Image Authentication Research Papers - Academia.edu (original) (raw)

The role of attendance in any organization cannot be over emphasis. Attendance Record System (ARS) is one of the tools used by organizations to track their staff`s daily attendance and performance analysis. ARS helps organizations to... more

The role of attendance in any organization cannot be over emphasis. Attendance Record System (ARS) is one of the tools used by organizations to track their staff`s daily attendance and performance analysis. ARS helps organizations to determine the number of their active staff, staff punctuality, preparation of monthly payroll and also in making some decisions on staff (such as staff promotion and award presentation at the end of the year). There are many ARSs with different frauds associated with each of them. This paper proposes an implementable biometric based Organization Attendance Record System(OARS) which uses the concept of facial recognition to eliminate frauds against the existing ARSs. We evaluate existing ARSs, identifying their strengths and weaknesses, identifying frauds against them and proposed a technique to eliminate these frauds. Although this study does not cover implementation of the proposed technique, details on how the system can be implemented is discussed. With the simplicity of the algorithm of our proposed system, it is our hope that decision makers in various organizations will be able to develop and implement the system through their information technology department thereby eliminating frauds associated with existing attendance record systems. Keywords— Attendance Record System (ARS), facial recognition, fraud, real time authentication, database. I. INTRODUCTION The role of attendance in any organization cannot be over emphasis. Attendance Record System (ARS) is one of the tools used by organizations to track their staff`s daily attendance and performance analysis. It helps organizations to determine the number of their active staff, staff punctuality and also in preparation of monthly payroll. Attendance also helps organization in making certain decision as well as staff performance analysis especially on the aspect of time schedules [1]. Many organizations rely on attendance register to achieve the benefits of staff attendance while some organizations rely on smart card system. Meanwhile, both methods have their weaknesses and frauds associated with them. If attendance is to be used by any organization for the purposes alighted above, there is a need to marry staff attendance taking with their unique identity. However, unique identity of staff can only be achieved through biometrics technology. Biometric measures both physiological and behavioural characteristics of human being [2]-[3]. Biometrics technology is the technology that measure any of the characteristics of human being for the purpose of authentication. Ref. [4] gives details on biometrics. Facial recognition is physiological biometrics that authenticate individual base on facial pattern. Many researchers have studied facial recognitions system in the recent years. The studies range from method of processing face image, method of feature extraction to the method of classification during verification/recognition process. Meanwhile, the application of researchers studies on face recognition has not been fully exhausted. Facial recognition has received substantial attentions from both the research communities and the market in recent times, but still remained very challenging in real applications [5]. Nevertheless, some organizations use facial recognition for security purpose in term of access control. However, proposition of facial recognition for organization attendance record is not fund in literature. To the best of authors knowledge, apart from traditional attendance register, " what we have " and " what we are " are the mostly used attendance record system by many organizations. Whereas these methods give room for fraud perpetration. This study reviewed some of the existing ARSs, identifies their weaknesses and proposed an easy to implement facial recognition technique. The rest of the paper is organised as follow: Section II gives related work and section III presents methodology adopted for this study. Section IV discusses existing ARS with their weakness and Section V discusses frauds against them. Section VI describes our proposed framework for Facial recognition and section VII presents conclusion of the study.

In this paper, we have proposed a novel feature-based fragile water-marking scheme for image authentication. The proposed technique extracts Feature Points (FP) by performing the Harris corner detector and used them as germs to decomposes... more

In this paper, we have proposed a novel feature-based fragile water-marking scheme for image authentication. The proposed technique extracts Feature Points (FP) by performing the Harris corner detector and used them as germs to decomposes the host image in segments using Voronoi Diagram (VD). The authen-tication of each segment is guaranteed by using the Cyclic Redundancy Check code (CRC). Then, the CRC encoding procedure is applied to each segment to generate the watermark. Voronoi decomposition is employed because it has a good retrieval performance compared to similar geometrical decomposition algorithms. The security aspect of our proposed method is achieved by using the public key crypto-system RSA (Rivest-Shamir-Adleman) to encrypt the FP. Experimental results demonstrate the efficiency of our approach in terms of im-perceptibility, the capability of detection of alterations, the capacity of embedding, and computation time. We have also prove the impact of VD decomposition on the quality of the watermarked image compared to block decomposition. The proposed method can be applicable in the case where the tamper detection is critical and only some regions of interest must be re-transmitted if they are corrupted , like in the case of medical images. An example of the application of our approach to medical image is briefly presented.

This paper presents an efficient technique for combined fragile and semi-fragile colour image authentication. The authentication signature is extracted from image representation in the automata domain. In the automata domain the... more

This paper presents an efficient technique for combined fragile and semi-fragile colour image authentication. The authentication signature is extracted from image representation in the automata domain. In the automata domain the self-similarity of the coloured image is represented using weighted finite automata. The proposed technique is capable of detecting malicious attacks as well as colour tampering whilst maintaining rather simple

Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent... more

Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent patient information are transmitted across public networks, such as the Internet. Health mandates such as the Health Insurance Portability and Accountability Act require healthcare providers to adhere to security measures in order to protect sensitive patient information. This paper presents a fully reversible, dual-layer watermarking scheme with tamper detection capability for medical images. The scheme utilizes concepts of public-key cryptography and reversible data-hiding technique. The scheme was tested using medical images in DICOM format. The results show that the scheme is able to ensure image authenticity and integrity, and to locate tampered regions in the images.

With fast advance digital technology image processing is fastest and secure area of research and technology. To hiding a data and repairing with generation of authentication signal are big challenges. To overcome a problem of... more

With fast advance digital technology image processing
is fastest and secure area of research and technology. To hiding a
data and repairing with generation of authentication signal are
big challenges. To overcome a problem of security a new method
is used a secret data hiding and repairing of grayscale document
images with generation of authentication signals. An
authentication signal is generated for each 2x3 block of input
grayscale document image. For generation of authentication
signal a grayscale document image content need to binarized.
These binarize content transferred into number of share by using
Shamir secret sharing scheme. A new plane is used for data
hiding called alpha channel plane. This plane adding input
grayscale document image to form a Portable Network Graphics
(PNG) image which is easy to communication in network. At the
time of embedding computed secret values called shares mapped
with range of alpha channel plane values. At the receiver side
process of image authentication one of the block of image
marked as tampered if authentication signal of extracted from
alpha channel plane not match with the current block content.
Need to repaired tampered block by applied reverse Shamir
secret sharing scheme.

The purpose of an image hash is to provide a compact representation of the whole image. Designing a good image hash function requires careful consideration of many issues such as robustness, security and tamper detection with precise... more

The purpose of an image hash is to provide a compact representation of the whole image. Designing a good image hash function requires careful consideration of many issues such as robustness, security and tamper detection with precise localization. In this paper, we present a novel hashing scheme that addresses these issues in a unified framework. We analyze the security issues in image hashing and present new ideas to counter some of the attacks that we shall describe in this paper. Our proposed scheme is resilient to allow non-malicious manipulations like JPEG compression, high pass filtering and is sensitive enough to detect tampering with precise localization. Several experimental results are presented to demonstrate the effectiveness of the proposed scheme.

Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent... more

Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent patient information are transmitted across public networks, such as the Internet. Health mandates such as the Health Insurance Portability and Accountability Act require healthcare providers to adhere to security measures

In this paper, a modified SAFER plus algorithm is presented. Additionally, a comparison with various security algorithms like pipelined AES, Triple DES, Elliptic curve Diffie Hellman and the existing SAFER plus are done. Performance of... more

In this paper, a modified SAFER plus algorithm is presented. Additionally, a comparison with various security algorithms like pipelined AES, Triple DES, Elliptic curve Diffie Hellman and the existing SAFER plus are done. Performance of the algorithms is evaluated based on the data throughput, frequency and security level. The results show that the modified SAFER plus algorithm has enhanced security compared to the existing algorithms.

Various neural network based image hash functions have been proposed, in related works. However, statistical and security analysis must validate usage of them in military applications. This paper proposes a new neural network based hash... more

Various neural network based image hash functions have been proposed, in related works. However, statistical and security analysis must validate usage of them in military applications. This paper proposes a new neural network based hash function approach for color image authentication. Proposed hash function re-sizes input color image to a constant size, then generates hash values using neural network one-way property and non-linear techniques, for 3 dimensions respectively. As a result security and performance analysis are performed and satisfying results are achieved. The proposed system is robust, useful and secure.

Abstract—Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims at finding the originality of an image. Due to the advent of many image editing software image tampering has... more

Abstract—Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims
at finding the originality of an image. Due to the advent of many image editing software image tampering has become common.
The Enhanced hashing approach is suggested for image authentication. The concept of Hashing has been used for searching
images from large databases. It can also be applied to image authentication as it produces different results with respect to the
change in image. But the hashing methods used for similarity searches cannot be used for image authentication since they are no
sensitive for small changes. Moreover, we need a system that detects only perceptual changes. A new hashing method, namely,
enhanced robust hashing is proposed for image authentication, which uses global and local properties of an image. This method is
developed for detecting image forgery, including removal, insertion, and replacement of objects, and abnormal color
modification, and for locating the forged area. The local models include position and texture information of object regions in the image. The hash mechanism uses secret keys for encryption and decryption. IP tracing is done to track the suspicious nodes.

Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet.... more

Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images. To protect the authenticity of multimedia images, several approaches have been proposed. These approaches include conventional cryptography, fragile and semifragile watermarking and digital signatures that are based on the image content. Some of the researchers proposes image authentication with data repair capability but these techniques only work for specific category of image. A new authentication method based on the bit plane slicing with a data repair capability for color image and color document image is proposed. In this proposed technique alpha channel is used for embedding authentication data. In Portable network graphics (PNG) image alpha channel is already present but for other image formats alpha channel additionally combined with cover image. An authentication signal is generated using Binarization from cover image and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed authentication data are mapped into a range of alpha channel values near their maximum value of 255 to yield a transparent stego-image with a disguise effect. In the process of image authentication, an image block is marked as tampered if the authentication signal computed from the current block content does not match that extracted from the content embedded in the alpha channel plane. Data repairing is then applied to each tampered block by extracting authentication data from alpha channel plane. Good experimental results prove the effectiveness of the proposed method for real applications.