ratios. Then the image is
moved into DWT transforms, and then DWT Quantization is processed. After that the process is
move to DPCM encoder. (Differential Pulse Code Modulation)
• This technique first decomposes an image into coefficients called sub-bands and then the
resulting coefficients are compared with a threshold. Coefficients below the threshold are set to
zero. Finally, the coefficients above the threshold value are encoded with a loss less compression
technique.
• In signal processing using Fourier transform, the signal is decomposed into a series of sines or
cosines. It is impossible to know simultaneously the exact frequency and the exact time of
occurrence of that particular frequency in a signal.
• In order to know the frequency, the signal must be spread in time, or vice versa. A solution is to split
the signal up into components that are not sine or cosine waves.
• A single function and its dilations and translations may be used to generate a set of ortho-normal
basis functions to represent a signal. This would help to condense the information in both the time
and frequency domains. This idea led to the introduction of wavelets.
(An Ortho-normal basis for an inner product space V with finite dimension is a basis for V whose
vectors are ortho-normal, that is, they are all unit vectors and orthogonal to each other.)
Morlet Wavelet
Translation of a Wavelet Scaling of a Wavelet
• From this reason two dimensional signal processing is an area of efficient applications of Haar
transforms due to their wavelet– like structure.
• Modern cameras are capable of producing images with resolutions in the range of tens of
megapixels. These images need to be compressed before storage and transfer.
• The Haar transform can be used for image compression. The basic idea is to transfer the image
into a matrix in which each element of the matrix represents a pixel in the image. For example, a
256×256 matrix is saved for a 256×256 image. JPEG image compression involves cutting the
original image into 8×8 sub-images. Each sub-image is an 8×8 matrix.
• The 2-D Haar transform is required. The equation of the Haar transform is
where is a n × n matrix and is n-point Haar transform. The inverse Haar transform is
• Image compression is minimizing the size in bytes of a graphics file without degrading the
quality of the image to an unacceptable level.
• The reduction in file size allows more images to be stored in a given amount of disk or
memory space. It also reduces the time required for images to be sent over the Internet or
downloaded from Web pages.
— Image Processing refers to processing an image into digital image. Image Compression is
reducing the amount of data necessary to denote the digital image. Image Compression techniques
to reduce redundancy in raw Image.
Fig1:Image Compression
Dr.AIT ,Department of TCE ,MTECH,DCN
14
Discrete Cosine Transform (DCT)
• The discrete cosine transform (DCT) represents an image as a sum of sinusoids of
varying magnitudes and frequencies. The dct2 function computes the two-
dimensional discrete cosine transform (DCT) of an image.
• The DCT has the property that, for a typical image, most of the visually significant
information about the image is concentrated in just a few coefficients of the DCT.
For this reason, the DCT is often used in image compression applications
Step 1: Load encrypted video with hidden data and convert it into frames
Step 2: Decompress the video
Step 3: Apply QSWT detection module
Step 4: Enter the decryption password and decrypt biometric signal
Step 5: Extract original biometric signal
2. Histogram Results of biometric Image and Encrypted Image are also plotted
Tasks to be Completed:
1. The Secret Image and Cover Image must be separated .
2. The Host Video Object is stored.
• A correlation matrix is used as a way to summarize data, as an input into a more advanced
analysis, and as a diagnostic for advanced analyses.
Histogram
• An image histogram is a chart that shows the distribution of intensities in an indexed or grayscale image.
• Biometric signals enter more and more into our everyday lives, since governments,
as well as other organizations, resort to their use in accomplishing crucial
procedures (e.g. citizen authentication). Thus there is an urgent need to further
develop and integrate biometric authentication techniques into practical
applications.
• The use of DWT Watermarking and DCT Compression provides high levels of
robustness, keeping at the same time the ease of implementation and the
compatibility to well-known and widely used Image and Video compression