The aim of steganography is to hide information, such that the transmission of messages is transparent to any given viewer. Messages can be hided in different formats, such that they are undetectable and un-noticeable by human vision system. In this book, an image high hiding steganographic method for concealing digital image in a cover image is introduced, implemented and investigated. The technique used to embed the generated IFS-code, of the secret image, into the cover image is the Least-Significant-Bit (LSB) substitution method. The embedded secret image can be extracted from the...
The aim of steganography is to hide information, such that the transmission of messages is transparent to any given viewer. Messages can be hided in d...
Fingerprint recognition and verification are always the key issues in intelligent technology and information security. For a considerable fraction of population, the representation based on complete detection of ridge structures in the fingerprint is difficult to be accomplished. The main challenge is partial loss of the ridge structures. In this work, we developed a geometrically based method for fingerprint recognition and verification tasks; a set of partial local features extracted from fingerprint ridges, minutia, and pores attributes are used. The proposed system passes through two main...
Fingerprint recognition and verification are always the key issues in intelligent technology and information security. For a considerable fraction of ...