Details Details PDF BIBTEX RIS Title Verification of iris image authenticity using fragile watermarking Journal title Bulletin of the Polish Academy of Sciences Technical Sciences Yearbook 2016 Volume 64 Issue No 4 (Special Section on Civil Engineering – Ongoing Technical Research. Part I) Authors Czajka, A. ; Kasprzak, W. ; Wilkowski, A. Divisions of PAS Nauki Techniczne Coverage 807-819 Date 2016 Identifier DOI: 10.1515/bpasts-2016-0090 ; ISSN 2300-1917 Source Bulletin of the Polish Academy of Sciences: Technical Sciences; 2016; 64; No 4 (Special Section on Civil Engineering – Ongoing Technical Research. Part I); 807-819 References Adamski (2015), The average time complexity of probabilistic algorithms for finding generators in finite cyclic groups Bull Pol Ac, Tech, 989. ; Monro (2007), DCT - based iris recognition Transactions on Pattern Analysis and Machine Intelligence, IEEE, 29, 586. ; Daugman (1993), High confidence visual recognition of persons by a test of statistical independence Transactions on Pattern Analysis and Machine Intelligence, IEEE, 15, 1148. ; Lipiński (2011), Watermarking software in practical applications Bull Pol Ac, Tech, 59. ; Wilkowski (2013), Steganographic authentication method for electronic IDs Image Analysis and Recognition Notes in Computer Science Springer - Verlag Berlin - Heidelberg, Lecture, 7950. ; Hetzl (2005), A graph - theoretic approach to steganography Proceedings of the th IFIP TC TC international conference on Communications and Multimedia Springer - Verlag Berlin Heidelberg, Security, 6, 9. ; Daugman (2008), Effect of severe image compression on iris recognition performance Transactions on Information Forensics and, IEEE Security, 3, 52. ; Lock (2014), Effects of reversible watermarking on iris recognition performance of Computer Electrical Automation Control and Information Engineering, International Journal, 8, 574. ; Monro (2007), Correction to : DCT - based iris recognition Transactions on Pattern Analysis and Machine, IEEE Intelligence, 29. ; Na (2010), Enhancing iris - feature security with steganography th on Industrial Electronics and Applications, IEEE Conference, 2233. ; Majumder (2013), Singular value decomposition and wavelet - based iris biometric watermarking, IET Biometrics, 2, 21, doi.org/10.1049/iet-bmt.2012.0052 ; Daugman (2007), New methods in iris recognition IEEE Transactions on Systems Man and Cybernetics : Cybernetics, Part B, 37, 1167.