A. Basu, Ankita Chatterjee, Soumita Datta, Sudeep Sarkar, Ranit Karmakar
{"title":"基于显著性的安全水印框架的FPGA实现","authors":"A. Basu, Ankita Chatterjee, Soumita Datta, Sudeep Sarkar, Ranit Karmakar","doi":"10.1109/ICICPI.2016.7859716","DOIUrl":null,"url":null,"abstract":"In this paper authors proposed a secured Digital Biometric based watermarking algorithm and its hardware realization by means of Field Programmable Gate Array (FPGA). The scheme focuses on the Graph Based Visual Saliency (GBVS) technique. Biometric watermarking has been introduced for validity and ultimate security of a digital media. Biometric information which is basically fingerprint is being hidden in a cover image in an efficient way such that the quality of the original information is not corrupted. The result of imperceptibility is promising; moreover several attacks were made to prove the robustness of this technique. The hardware implementation of this algorithm is provided to validate this scheme.","PeriodicalId":6501,"journal":{"name":"2016 International Conference on Intelligent Control Power and Instrumentation (ICICPI)","volume":"52 1","pages":"273-277"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"FPGA implementation of Saliency based secured watermarking framework\",\"authors\":\"A. Basu, Ankita Chatterjee, Soumita Datta, Sudeep Sarkar, Ranit Karmakar\",\"doi\":\"10.1109/ICICPI.2016.7859716\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper authors proposed a secured Digital Biometric based watermarking algorithm and its hardware realization by means of Field Programmable Gate Array (FPGA). The scheme focuses on the Graph Based Visual Saliency (GBVS) technique. Biometric watermarking has been introduced for validity and ultimate security of a digital media. Biometric information which is basically fingerprint is being hidden in a cover image in an efficient way such that the quality of the original information is not corrupted. The result of imperceptibility is promising; moreover several attacks were made to prove the robustness of this technique. The hardware implementation of this algorithm is provided to validate this scheme.\",\"PeriodicalId\":6501,\"journal\":{\"name\":\"2016 International Conference on Intelligent Control Power and Instrumentation (ICICPI)\",\"volume\":\"52 1\",\"pages\":\"273-277\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Intelligent Control Power and Instrumentation (ICICPI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICPI.2016.7859716\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Intelligent Control Power and Instrumentation (ICICPI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICPI.2016.7859716","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
FPGA implementation of Saliency based secured watermarking framework
In this paper authors proposed a secured Digital Biometric based watermarking algorithm and its hardware realization by means of Field Programmable Gate Array (FPGA). The scheme focuses on the Graph Based Visual Saliency (GBVS) technique. Biometric watermarking has been introduced for validity and ultimate security of a digital media. Biometric information which is basically fingerprint is being hidden in a cover image in an efficient way such that the quality of the original information is not corrupted. The result of imperceptibility is promising; moreover several attacks were made to prove the robustness of this technique. The hardware implementation of this algorithm is provided to validate this scheme.