User Authentication Based on JPEG2000 Images.
Maria Teresa CartaBarbara PoddaCristian PerraPublished in: VLBV (2005)
Keyphrases
- user authentication
- jpeg images
- compression algorithm
- security analysis
- discrete cosine transform
- information security
- compressed images
- authentication protocol
- data hiding
- spatial domain
- dct coefficients
- jpeg compression
- dct domain
- lossy compression
- wireless channels
- biometric systems
- feature selection
- compression ratio
- image quality
- low cost
- similarity measure