You are on page 1of 27

DEPARTMENT OF TELECOMMUNICATION ENGINEERING

Dr. AMBEDKAR INSTITUTE OF TECHNOLOGY


(An Autonomous Institute Affiliated to VTU)
Near Jnana Bharathi Campus, Bengaluru – 560056

Project phase-II
Project Review-2 [LDNP43] on:
Remote Authentication using Biometrics

Presented By:
Chaitra.P (1DA17LDN01)

Guide :
Sudha.H.Thimmaiah
Assoc.Prof
COMPANY /
GUIDES JOB TITLE INSTITUTION
Guide Dr. Ambedkar Institute of
Sudha.H.Thimmaiah Assoc. Professor
Technology

Co-Guide and Usharani M.A. Asst. Professor Dr. Ambedkar Institute of


Examiner Technology

Dr.AIT ,Department of TCE ,MTECH,DCN


2
Highlights of Review-1….

Dr.AIT ,Department of TCE ,MTECH,DCN


3
Highlights of Review-1….

Dr.AIT ,Department of TCE ,MTECH,DCN 4


Highlights of Review-1….
• Results

Dr.AIT ,Department of TCE ,MTECH,DCN 5


The two main directions in the authentication field are positive and negative authentication.

• Positive authentication is well-established and it is applied by the majority of existing


authentication systems.
• Negative authentication has been invented to reduce cyber attacks.

• The proposed scheme is a Positive Authentication System and for security reasons
elements from at least two, and preferably all three, factors like (Ownership,
Knowledge, Inherence ) should be verified.

Dr.AIT ,Department of TCE ,MTECH,DCN


5
Dr.AIT ,Department of TCE ,MTECH,DCN
11
What is Discrete Wavelet Transform?
• In numerical analysis and functional analysis, a discrete wavelet transform (DWT) is any wavelet
transform for which the wavelets are discretely sampled.
• As with other wavelet transforms, a key advantage it has over Fourier transforms is temporal resolution:
it captures both frequency and location information (location in time).

•An example of the 2D discrete wavelet transform that is


used in JPEG2000 The original image is high-pass filtered,
yielding the three large images, each describing local
changes in brightness (details) in the original image.

•It is then low-pass filtered and downscaled, yielding an


approximation image; this image is high-pass filtered to
produce the three smaller detail images, and low-pass
filtered to produce the final approximation image in the
upper-left. Fig.2:Discrete Wavelet Transform
Dr.AIT ,Department of TCE ,MTECH,DCN
2
How Discrete Wavelet Transform works?
• DWT is used to separate the image into a pixel. DWT is used in signal and image processing
especially for lossless image compression. DWT is also used for Lossy compression.

• The Lossless image compression is mostly used in DWT Lossless image compression give the good
quality of the image and also the compression ratio of the image also good. The PSNR (Peak Signal
to Noise Ratio) ratio of the image is also good in the Lossless compression.

• In the DWT transformation, the image is taking into HL, LH, HH, LL Ratios. Then the image is
moved into DWT transforms, and then DWT Quantization is processed. After that the process is
move to DPCM encoder. (Differential Pulse Code Modulation)

• This technique first decomposes an image into coefficients called sub-bands and then the
resulting coefficients are compared with a threshold. Coefficients below the threshold are set to
zero. Finally, the coefficients above the threshold value are encoded with a loss less compression
technique.

Fig.3: Flow of Discrete Wavelet Transform 9


Dr.AIT ,Department of TCE ,MTECH,DCN
What is Wavelets?
• Wavelet is a “small wave”. It is a special kind of function which exhibits oscillatory behaviour for a
short period of time and then dies out.

• In signal processing using Fourier transform, the signal is decomposed into a series of sines or
cosines. It is impossible to know simultaneously the exact frequency and the exact time of
occurrence of that particular frequency in a signal.

• In order to know the frequency, the signal must be spread in time, or vice versa. A solution is to split
the signal up into components that are not sine or cosine waves.

• A single function and its dilations and translations may be used to generate a set of ortho-normal
basis functions to represent a signal. This would help to condense the information in both the time
and frequency domains. This idea led to the introduction of wavelets.

(An Ortho-normal basis for an inner product space V with finite dimension is a basis for V whose
vectors are ortho-normal, that is, they are all unit vectors and orthogonal to each other.)

Dr.AIT ,Department of TCE ,MTECH,DCN 10


What is Wavelets?
• Wavelet transform decomposes a signal into a set of basis functions. These basis functions are
called Wavelets.
• The DWT decomposes a digital signal into different sub-bands so that the lower frequency sub-
bands have finer frequency resolution and coarser time resolution compared to the higher
frequency sub-bands. DWT is the basis of the new JPEG2000 image compression standard.

Fig.2: Image Compression levels

Fig.3: Three level decomposition for 2D – DWT

Dr.AIT ,Department of TCE ,MTECH,DCN 11


What is Wavelets?
Wavelets can be manipulated in two ways – by translation and
by scaling. In translation, the central position of the wavelet is
changed along the time axis. In scaling, its frequency is changed.

Morlet Wavelet
Translation of a Wavelet Scaling of a Wavelet

 Haar Wavelet Function


Haar wavelet function, denoted by , is given by:

Haar Wavelet Function


Haar Wavelet Function and its Translates Scaled Versions of Haar Wavelet Function
12
Dr.AIT ,Department of TCE ,MTECH,DCN
Why Haar DWT?
• Due to its low computing requirements, the Haar transform has been mainly used for image
processing and pattern recognition.

• From this reason two dimensional signal processing is an area of efficient applications of Haar
transforms due to their wavelet– like structure.

• Modern cameras are capable of producing images with resolutions in the range of tens of
megapixels. These images need to be compressed before storage and transfer.

• The Haar transform can be used for image compression. The basic idea is to transfer the image
into a matrix in which each element of the matrix represents a pixel in the image. For example, a
256×256 matrix is saved for a 256×256 image. JPEG image compression involves cutting the
original image into 8×8 sub-images. Each sub-image is an 8×8 matrix.
• The 2-D Haar transform is required. The equation of the Haar transform is
where is a n × n matrix and is n-point Haar transform. The inverse Haar transform is

Dr.AIT ,Department of TCE ,MTECH,DCN 13


Image compression

• Image compression is minimizing the size in bytes of a graphics file without degrading the
quality of the image to an unacceptable level.

• The reduction in file size allows more images to be stored in a given amount of disk or
memory space. It also reduces the time required for images to be sent over the Internet or
downloaded from Web pages.
— Image Processing refers to processing an image into digital image. Image Compression is
reducing the amount of data necessary to denote the digital image. Image Compression techniques
to reduce redundancy in raw Image.

Fig1:Image Compression
Dr.AIT ,Department of TCE ,MTECH,DCN
14
Discrete Cosine Transform (DCT)
• The discrete cosine transform (DCT) represents an image as a sum of sinusoids of
varying magnitudes and frequencies. The dct2 function computes the two-
dimensional discrete cosine transform (DCT) of an image.

• The DCT has the property that, for a typical image, most of the visually significant
information about the image is concentrated in just a few coefficients of the DCT.
For this reason, the DCT is often used in image compression applications

How to compress an image using the Discrete Cosine Transform (DCT)?


The DCT is computed by considering the two-dimensional DCT of 8-by-8 blocks in an input image,
discards (sets to zero) all but 10 of the 64 DCT coefficients in each block, and then reconstructs the
image using the two-dimensional inverse DCT of each block. The example uses the transform matrix
computation method.

Dr.AIT ,Department of TCE ,MTECH,DCN


15
Sender side Algorithm:

Step1: Input the video and frames separation.


Step2: Video object is extracted from the video.
Step3: Select the secret frame from video object in which data is to be hidden.
Step4: Apply Hiding module
• Take biometric signal
• Encrypt biometric signal using secret key
• Vectorize encrypted biometric signal
• Apply DWT and sub band decomposition
• Apply QSWT estimation
Step 5: Create video using stego-object and Compress

Dr.AIT ,Department of TCE ,MTECH,DCN


16
Receiver side Algorithm:

Step 1: Load encrypted video with hidden data and convert it into frames
Step 2: Decompress the video
Step 3: Apply QSWT detection module
Step 4: Enter the decryption password and decrypt biometric signal
Step 5: Extract original biometric signal

Initially the biometric signal is encrypted by incorporating a chaotic pseudo-random bit


generator and a chaos driven cipher, based on mixed feedback and time variant S-boxes.

The use of such an encryption mechanism is justified since,


1) Chaos presents sensitivity to initial conditions,
2) A C-PRBG statistically works very well as a one-time pad generator.

Dr.AIT ,Department of TCE ,MTECH,DCN


17
Data Hiding Module
Step 1: Consider the Vectorized Encrypted Image

1. By DWT Watermarking Technique the image is divided into sub-band pairs.


2. The LL sub-band pair is selected by applying the DWT Technique twice.
3. The Vectorized Encrypted Image is hidden this sub band pair.(This part of the image is selected to hide as
it is not visible clearly to the human eye )
4. Stego-object Image is obtained and using Discrete Cosine Transform Image is compressed.
5. The Stego-object Image is Transmitted.

Dr.AIT ,Department of TCE ,MTECH,DCN


18
Displaying the Histograms and Correlations
Step2:
1. Plots of Diagonal , Horizontal ,Vertical correlations related to Original and Encrypted Images are plotted.

2. Histogram Results of biometric Image and Encrypted Image are also plotted

Tasks to be Completed:
1. The Secret Image and Cover Image must be separated .
2. The Host Video Object is stored.

Dr.AIT ,Department of TCE ,MTECH,DCN 19


Correlations
• A correlation matrix is a table showing correlation coefficients between variables. Each pixel in
the matrix shows the correlation between two Images.

• A correlation matrix is used as a way to summarize data, as an input into a more advanced
analysis, and as a diagnostic for advanced analyses.

• Correlation quantifies the strength of a linear relationship between two Images.


• When there is no correlation between two Images then, two Images are considered to be different
• Here in this Analysis, Vertical, Horizontal, Diagonal Correlations are considered.

Histogram
• An image histogram is a chart that shows the distribution of intensities in an indexed or grayscale image.

• The information in a histogram can be used to choose an appropriate enhancement operation.


For example, if an image histogram shows that the range of intensity values is small, you can use an
intensity adjustment function to spread the values across a wider range.

Dr.AIT ,Department of TCE ,MTECH,DCN


20
Results
• Results obtained while considering webcam snapshot

Dr.AIT ,Department of TCE ,MTECH,DCN 21


Results
• Histogram Results of biometric Image and Encrypted Image.

Dr.AIT ,Department of TCE ,MTECH,DCN 22


Results
• Plots of Diagonal , Horizontal ,Vertical correlations related to Original and Encrypted Images.

Dr.AIT ,Department of TCE ,MTECH,DCN 23


This method provides a robust authentication mechanism based on semantic
segmentation, chaotic encryption, and data hiding.

• It is one of the most efficient algorithms of literature that facilitates robust


hiding of visually recognizable patterns.

• The embedded information is hard to detect by the human visual system.


• Biometrics is inherently more reliable.
• Biometric traits cannot be lost or forgotten.
• They are more difficult to forge.

Dr.AIT ,Department of TCE ,MTECH,DCN 12


• Authentication is the act of conforming the truth of an attribute of a datum or entity.
In this method a robust and more accurate authentication mechanism based on
semantic segmentation, chaotic encryption, and data hiding.

• Biometric signals enter more and more into our everyday lives, since governments,
as well as other organizations, resort to their use in accomplishing crucial
procedures (e.g. citizen authentication). Thus there is an urgent need to further
develop and integrate biometric authentication techniques into practical
applications.

Dr.AIT ,Department of TCE ,MTECH,DCN 25


• This method provides a high security and easy way to encrypt, embedding and
decrypt secret image without effecting the quality of images(secret or cover).

• The use of DWT Watermarking and DCT Compression provides high levels of
robustness, keeping at the same time the ease of implementation and the
compatibility to well-known and widely used Image and Video compression

• All these merits are accompanied by efficient bandwidth usage

Dr.AIT ,Department of TCE ,MTECH,DCN 26


Thank you

You might also like