Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Biometrics Security using Steganography
Chander Kant, Ranjender Nath, Sheetal Chaudhary
Pages - 1 - 5     |    Revised - 15-02-2008     |    Published - 30-02-2008
Volume - 2   Issue - 1    |    Publication Date - February 2008  Table of Contents
biometric, steganography, cryptography, encoding, decoding
A biometric system is at risk to a variety of attacks. These attacks are intended to either avoid the security afforded by the system or to put off the normal functioning of the system. Various risks have been discovered while using biometric system. Proper use of cryptography greatly reduces the risks in biometric systems as the hackers have to find both secret key and template. It is notified that still fraudrant goes on to some extent. Here in this paper a new idea is presented to make system more secure by use of steganography. Here the secret key (which is in the form of pixel intensities) will be merged in the picture itself while encoding, and at decoding end only the authentic user will be allowed to decode.
CITED BY (29)  
1 Chakdar, D., Gope, G., Talukdar, A., Avasthi, D. K., & Nath, S. S. (2016). Optical absorption and luminescence study of ZnS quantum dots. une, 13, 15.
2 Wójtowicz, W. Wykorzystanie technik biometrycznych do tworzenia cyfrowych znaków wodnych.
3 Patil, S., Bhosale, S., & Patil, S. (2015). A Two Fold Approach to Store and Share Secrete Data for Groups in Cloud. IJETT, 2(2).
4 Vegh, L., & Miclea, L. Improving the Security of a Cyber-Physical System using Cryptography, Steganography and Digital Signatures.
5 Arjunwadkar, M. V. (2015). The knowledge based intrusion detection and prevention model for biometric system.
6 Gobi, M., & Kannan, D. (2015). A Secured Public Key Cryptosystem for Biometric Encryption. International Journal of Computer Science and Network Security (IJCSNS), 15(1), 49.
7 Tripathy, A., & Kumar, D. Image Steganography By Using Integer Wavelet Transform And Genetic Algorithm To Perform Text Based Hiding Behind Gray Scaled or Colored Image.
8 Wójtowicz, W., & Ogiela, M. R. (2014). Biometric watermarks based on face recognition methods for authentication of digital images. Security and Communication Networks.
9 Vegh, L., & Miclea, L. (2014, May). Securing communication in cyber-physical systems using steganography and cryptography. In Communications (COMM), 2014 10th International Conference on (pp. 1-4). IEEE.
10 Ogiela, M. R. (2014). New Directions in Cognitive Cryptography. Journal of Convergence Volume, 5(3).
11 Barkathunisha, S., & Meenakumari, R. (2013, April). Secure transmission of medical information using IRIS recognition and steganography. In Computation of Power, Energy, Information and Communication (ICCPEIC), 2013 International Conference on (pp. 89-92). IEEE.Pawar, A., Kumbhare, T., & Murkute, P. Enhancing Iris Scanning Using Visual Cryptography.
12 Rahmes, M., Wilder, K., & Fox, K. (2013, May). A multi-resolution fractal additive scheme for blind watermarking of 3D point data. In SPIE Defense, Security, and Sensing (pp. 87570G-87570G). International Society for Optics and Photonics.
13 Roja, M. M., & Sawarkar, S. (2013). ElGamel Encryption for Biometric Database Protection. International Journal of Computer Applications, 68(6).
14 ManiRoja, M., & Sawarkar, S. (2013). Biometric Database Protection using Public Key Cryptography. International Journal of Computer Science and Network Security (IJCSNS), 13(5), 20.
15 Sinduja, R., Sathiya, R. D., & Vaithiyanathan, V. (2012, March). Sheltered iris attestation by means of Visual Cryptography (SIA-VC). In Advances in Engineering, Science and Management (ICAESM), 2012 International Conference on (pp. 650-655). IEEE.
16 Shami, F., Shamsafar, F., & Seyedarabi, H. (2012). Securing Database of Biometric Systems. Database, 7, 6.
17 Cauvery, N. K. Empirical Computation Of Rs-Analysis For Building Robust Steganography Using Integer Wavelet Transform And Genetic Algorithm.
18 Diwakar, M., & Sharma, P. Fingerprint Template Protection using Steganography.
19 Kumar, D., & Anand, B. Evaluation of RS-Analysis Proficiency by Genetic Algorithm for Robust Steganography using IWT.
20 KITM, K., & HCTM, K. Secure Personal Recognition System based on Hashes Keys.
21 Paunwala, M. C., & Patnaik, S. (2011). Biometric Template Protection With Robust Semi–Blind Watermarking Using Image Intrinsic Local Property. International Journal of Biometrics and Bioinformatics (IJBB), 5(2), 28.
22 Kathuria, M. (2010). Performance Enhancement of Identification System using Vein Biometric with Modified Run Length Encoding, Stegnography and Cryptography. International Journal of Computer Applications, 12(8), 1-5.
23 Revenkar, P. S., Anjum, A., & Gandhare, W. Z. (2010). Secure iris authentication using visual cryptography. arXiv preprint arXiv:1004.1748.
24 Dey, S. C., Das, R., Nath, S. S., & Bhattacherjee, R. (2010). Photo-luminescence of CdSe quantum dots suspended in liquid paraffin. OPTOELECTRONICS AND ADVANCED MATERIALS-RAPID COMMUNICATIONS, 4(11), 1721-1723.
25 Dey, S. C., Das, R., Nath, S. S., & Bhattacherjee, R. (2010). Fluorescence study of CdSe quantum dots suspended in liquid paraffin. Nano, 5(06), 357-359.
26 Mansor, S., Din, R., & Samsudin, A. (2009). Analysis of natural language steganography. International Journal of Computer Science and Security (IJCSS), 3(2), 113.
27 Kaur, M., & Sofat, S. (2009). A Review on Biometrics Security Breaches and Remedies. Biometrics and Bioinformatics, 1(8), 92-98.
28 S. Mansor,R bin Din, A. Samsudin. "Analysis of Natural Language Steganography". International Journal of Computer Science and Security (IJCSS), 3(2):62-153, 2009
29 Nath, S. S., Chakdar, D., Gope, G., & Avasthi, D. K. (2008). Effect of 100 MeV nickel ions on silica coated ZnS quantum dots. Journal of Nanoelectronics and Optoelectronics, 3(2), 180-183.
1 Directory of Open Access Journals (DOAJ)
2 Google Scholar
3 ScientificCommons
4 Academic Index
5 Academic Index
6 CiteSeerX
7 refSeek
9 Socol@r
10 ResearchGATE
11 Bielefeld Academic Search Engine (BASE)
12 Scribd
13 WorldCat
14 slideshare
16 PdfSR
17 Free-Books-Online
1 A. K. Jain, R. Bolle, and S. Pankanti, eds., Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, 1999.
2 D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. Springer- Verlag, 2003.
3 A. K. Jain, Arun Ross and U. Uludag “Biometrics Template security: Challenges and solutions” in Proc. of European Signal Processing Conference September 2005.
4 U.K. Biometric Working Group, “Biometric security concerns,” Technical Report, CESG, September 2003, http://www.cesg.gov.uk/site/ast/biometrics/media/ BiometricSecurityConcerns.pdf.
5 A. Adler, “Can images be regenerated from biometric templates?,” in Biometrics Consortium Conference, (Arlington, VA), September 2003.
6 A. Ross, J. Shah, and A. K. Jain, “Towards reconstructing fingerprints from minutiae points,” in Proc. SPIE, Biometric Technology for Human Identification II, vol. 5779, pp. 68–80, (Orlando, FL), March 2005.
7 R. Cappelli, R. Erol, D. Maio, and D. Maltoni, “Synthetic fingerprint-image generation,” in Proc. Int’l. Conf. Pattern Recognition (ICPR), vol. 3, pp. 475–478, (Barcelona, Spain), September 2000.
8 C. Soutar, “Biometric system security,” White Paper, Bioscrypt, http://www.bioscrypt.com.
9 U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: issues and challenges,” Proceedings of the IEEE, vol. 92, no. 6, pp. 948–960, 2004.
10 Bosselares, R.Govaerts : Fast Hashing on the Pentium. Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology. Springer-Verlag, 1996 Pages: 298 - 312.
11 Parvinder Singh, Sudhir Batra, HR Sharma, “Evaluating the Performance of Message Hidden in 1st and 2nd Bit Plane”, WSEAS Transactions on Information Science and Applications”, issue 8, vol 2, Aug 2005, pp 1220-1227.
Mr. Chander Kant
- India
Mr. Ranjender Nath
- India
Mr. Sheetal Chaudhary
- India