Image Registration and Rectification Using Background Subtraction Method for Information Security to Justify Cloning Mechanism Using High-End Computing Techniques

  • Raj Kumar Patra
  • Rohit RajaEmail author
  • Tilendra Shishir Sinha
  • Md Rashid Mahmood
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1090)


The present research paper deals with the registration and rectification of images for study of multimodal biometric systems through image cloning mechanisms using high-end techniques. Image cloning is a key research problem in information security applications. Most of the researcher addresses the above-said problem using template-based method which failed to deals with the soft computing and high-end computing techniques. Here, we propose knowledge-based or model-based technique for cloning. In this method, one can achieve more reliable information without any password or keys. Here the algorithm that has been proposed is going to be used for image cloning and at the same time securing reliable information through a double-authenticated based generation of secure codes after employing image cloning mechanism using high-end computing techniques. The proposed algorithm is tested and the results found are satisfactory.


Artificial neural network (ANN) Facial animation parameters (FAP) Means value coordinates (MVC) Fuzzy set rules (FSR) Genetic algorithms (GA) Region of interest (ROI) 


  1. 1.
    Hsu, Pei-Wei, Yao-Jen Chang, Chao-Kuei Hsieh, and Yung-Chang Chen. 2003. Facial Expression Cloning: Using Expressive Ratio Image and FAP to Texture Conversion. Department of Electrical Engineering National Tsing Hua University, Hsinchu, Taiwan 300, R. O. C.Google Scholar
  2. 2.
    Farbman, Zeev, Gil Hoffer, Yaron Lipman, Daniel Cohen-Or, and Dani Lischinski. 2009. Coordinates for Instant Image Cloning. Hebrew University.Google Scholar
  3. 3.
    Vargas, Alex Cuadros, Luis Gustavo Nonato, and Valerio Pascucci. 2011. Combinatorial Laplacian Image Cloning.Google Scholar
  4. 4.
    Xinyuan, Fu, He Guo, Yuxin Wang, Tianyang Liu, and Han Li. Arbitrary image cloning. 2011. In Department of Computer Science and Technology, Dalian University of Technology Dalian, China, 116024.Google Scholar
  5. 5.
    Raja, Rohit, Tilendra Shishir Sinha, Ravi Prakash Dubey. 2015. Recognition of Human-Face from Side-View Using Progressive Switching Pattern and Soft-Computing Technique. Association for the Advancement of Modelling and Simulation Techniques in Enterprises, AMSE Journals 58 (1): 14–34.Google Scholar
  6. 6.
    Raja, Rohit, Tilendra Shishir Sinha, Ravi Prakash Dubey. 2016. Soft Computing and LGXP Techniques for Ear Authentication using Progressive Switching Pattern. International Journal of Engineering and Future Technology, 2 (2).Google Scholar
  7. 7.
    Rohit, Raja, Tilendra Shishir Sinha, and Ravi Prakash Dubey. 2016. Orientation Calculation of Human Face Using Symbolic techniques and ANFIS. International Journal of Engineering and Future Technology 7 (7): 37–50.Google Scholar
  8. 8.
    Raja, Rohit, Tilendra Shishir Sinha, Raj Kumar Patra, and Shrikant Tiwari. 2018. Physiological Trait Based Biometrical Authentication of Human-Face Using LGXP and ANN Techniques. International Journal of Information and Computer Security Special Issue on: Multimedia Information Security Solutions on Social Networks 10 (2–3): 303–320.Google Scholar
  9. 9.
    Jia, Jia, Shen Zhang, and Lianhong Cai. 2010. Facial Expression Synthesis Based on Motion Patterns Learned from Face Database. In 2010 IEEE 17th International Conference on Image Processing, Hong Kong, Sept 26–29, 2010.Google Scholar
  10. 10.
    Siddhesh, Angle, Reema Bhagtani, and Hemali Chheda. Biometrics: A further echelon of security. In Department of Biomedical Engineering, Thadomal Shahani Engineering College, T. P. S III, Bandra, Mumbai-50.Google Scholar
  11. 11.
    Brand, J.D., and J.S.D. Mason. Visual speech: A Physiological or Behavioral Biometrics. Colombia Sylvain Department of Electrical Engineering, University of Wales Swansea SA2 8PP, UK.Google Scholar
  12. 12.
    Neha, Sharma, J.S. Bhatia, and Neena Gupta. An Encrypto-stego Technique Based Secure Data Transmission System. PEC Chandigarh.Google Scholar
  13. 13.
    Morkel T., J.H.P. Eloff, and M.S. Olivier. An overview of image stegnography. In Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, 0002, Pretoria, South Africa.Google Scholar
  14. 14.
    Bhensle, A.C., and Rohit Raja. 2014. An Efficient Face Recognition Using PCA and Euclidean Distance Classification. International Journal of Computer Science and Mobile Computing, 3 (6): 407–413. ISSN 2320–088X.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Raj Kumar Patra
    • 1
  • Rohit Raja
    • 2
    Email author
  • Tilendra Shishir Sinha
    • 3
  • Md Rashid Mahmood
    • 4
  1. 1.Department of CSECMR Technical CampusHyderabadIndia
  2. 2.Department of CSESreyas Institute of Engineering and TechnologyNagole, HyderabadIndia
  3. 3.Department of Information TechnologyInstitute of Engineering and ManagementSalt Lake, KolkataIndia
  4. 4.Department of ECEGuru Nanak Institutions Technical CampusHyderabadIndia

Personalised recommendations