Smart Recognition and Authentication based on Haar Cascade Classifier and Visual Cryptography
DOI:
https://doi.org/10.47839/ijc.23.2.3541Keywords:
IoT, Haar cascade classifier, Machine Learning, Visual cryptographyAbstract
The algorithm with an E-verification method is proposed that combines automated facial recognition technology with digital media and later it combines aspects of secret data exchange and visual cryptography. A face detection technique based on Internet of Things (IoT) selects features using the Principal Component Analysis (PCA) algorithm and the Haar cascade classifier. The selected face serving as a cover follows two level Discrete Haar Wavelet Transform. The shares generated from digital signature and fingerprint are diffused into the converted coefficients. Furthermore, the imperceptibility of the additional noise is increased by a bit-level noise reduction technique. Authenticity is confirmed by regenerating a message digest at the receiving end, and the extraction process operates in complete blindness. The approach is suitable for smart card design and may be used as an automatic recognition system in a real-world setting. Performance comparisons show a notable improvement over other approaches that are comparable. Additionally, the technique is effective against some related attacks.
References
T. Tsui, X.-P. Zhang, D. Androutsos, “Color image watermarking using multidimensional Fourier transformation,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 16-28, 2008, https://doi.org/10.1109/TIFS.2007.916275.
S. Behnia, M. Teshnehlab, P. Ayubi, “Multiple watermarking scheme based on improved chaotic maps,” Communication in Nonlinear Science and Numerical Simulation, vol. 15, no. 9, pp. 2469-2478, 2010. https://doi.org/10.1016/j.cnsns.2009.09.042.
J. Liu, J. Li, J. Ma, N. Sadiq, U. A. Bhatti, Y. Ai, “A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and henon map,” Applied Sciences, vol. 9, no.700, pp. 1-23, 2019, https://doi.org/10.3390/app9040700.
I. J. Cox, M. L. Miller, J. A. Bloom, Digital Watermarking, Morgan Kaufmann, 1999.
H. Dehgan, S. E. Safavi, “Robust image watermarking in the wavelet domain for copyright protection,” ICEE 2010, https://doi.org/10.48550/arXiv.1001.0282.
Definition of PASSPORT. [Online]. Available at: www.merriam-webster.com.
P. Cane, J. Conaghan, The New Oxford Companion to Law, London: Oxford University Press, 2008. https://doi.org/10.1093/acref/9780199290543.001.0001.
The electronic passport in 2021 and beyond, Thales Group, 2021.
C. Li, Z. Qi, N. Jia, J. Wu, “Human face detection algorithm via Haar cascade classifier combined with three additional classifiers,” Proceedings of the 2017 13th IEEE International Conference on Electronic Measurement & Instruments (ICEMI), 2017, pp. 483-487, https://doi.org/10.1109/ICEMI.2017.8265863.
T. H. Iwan, H. M. Fahrezy, R. P. Merliasari, “The design and the implementation of security system office door using Raspberry Pi face detection,” Proceedings of the 1st International Multidisciplinary Conference on Education, Technology, and Engineering (IMCETE 2019), Advances in Social Science, Education and Humanities Research, vol. 410, pp. 307-311, 2020. https://doi.org/10.2991/assehr.k.200303.074.
K. Gupta, N. Jiwani, Md H. U. Sharif, M. A. Mohammad, N. Afreen, “Smart door locking system using IOT”, Proceedings of the 2022 International Conference on Advances in Computing, Communication and Materials (ICACCM), 2022, pp. 1-4. https://doi.org/10.1109/ICACCM56405.2022.10009534.
P. Elachi, E. Okowa, U. Ekwueme, “Facial recognition based smart door lock system,” Journal of Scientific and Industrial Research, vol. 6, issue 2, pp. 95-105, 2022.
I. S. Hutomo, H. Wicaksono, “A smart door prototype with a face recognition capability,” IAES International Journal of Robotics and Automation (IJRA), vol. 11, no. 1, pp. 1-9, 2022. https://doi.org/10.11591/ijra.v11i1.pp1-9.
P. Elechi, E. Okowa, U. Ekwueme, “Facial recognition based smart door lock system,” FUPRE Journal of Scientific and Industrial Research, vol. 6, no. 2, pp. 95-105, 2022.
C.-S. Lu and H.-Y. M. Liao, “Multipurpose watermarking for image authentication and protection,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1579-1592, 2001, https://doi.org/10.1109/83.951542.
M. Borda, I. Nafornita, “Digital watermarking – Principles and applications,” Proceedings of the International Conference on Communications, 2004, pp. 41–54, 2004.
A. Shamir, “How to share a secret,” Communication of the ACM, vol. 22, no. 11, pp. 612–613, 1979. https://doi.org/10.1145/359168.359176ю
D. R. D. Brabin, J. R. P. Perinbam, D. Meganathan, “A block based reversible data hiding scheme for digital images using optimal value computation,” Wireless Pers Commun, vol. 94, pp. 2583–2596, 2017. https://doi.org/10.1007/s11277-016-3817-4.
C. W. Lee, W. H. Tsai, “A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability,” IEEE Transactions on Image Processing, vol 22, no. 1, pp. 207–218, 2012, https://doi.org/10.1109/TIP.2011.2159984.
X. Gao, X. Li, D. Tao, C. Deng, J. Li, “Robust reversible watermarking via clustering and enhanced pixel-wise masking,” IEEE Transactions on Image Processing, vol. 21, no. 8, pp. 3598–3611, 2012. https://doi.org/10.1109/TIP.2012.2191564.
J. J. K. O. Ruanaidh, T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Signal Processing, vol. 66, no. 3, pp. 303–317, 1998, https://doi.org/10.1016/S0165-1684(98)00012-7.
M. A. Suhail, M. S. Obaidat, “Digital watermarking-based DCT and JPEG model,” IEEE Transactions on Instrumentation and Measurement, vol. 52, no. 5, pp. 1640–1647, 2003. https://doi.org/10.1109/TIM.2003.817155.
G. Coatrieux, L. Lecornu, Ch. Roux, & B. Sankur, “A review of image watermarking applications in healthcare,” Proceedings of the 28th IEEE Annual International Conference on Engineering in Medicine and Biology Society, EMBS’06, 2006, pp. 4691–4694. https://doi.org/10.1109/IEMBS.2006.259305.
W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3–4, pp. 313–336, 1996, https://doi.org/10.1147/sj.353.0313.
W. N. Lie, L. C. Chang, “Spatial domain image watermarking by data embedding at adaptive bit Position,” Proceedings of the IPPR Conference on Computer Vision, Graphics and Image Processing, 1999, pp. 16–21.
L. Li, H. H. Xu, C. C. Chang and Y. Y. Ma, “A novel image watermarking in redistributed invariant wavelet domain,” The Journal of Systems and Software, vol. 84, no. 6, pp. 923–929, 2011. https://doi.org/10.1016/j.jss.2011.01.025.
B. J. Mohd, S. Abed, T. Al-Hayajneh, S. Alounch, “FPGA hardware of the LSB steganography method,” IEEE Transaction on Consumer Electronics, 978-1-4673-1550-0/12
P.-Y. Chen, H.-J. Lin, “A DWT based approach for image steganography,” International Journal of Applied Science and Engineering, vol. 4, issue 3, pp. 275-290, 2006. https://gigvvy.com/journals/ijase/articles/ijase-200612-4-3-275
P. Y. Chen, H. J. Lin, “A DWT based approach for image steganography,” International Journal of Applied Science and Engineering, vol. 4, no. 3, pp. 275–290, 2006.
L. H. H. Herman, Image Compression using the haar wavelet transform. Plenum Press, 2001.
Y. P. Chu, S. W. Guo, Y. K. Chan, H. C. Wu, “Image hiding based on a hybrid technique of VQ compression and discrete wavelet transform,” Proceedings of the International Computer Symposium, 2004, pp. 313–317.
X. Song, F. Liu, C. Yang, X. Luo, Y. Zhang, “Steganalysis of adaptive JPEG steganography using 2D Gabor filters,” Proceeding of 3rd ACM Workshop on Information Hiding and Multimedia Security, USA, 2015, pp. 15-23. https://doi.org/10.1145/2756601.2756608.
A. A. Abdelwahab, L. A. Hassan, “A discrete wavelet transform based technique for image data hiding,” Proceedings of the National Radio Science Conference, NRSC 2008, Tanta, Egypt, 2008, pp. 1-9, https://doi.org/10.1109/NRSC.2008.4542319.
P. Bao, X. Ma, “Image adaptive watermarking using wavelet domain singular value Decom-position,” IEEE Transaction on Circuits and Systems for Video Technology, vol. 15, no. 1, pp. 96–102, 2005. https://doi.org/10.1109/TCSVT.2004.836745.
S. P. Maity, M. K. Kundu, “A blind CDMA image watermarking scheme in wavelet domain,” Proceedings of the 2004 International Conference on Image Processing, 2004. ICIP'04., Singapore, 2004, pp. 2633-2636, https://doi.org/10.1109/ICIP.2004.1421644.
L. H. Che, J. J. Lin, “Mean quantization-based image watermarking,” Image and Vision Computing, vol 21, no. 8, pp. 717–727, 2003, https://doi.org/10.1016/S0262-8856(03)00067-2.
T. C. Lin, C. M. Lin, “Wavelet-based copyright-protection scheme for digital images based on local features,” Information Sciences, vol. 179, no. 19, pp. 3349–3358, 2009, https://doi.org/10.1016/j.ins.2009.05.022.
M. Ali, C. W. Ahn, “An optimized watermarking technique based on self-adaptive DE in DWTSVD transform domain,” Signal Processing, vol. 94, pp. 545–556, 2014, https://doi.org/10.1016/j.sigpro.2013.07.024.
A. Al-Ha, M. Farfoura, “Providing security for e-government document images using digital watermarking in the frequency domain,” Proceedings of the IEEE ICIM, 2019, pp. 77–81. https://doi.org/10.1109/INFOMAN.2019.8714674.
L. Zhang, X. Yan, H. Li, & M. Chen, “A dynamic multiple watermarking algorithm based on DWT and HVS,” International Journal of Communications, Network & System Sciences, vol. 5, pp. 490–495, 2012. https://doi.org/10.4236/ijcns.2012.58059.
S. Chowdhury, S. Mistry, N. Ghoshal, “Multi phase digital authentication of e-certificate with Secure concealment of multiple secret copyright signatures,” Int. J. of Innovative Technology and Exploring Engineering, vol. 8, no. 10, 2019, pp. 3365–3380. https://doi.org/10.35940/ijitee.J1231.0881019.
S. Bose, T. Arjariya, A. Goswami, S. Chowdhury, “Multi-layer digital validation of candidate service appointment with digital signature and bio-metric authentication approach,” International Journal of Computer Networks & Communications (IJCNC), vol. 14, no. 5, pp. 81-100, 2022, https://doi.org/10.5121/ijcnc.2022.14506.
I. Daubechies, Ten Lectures on Wavelets, Philadelphia: SIAM, 1992, https://doi.org/10.1137/1.9781611970104.
G. R. Kuduvalli, R. M. Rangayyan, “Performance analysis of reversible image compression techniques for high resolution digital teleradiology,” IEEE Transactions on Medical Imaging, vol. 11, no. 3, pp. 430–445, 1992. https://doi.org/10.1109/42.158947.
J. M. Lina, “Image processing with complex Daubechies wavelets,” Journal of Mathematical Imaging and Vision, vol. 7, no. 3, pp. 211–223, 1997, https://doi.org/10.1023/A:1008274210946.
L. M. Patnaik, “Daubechies 4 wavelet with a support vector machine as an efficient method for classification of brain image,” Journal of Electronic Imaging, vol. 14, issue 1, article ID 013018, 2005. https://doi.org/10.1117/1.1868003.
M. Vetterli, J. Kovacevic, “Wavelets and sub-band coding,” Englewood Cliffs, 1995, NJ: Prentice Hall PTR.
T. W. Yue and S. Chiang, “A neural network approach for visual cryptography,” Proceedings of the IEEE International Conference on Neural Networks, vol. 15, pp. 494–499, 2000, https://doi.org/10.1109/IJCNN.2000.861518.
V. Bhutra, H. Kumar, S. Jangid, L. Solanki, “Door security using face detection and Raspberry Pi,” IOP Conf. Ser.: Mater. Sci. Eng., vol. 331, no. 012011, 2018. https://doi.org/10.1088/1757-899X/331/1/012011.
S. Roy, Md N. Uddin, Md Z. Haque, Md J. Kabir, “Design and implementation of the smart door lock system with face recognition method using the Linux platform Raspberry Pi,” JCSN – International Journal of Computer Science and Network, vol. 7, issue 6, 2018.
P. Patil, D. S. Bormane, “DWT based invisible watermarking technique for digital images,” International Journal of Engineering and Advanced Technology (IJEAT), vol. 2, no. 4, pp. 603–605, 2013.
Y. Dinesh, A. P. Ramesh, “Efficient capacity image steganography by using wavelets,” International Journal of Engineering Research and Applications (IJERA), vol. 2, no. 1, pp. 251–259, 2012.
A. Chawla, P. Shukla, “A modified secure digital image steganography based on DWT using matrix rotation method,” International Journal of Computer Science and Communication Engineering, vol. 2, no. 1, pp. 20–25, 2013.
L. Li, H. H. Xu, C. C. Chang, Y. Y. Ma, “A novel image watermarking in redistributed invariant wavelet domain,” Journal of Systems and Software, vol. 84, no. 6, pp. 923–929, 2011, https://doi.org/10.1016/j.jss.2011.01.025.
A. Goswami, N. Ghoshal, “Imperceptible image authentication using wavelets,” International Journal of Network Security, vol. 18, no. 5, pp. 861–873, 2016.
I. Nasir, Y. Weng, J. Jiang, S. P. Ipson, “Multiple spatial watermarking technique in color images,” Springer-Verlag London Limited, 2010, Signal Image and Video Processing, vol. 4, issue 2, pp. 145-154, 2010. https://doi.org/10.1007/s11760-009-0106-7.
N. Mohananthini, G. Yamuna, “Performance comparison of single and multiple watermarking techniques,” I. J. Computer Network and Information Security (IJCNIS), vol. 7, pp. 28–34, 2014, https://doi.org/10.5815/ijcnis.2014.07.04.
N. Mohananthini, G. Yamuna, “Comparison of multiple watermarking techniques using genetic algorithms,” Journal of Electrical Systems and Information Technology, vol. 3, pp. 68-80, 2016.
N. Mohananthini, G. Yamuna “Image fusion process for multiple watermarking schemes against attacks,” Journal of Network Communications and Emerging Technologies (JNCET), vol. 1, issue 2, pp. 1-8, 2015.
M. Tyagi, Viola Jones Algorithm and Haar Cascade Classifier, Towards Data Science, July 13, 2021. [Online]. Available at: https://towardsdatascience.com/viola-jones-algorithm-and-haar-cascade-classifier-ee3bfb19f7d8
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.