自动化技术、信息技术 |
|
|
|
|
基于数字水印的人脸与声纹融合识别算法 |
王骕1,胡浩基1,于慧敏1,DAMPER R I2 |
1.浙江大学 信息与电子工程学系,浙江 杭州 310027; 2.南安普顿大学 电子与计算机科学系,英国 |
|
Augmenting remote multimodal person verification by embedding voice characteristics into face images |
WANG Su1, HU Hao-ji1, YU Hui-min1, DAMPER R I 2 |
1. Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China; 2. Department of Electronics and Computer Science, University of Southampton, SO17 1BJ, UK |
[1] MILLER B. Vital signs of identity biometrics [J]. Spectrum, IEEE, 1994, 31(2): 22-30.
[2] DONG J, TAN T. Effects of watermarking on iris recognition performance [C]∥Proceedings of the 10th International Conference on Control, Automation, Robotics and Vision. Hanoi, Vietnam: [s.n.], 2008: 1156-1161.
[3] JAIN A K, ULUDAG U. Hiding biometric data [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25 (11): 1494-1498.
[4] SATONAKA T. Biometric watermark authentication with multiple verification rule [C]∥Proceedings of the 12th IEEE Workshop on Neural Networks in Signal Processing. Martigny Valais: IEEE, 2002: 597-606.
[5] LI C, WANG Y, MA B, et al. Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme [J]. Computer Standards and Interfaces, 2012, 34(4): 367-379.
[6] ULUDAG U, PANKANTI S, PRABHAKAR S, et al. Biometric cryptosystems: issues and challenges [J]. Proceedings of the IEEE, 2004, 92(6): 948-960.
[7] RATHGEB C, UHL A. A survey on biometric cryptosystems and cancelable biometrics [J]. EURASIP Journal on Information Security, 2011, 2011(1): 125.
[8] REYNOLDS D A, ROSE R C. Robust text-independent speaker identification using Gaussian mixture speaker models [J]. IEEE Transactions on Speech and Audio Processing, 1995, 3(1): 72-83.
[9] LI Q, COX I J. Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(2): 127-139.
[10] CHEN B, WORNELL G W. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding [J]. IEEE Transactions on Information Theory, 2001, 47(4): 1423-1443.
[11] COX I J, MILLER M L, BLOOM J A. Digital watermarking and steganography [M]. Burlington: Morgan Kaufmann Publishers, 2008.
[12] LOWE D G. Object recognition from local scale-invariant features [C]∥Proceedings of the International Conference on Computer Vision. Corfu: [s. n.], 1999: 1150-1157.
[13] LOWE D G. Distinctive image features from scale invariant key points [J]. International Journal of Computer Vision, 2004, 60(2): 91-110.
[14] MESSER K, MATAS J, KITTLER J, et al. XM2VTSDB: the extended M2VTS database [C]∥Proceedings of the 2nd International Conference on Audio and Video-based Biometric Person Authentication. Washington, DC: [s. n.], 1999: 72-77.
[15] WANG Z, BOVIK A C. Image quality assessment: from error visibility to structural similarity [J]. IEEE Transactions on Image Processing, 2004, 13(4): 600-612.
[16] FAWCETT T. An introduction to ROC analysis [J]. Pattern Recognition Letters, 2006, 27(8): 861-874. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|