We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Video Steganography for Face Recognition with Signcryption for Trusted and Secured Authentication by using PCASA

by Kavitha Raju, S. K. Srivatsa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 56 - Number 11
Year of Publication: 2012
Authors: Kavitha Raju, S. K. Srivatsa
10.5120/8932-3055

Kavitha Raju, S. K. Srivatsa . Video Steganography for Face Recognition with Signcryption for Trusted and Secured Authentication by using PCASA. International Journal of Computer Applications. 56, 11 ( October 2012), 1-5. DOI=10.5120/8932-3055

@article{ 10.5120/8932-3055,
author = { Kavitha Raju, S. K. Srivatsa },
title = { Video Steganography for Face Recognition with Signcryption for Trusted and Secured Authentication by using PCASA },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 56 },
number = { 11 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume56/number11/8932-3055/ },
doi = { 10.5120/8932-3055 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:58:32.299010+05:30
%A Kavitha Raju
%A S. K. Srivatsa
%T Video Steganography for Face Recognition with Signcryption for Trusted and Secured Authentication by using PCASA
%J International Journal of Computer Applications
%@ 0975-8887
%V 56
%N 11
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Face recognition systems are very useful in many applications such as surveillance, biometrics and security. Principal Component Analysis (PCA) has also been used in some important applications, especially in pattern detection such as face detection and recognition. In real-time applications, response time must be as fast as possible. For this purpose, we propose a new PCA signcryption implementation for secure authentication by face detection based on the cross-correlation in the frequency domain between the input image and eigenvectors (weights). Simulation results demonstrated that our proposal is faster than the existingmethods. The experimental results for different images also show good performance. In this paper we proposed a face recognition system using the Principal Component Analysis Signcryption Algorithm (PCASA) within video steganography.

References
  1. Wendy S. Yambor Bruce A. Draper J. Ross Beveridge, "Analyzing PCAbased Face Recognition Algorithms: Eigenvector Selection and DistanceMeasures", July 1, 2000. Available at:http://www. cs. colostate. edu/~vision/publications/eemcvcsu2000. pdf
  2. Peter Belhumeur, J. Hespanha, David Kriegman, "Eigenfaces vs. fisherfaces: Recognition using class specific linear projection", IEEETransactions on Pattern Analysis and Machine Intelligence, 19(7):771 –720, 1997.
  3. L. Breiman. Bagging predictors. Technical Report Technical ReportNumber 421, Dept. of Statistics, University of California, Berkeley,1994.
  4. D. Swets and J. Weng, "Hierarchical discriminant analysis for imageretrieval", IEEE Transactions on Pattern Analysis and MachineIntelligence, 21(5):386–401, 1999.
  5. Wendy S. Yambor, "Analysis of PCA Based and Fisher Discriminant-Based Image Recognition Algorithms", M. S. Thesis, July 2000(Technical Report CS-00-103, Computer Science).
  6. Kyungnam Kim, "Face Recognition using Principle ComponentAnalysis", International Conference on Computer Vision and PatternRecognition, pp. 586-591, 1996.
  7. http://scien. stanford. edu/class/ee368/projects2001/dropbox/project16/
  8. http://www. irc. atr. jp/%7Emlyons/pub_pdf/fg98-1. pdf
  9. http://www. kasrl. org/jaffe. html
  10. James R. Parker, J R Parker, "Algorithms for Image Processing andComputer Vision", John Wiley & Sons, 1996.
  11. Sankar K. Pal, AshishGhosh, Malay K. Kundu, "Soft Computing forImage Processing", Studies in Fuzziness and Soft Computing, Vol. 42,2000.
  12. Rafael C. Gonzalez, Richard E. Woods, "Digital Image Processing",Pearson Publications, 2000.
  13. Image Processing Handbook by John C. Russ
  14. Handbook of Pattern Recognition and Image Processing by K. S. Fu andT. Y. Young
  15. Li Ma , Tieniu Tan , Yunhong Wang , Dexin Zhang " PersonalIdentification Based on Iris Texture Analysis" , IEEE Transactions onPattern Analysis and Machine Intelligence , Vol. 25 No. 12, December2003.
  16. John Carter, Mark Nixon, "An Integrated Biometric Database",available at:ieeexplore. ieee. org/iel3/1853/4826/00190224. pdf.
  17. Arun Rose, Anil Jain and SharatPankanti, "A Prototype HandGeometry Based Verification System", 2nd International Conference onAudio and Video Based Person Authentication, Washington D. C. , pp. 166-171, 1999.
  18. Boreki, Guilherm, Zimmer, Alessandro, "Hand Geometry FeatureExtraction through Curvature Profile Analysis", XVIII BrazilianSymposium on Computer Graphics and Image Processing, SIBGRAPI,Brazil, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

PCA PCASA Signcryption Steganography eigenvectors